-
501
Using Artificial Intelligence Techniques For Intrusion Detection System
Published 2013-02-01“…Such that network intrusion classification and detection systems to prevent unlawful accesses. This work has taken the advantage of classification and detection abilities of Artificial Intelligent Techniques AITs algorithms to recognize intrusion(attack) and also detect new attacks. …”
Get full text
Article -
502
Research on the Optimization of TP2 Copper Tube Drawing Process Parameters Based on Particle Swarm Algorithm and Radial Basis Neural Network
Published 2024-12-01“…To address the problem of the large number of finite element model meshes and low solution efficiency, the wall thickness uniformity was predicted using a radial basis function (RBF) neural network, and parameter optimization was performed using the particle swarm optimization (PSO) algorithm. …”
Get full text
Article -
503
-
504
-
505
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
506
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
507
Software defined data center network with hybrid routing
Published 2016-04-01“…SHR differentiate data flows by statistical calculat nt flows utilize the adap-tive routing algorithm while the mice flows use the oblivious routing algorithm. …”
Get full text
Article -
508
A Robust Framework for 2D Human Face Reconstruction from Half-Frontal Views in Low-Quality Surveillance Footage
Published 2024-12-01“…The reconstructed faces are validated using the Viola-Jones object detection algorithm to confirm the presence and alignment of facial features. …”
Get full text
Article -
509
Transmission Line Anomaly Detection and Real-Time Monitoring System Combining Edge Computing and EfficientDet
Published 2025-01-01“…In response to the current issues of low recognition accuracy and low image contrast in abnormal detection of power transmission lines. …”
Get full text
Article -
510
Diagnostic accuracy of case-identification algorithms for heart failure in the general population using routinely collected health data: a systematic review
Published 2024-12-01“…Objective To assess the diagnostic accuracy of validated HAD-based algorithms for detecting HF, compared to clinical diagnosis, and to investigate causes of heterogeneity. …”
Get full text
Article -
511
The Fast-Greedy algorithm reveals hourly fluctuations and associated risks of shark communities in a South Pacific city
Published 2025-12-01“…Both species showed fission–fusion dynamics, with communities merging at dusk, indicating increased movement and a higher risk during this low-light period. A key innovation of our modeling framework was its ability to handle temporal variability in community detection algorithms applied to bipartite networks. …”
Get full text
Article -
512
A global Swin-Unet Sentinel-2 surface reflectance-based cloud and cloud shadow detection algorithm for the NASA Harmonized Landsat Sentinel-2 (HLS) dataset
Published 2025-06-01“…In this study we demonstrate, as have other researchers, low Sentinel-2 Fmask performance, and present a solution that applies a deep learning Swin-Unet model to the HLS surface reflectance to provide unambiguously improved cloud and cloud shadow detection. …”
Get full text
Article -
513
-
514
A Unmanned Aerial Vehicle-Based Image Information Acquisition Technique for the Middle and Lower Sections of Rice Plants and a Predictive Algorithm Model for Pest and Disease Detec...
Published 2025-04-01“…In disease prediction, the YOLOv8 target detection algorithm and lightweight Transformer network are adopted to determine the detection performance of small targets. …”
Get full text
Article -
515
-
516
A Novel Multi-Level Perceptron for Accurate Heart Stroke Diagnosis
Published 2025-01-01“…In the developing countries especially like Pakistan the income of the people are too much low and they cannot offered different type of expensive tests like ECG etc. …”
Get full text
Article -
517
A Miniaturized and Intelligent Lensless Holographic Imaging System With Auto-Focusing and Deep Learning-Based Object Detection for Label-Free Cell Classification
Published 2024-01-01“…Cell detection and classification is a key technique for disease diagnosis, but conventional methods such as optical microscopy and flow cytometry have limitations in terms of field-of-view (FOV), throughput, cost, size, and operation complexity. …”
Get full text
Article -
518
A Video SAR Multi-Target Tracking Algorithm Based on Re-Identification Features and Multi-Stage Data Association
Published 2025-03-01“…In this study, some key challenges in ViSAR systems are addressed, including the abundance of low-confidence shadow detections, high error rates in multi-target data association, and the frequent fragmentation of tracking trajectories. …”
Get full text
Article -
519
-
520
Automated polymorphic worm signature generation approach based on seed-extending
Published 2014-09-01Get full text
Article