Showing 501 - 520 results of 2,490 for search '(flow OR low) detection algorithm', query time: 0.22s Refine Results
  1. 501

    Using Artificial Intelligence Techniques For Intrusion Detection System by Manar Ahmed, Bayda Khaleel

    Published 2013-02-01
    “…Such that network intrusion classification and detection systems to prevent unlawful accesses. This work has taken the advantage of classification and detection abilities of Artificial Intelligent Techniques AITs algorithms to recognize intrusion(attack) and also detect new attacks. …”
    Get full text
    Article
  2. 502

    Research on the Optimization of TP2 Copper Tube Drawing Process Parameters Based on Particle Swarm Algorithm and Radial Basis Neural Network by Fengli Yue, Zhuo Sha, Hongyun Sun, Dayong Chen, Jinsong Liu

    Published 2024-12-01
    “…To address the problem of the large number of finite element model meshes and low solution efficiency, the wall thickness uniformity was predicted using a radial basis function (RBF) neural network, and parameter optimization was performed using the particle swarm optimization (PSO) algorithm. …”
    Get full text
    Article
  3. 503
  4. 504
  5. 505

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article
  6. 506

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article
  7. 507

    Software defined data center network with hybrid routing by Yue-ping CAI, Chang-ping WANG

    Published 2016-04-01
    “…SHR differentiate data flows by statistical calculat nt flows utilize the adap-tive routing algorithm while the mice flows use the oblivious routing algorithm. …”
    Get full text
    Article
  8. 508

    A Robust Framework for 2D Human Face Reconstruction from Half-Frontal Views in Low-Quality Surveillance Footage by Maria Siddiqua, Muhammad Furqan Zia

    Published 2024-12-01
    “…The reconstructed faces are validated using the Viola-Jones object detection algorithm to confirm the presence and alignment of facial features. …”
    Get full text
    Article
  9. 509

    Transmission Line Anomaly Detection and Real-Time Monitoring System Combining Edge Computing and EfficientDet by Menghao Lin, Yang Ding, Tianle Wang, Yang Liu, Zewei Li

    Published 2025-01-01
    “…In response to the current issues of low recognition accuracy and low image contrast in abnormal detection of power transmission lines. …”
    Get full text
    Article
  10. 510
  11. 511

    The Fast-Greedy algorithm reveals hourly fluctuations and associated risks of shark communities in a South Pacific city by Ibtissam Chafia, Jihad Zahir, Christophe Lett, Tarik Agouti, Hajar Mousannif, Laurent Vigliola

    Published 2025-12-01
    “…Both species showed fission–fusion dynamics, with communities merging at dusk, indicating increased movement and a higher risk during this low-light period. A key innovation of our modeling framework was its ability to handle temporal variability in community detection algorithms applied to bipartite networks. …”
    Get full text
    Article
  12. 512

    A global Swin-Unet Sentinel-2 surface reflectance-based cloud and cloud shadow detection algorithm for the NASA Harmonized Landsat Sentinel-2 (HLS) dataset by Haiyan Huang, David P. Roy, Hugo De Lemos, Yuean Qiu, Hankui K. Zhang

    Published 2025-06-01
    “…In this study we demonstrate, as have other researchers, low Sentinel-2 Fmask performance, and present a solution that applies a deep learning Swin-Unet model to the HLS surface reflectance to provide unambiguously improved cloud and cloud shadow detection. …”
    Get full text
    Article
  13. 513
  14. 514

    A Unmanned Aerial Vehicle-Based Image Information Acquisition Technique for the Middle and Lower Sections of Rice Plants and a Predictive Algorithm Model for Pest and Disease Detec... by Xiaoyan Guo, Yuanzhen Ou, Konghong Deng, Xiaolong Fan, Ruitao Gao, Zhiyan Zhou

    Published 2025-04-01
    “…In disease prediction, the YOLOv8 target detection algorithm and lightweight Transformer network are adopted to determine the detection performance of small targets. …”
    Get full text
    Article
  15. 515
  16. 516

    A Novel Multi-Level Perceptron for Accurate Heart Stroke Diagnosis by Muhammad Zaman, Muhammad Khubaib, Tanzila Kahkashan, Anam Zahoor, Narges Shahbaz, Shahzad Shoukat, Fahma Nisar

    Published 2025-01-01
    “…In the developing countries especially like Pakistan the income of the people are too much low and they cannot offered different type of expensive tests like ECG etc. …”
    Get full text
    Article
  17. 517

    A Miniaturized and Intelligent Lensless Holographic Imaging System With Auto-Focusing and Deep Learning-Based Object Detection for Label-Free Cell Classification by Jin Chen, Wentao Han, Liangzun Fu, Zhihang Lv, Haotian Chen, Wenjing Fang, Jiale Hou, Haohan Yu, Xiwei Huang, Lingling Sun

    Published 2024-01-01
    “…Cell detection and classification is a key technique for disease diagnosis, but conventional methods such as optical microscopy and flow cytometry have limitations in terms of field-of-view (FOV), throughput, cost, size, and operation complexity. …”
    Get full text
    Article
  18. 518

    A Video SAR Multi-Target Tracking Algorithm Based on Re-Identification Features and Multi-Stage Data Association by Anxi Yu, Boxu Wei, Wenhao Tong, Zhihua He, Zhen Dong

    Published 2025-03-01
    “…In this study, some key challenges in ViSAR systems are addressed, including the abundance of low-confidence shadow detections, high error rates in multi-target data association, and the frequent fragmentation of tracking trajectories. …”
    Get full text
    Article
  19. 519
  20. 520