-
141
UAV attitude estimation based on MARG and optical flow sensors using gated recurrent unit
Published 2021-04-01Get full text
Article -
142
Tracking Lava Flow Cooling from Space: Implications for Erupted Volume Estimation and Cooling Mechanisms
Published 2025-07-01“…Here, we present an alternative approach based on the post-eruptive Thermal InfraRed (TIR) signal, using the recently proposed VRP<sub>TIR</sub> method to quantify radiative energy loss during lava flow cooling. We identify thermally anomalous pixels in VIIRS I5 scenes (11.45 µm, 375 m resolution) using the TIRVolcH algorithm, this allowing the detection of subtle thermal anomalies throughout the cooling phase, and retrieve lava flow area by fitting theoretical cooling curves to observed VRP<sub>TIR</sub> time series. …”
Get full text
Article -
143
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
Get full text
Article -
144
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
Get full text
Article -
145
Improved printed circuit board defect detection scheme
Published 2025-01-01“…Compared to the original YOLOv8 algorithm, this algorithm improves the average accuracy on small targets by $$5.5\%$$ for mAP50.…”
Get full text
Article -
146
Equivalence Between Optical Flow, the Unrest Index, and Walking Distance to Estimate the Welfare of Broiler Chickens
Published 2025-05-01“…Optical Flow velocity metrics (mean, variance, skewness, and kurtosis) were extracted using the Farnebäck algorithm. …”
Get full text
Article -
147
Detection and Optimization of Traffic Networks Based on Voronoi Diagram
Published 2021-01-01“…We present a traffic peak detection method, which constructs the Voronoi diagram of the input traffic flow data and computes the prominence of candidate peak points using the diagram. …”
Get full text
Article -
148
Advanced algorithms for UAV tracking of targets exhibiting start-stop and irregular motion
Published 2025-08-01“…Conventional tracking algorithms, typically based on the assumption of constant velocity, are poorly suited for such dynamic scenarios. …”
Get full text
Article -
149
Exact Quantum Algorithms for Quantum Phase Recognition: Renormalization Group and Error Correction
Published 2025-03-01“…We explore the relationship between renormalization-group (RG) flow and error correction by constructing quantum algorithms that exactly recognize one-dimensional symmetry-protected topological (SPT) phases protected by finite internal Abelian symmetries. …”
Get full text
Article -
150
Visualization of Anomalies using Graph-Based Anomaly Detection
Published 2021-04-01“…Network protocol analyzers such asWireshark are valuable for analyzing network traffic but pose a challenge in that it can be difficult to determine which behaviors are out of the ordinary due to the volume of data that must be analyzed. Network anomaly detection systems can provide vital insights to security analysts to supplement protocol analyzers, but this feedback can be difficult to interpret due to the complexity of the algorithms used and the lack of context to determine the reasoning for which an event was labeled as anomalous. …”
Get full text
Article -
151
Overcoming Stagnation in Metaheuristic Algorithms with MsMA’s Adaptive Meta-Level Partitioning
Published 2025-05-01“…When stagnation occurs, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>M</mi><mi>s</mi><mi>M</mi><mi>A</mi></mrow></semantics></math></inline-formula> divides the optimization run into partitions, restarting the MA for each partition with function evaluations guided by solution history, enhancing efficiency without modifying the MA’s internal logic, unlike algorithm-specific stagnation controls. The experimental results on the CEC’24 benchmark suite, which includes 29 diverse test functions, and on a real-world Load Flow Analysis (LFA) optimization problem demonstrate that MsMA consistently enhances the performance of all tested algorithms. …”
Get full text
Article -
152
Intelligent Analysis of Flow Field in Cleaning Chamber for Combine Harvester Based on YOLOv8 and Reasoning Mechanism
Published 2025-02-01“…This paper studied an intelligent method to analyze simulation result data which is based on the object detection algorithm and the reasoning mechanism. YOLOv8, one of the deep learning object detection algorithms, was selected to identify key-point data from the flow field in a cleaning chamber. …”
Get full text
Article -
153
ANTi-JAM solutions for smart roads: Ant-inspired traffic flow rules under CAVs environment
Published 2025-01-01“…The macroscopic traffic flow variables of interest were estimated using the deep learning method and the YOLO detection algorithm. …”
Get full text
Article -
154
Multivariate Machine Learning Model Based on YOLOv8 for Traffic Flow Prediction in Intelligent Transportation Systems
Published 2025-01-01“…Subsequently, five machine learning algorithms and three deep learning algorithms are employed to predict traffic flow. …”
Get full text
Article -
155
DIO-SLAM: A Dynamic RGB-D SLAM Method Combining Instance Segmentation and Optical Flow
Published 2024-09-01“…Feature points from moving objects can negatively impact the accuracy of Visual Simultaneous Localization and Mapping (VSLAM) algorithms, while detection or semantic segmentation-based VSLAM approaches often fail to accurately determine the true motion state of objects. …”
Get full text
Article -
156
An anomaly detection scheme for data stream in cold chain logistics.
Published 2025-01-01“…A measurement anomaly detection algorithm based on the improved isolated forest algorithm is proposed. …”
Get full text
Article -
157
Utilizing Calibration Model for Water Distribution Network Leakage Detection
Published 2024-09-01“…The proposed model comprises two distinct algorithms: (1) PRC estimation using MCMC and (2) a leakage detection algorithm employing a Kolmogorov–Smirnov test. …”
Get full text
Article -
158
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01“…The experimental results show that the global LDoS attack traffic detection method based on the Hurst index and GBDT algorithm achieves better detection results under different attack rates.…”
Get full text
Article -
159
Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment
Published 2025-03-01“…This paper presents an algorithm for detecting DDoS attacks earlier from the network using the entropy method and mitigating the attacks earlier using stochastic techniques. …”
Get full text
Article -
160
Detecting phishing gangs via taint analysis on the Ethereum blockchain
Published 2023-01-01“…Based on this, we propose a heuristics algorithm for phishing gang detection. And we also summarize gang patterns and reveal money laundering in phishing activities. …”
Get full text
Article