-
1161
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
Published 2013-06-01“…Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. …”
Get full text
Article -
1162
A Neutrosophic Framework for Artificial Immune Systems
Published 2024-12-01“…A numerical example, from the field of computer security, illustrates the application of the suggested approach in detecting non-self entities. With the addition of neutrosophic logic, the proposed model significantly enhances AIS’s adaptability and pattern recognition capabilities, addressing uncertainties inherent in real-world applications.…”
Get full text
Article -
1163
Two-dimensional Sparse Antenna Array of a Passive Coherent Radar using a Parametric Algorithm of Signal Processing via the Section Method
Published 2022-04-01“…As a result, the AA becomes sparse, which negatively affects the quality of the AA three-dimensional antenna pattern (AP). The section method based on the modified parametric Burg algorithm is a promising and relevant method for constructing directional characteristics. …”
Get full text
Article -
1164
-
1165
“Keeleteadlane raputab lausemalle korpusest loendisse”: lausemallide automaatse tuvastamise esimesed sammud
Published 2025-04-01“…These advancements aim to refine automatic valency pattern detection and enhance grammatical information presentation within Estonian lexicographical resources. …”
Get full text
Article -
1166
A Novel Connected-Components Algorithm for 2D Binarized Images
Published 2025-06-01“…Unlike conventional pixel-based methods that scan and label individual pixels using global buffers or disjoint-set structures, our approach encodes rows as linked segments and merges them using a union-by-size strategy. We accelerate run detection by using a precomputed 16-bit cache of binary patterns, allowing for fast decoding without relying on bitwise CPU instructions. …”
Get full text
Article -
1167
-
1168
An Integrated Preprocessing and Drift Detection Approach With Adaptive Windowing for Fraud Detection in Payment Systems
Published 2025-01-01“…The findings show that the framework can adjust to changing patterns of fraud, reduce false positives, and enhance detection performance. …”
Get full text
Article -
1169
Electromagnetic target detection model for unmanned aerial vehicle platforms based on Bayesian detection
Published 2024-12-01“…To address this issue, this paper, grounded in the Bayesian signal detection theory and utilizing the distributional characteristics of antenna pattern diagrams, constructs an electromagnetic detection model for unmanned aerial vehicle platforms. …”
Get full text
Article -
1170
Optimized classification of potato leaf disease using EfficientNet-LITE and KE-SVM in diverse environments
Published 2025-05-01“…EfficientNet-LITE improves the model's emphasis on pertinent features through Channel Attention (CA) and 1-D Local Binary Pattern (LBP), while preserving computational economy with a reduced model size of 12.46 MB, fewer parameters at 3.11M, and a diminished FLOP count of 359.69 MFLOPs.ResultsBefore optimization, the SVM classifier attained an accuracy of 79.38% on uncontrolled data and 99.07% on laboratory-controlled data. …”
Get full text
Article -
1171
Ultrasonographicpotencial in detection of Acute Appendicitis
Published 2009-08-01“…In case of empyema vermiform appendix vascular pattern in the wall is detected only in mesentery area. …”
Get full text
Article -
1172
Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
Published 2021-01-01“…Previous methods for system intrusion detection have mainly consisted of those based on pattern matching that employs prior knowledge extracted from experts’ domain knowledge. …”
Get full text
Article -
1173
Detection and Localization of Stationary Waves on Venus Using a Self‐Supervised Anomaly Detection Model
Published 2025-03-01“…However, manual detection is time‐consuming, especially with the increasing volume of new images. …”
Get full text
Article -
1174
The influence of the paradigm of forensic science on law enforcement
Published 2020-10-01Get full text
Article -
1175
Features of lymph node metastasis depending on intratumoral heterogeneity of non-small cell lung cancer in patients with different morphological changes in the bronchial epithelium
Published 2022-11-01“…In patients with a combination of basal cell hyperplasia and squamous metaplasia, a spiny pattern (65 %), a basaloid pattern (100 %), a polymorphic pattern (82 %) and single tumor cells (89 %) were more frequently detected in cases with metastatic lymph nodes than in cases without metastatic lymph nodes (35 %; р=0.04; 0 %; р=0.01; 18 %; р=0.01; 11 %; р=0.01, respectively). …”
Get full text
Article -
1176
THE NEURAL NETWORK MODEL FOR MULTIPARAMETER OBJECTS RECOGNITION
Published 2022-10-01Get full text
Article -
1177
Capabilities of magnetic resonance imaging in the diagnosis of idiopathic inflammatory myopathies
Published 2024-01-01Get full text
Article -
1178
Spatiotemporal evolution and driving forces of landscape ecological risk in the lower reaches of the Yellow River from 2000 to 2020
Published 2025-07-01“…However, the landscape pattern and associated ecological risks in the CLRYR in the past twenty years remain unclear. …”
Get full text
Article -
1179
An Innovative Analysis of Time Series-Based Detection Models for Improved Cancer Detection in Modern Healthcare Environments
Published 2023-12-01“…Early detection of cancer is important for successful treatment and improved survival of many cancer types. …”
Get full text
Article -
1180
Enhanced Detection of Intrusion Detection System in Cloud Networks Using Time-Aware and Deep Learning Techniques
Published 2025-07-01“…By examining the timing between packets and other statistical features, we detected patterns of malicious activity, allowing early and effective DoS threat mitigation. …”
Get full text
Article