Suggested Topics within your search.
Suggested Topics within your search.
-
1961
Malicious Traffic Detection on Tofino Using Graph Attention Model
Published 2025-06-01“…With the surge of malicious traffic in networks, existing detection methods struggle to balance real-time performance and efficiency. …”
Get full text
Article -
1962
A Portable Optical Sensor for Microplastic Detection: Development and Calibration
Published 2025-04-01Get full text
Article -
1963
Fast horizon detection in maritime images using region-of-interest
Published 2018-07-01“…However, these methods suffer from high processing times, requiring tens of seconds to complete horizon detection. …”
Get full text
Article -
1964
Improving detectability of illegal fishing activities across supply chains
Published 2025-06-01Get full text
Article -
1965
High-Precision Chip Detection Using YOLO-Based Methods
Published 2025-07-01“…This lightweight and efficient approach is particularly effective in detecting small-scale objects within images and accurately analyzing dynamic debris in video sequences, providing a robust solution for automated debris monitoring in machine tool processing applications.…”
Get full text
Article -
1966
Machine vision-based automatic fruit quality detection and grading
Published 2025-06-01“…The prototype consisted of defective fruit detection and mechanical sorting systems. Image processing algorithms and deep learning frameworks were used for detection of defective fruit. …”
Get full text
Article -
1967
Multiclass Evaluation of Vision Transformers for Industrial Welding Defect Detection
Published 2025-02-01“…While welding tasks are frequently automated, inspection processes remain largely manual. Advances in computer vision and AI, especially ViTs, now enable more effective defect detection and classification, offering opportunities to automate these workflows. …”
Get full text
Article -
1968
Indirect detection constraints on semi-annihilation of inert scalar multiplets
Published 2025-07-01“…The existence of these processes can alleviate certain constraints and substantially modify the indirect detection signal. …”
Get full text
Article -
1969
Improving Threat Detection in Wazuh Using Machine Learning Techniques
Published 2025-06-01“…Real-time deployment requirements are rigorously evaluated, with all models maintaining end-to-end processing latencies below 100 milliseconds and 95% of events processed within 500 milliseconds. …”
Get full text
Article -
1970
Methods to detect avian influenza virus for food safety surveillance
Published 2015-11-01“…Conventional methods usually applied for the purpose of AI diagnosis face some practical challenges to establishing a comprehensive poultry surveillance program in the poultry supply chain. Diverse development of new technologies can meet the specific requirements of AI virus detection in various stages or scenarios throughout the poultry supply chain where onsite, rapid and ultrasensitive methods are emphasized. …”
Get full text
Article -
1971
Leveraging multivariate information for community detection in functional brain networks
Published 2025-05-01Get full text
Article -
1972
An Innovative Multiparametric Sensor Design for Detecting Microplastics and Heavy Metals
Published 2025-04-01Get full text
Article -
1973
Toward Causal and Evidential Open-Set Temporal Action Detection
Published 2025-01-01Get full text
Article -
1974
Concept Drift Detection Based on Deep Neural Networks and Autoencoders
Published 2025-03-01“…In domains such as fraud detection, healthcare, and industrial equipment maintenance, streaming data often exhibit characteristics such as continuous generation, high real-time processing requirements, and complex distributions, making it susceptible to concept drift. …”
Get full text
Article -
1975
Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection
Published 2025-01-01“…With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption. …”
Get full text
Article -
1976
Detection of smoke from infrared image frames in the aircraft cargoes
Published 2021-04-01“…Since, in the cargo of civil aircraft, visible image processing technology cannot be used to detect smoke in the event of a fire due to the closed dark environment, a novel smoke detection method using infrared image processing technology is presented. …”
Get full text
Article -
1977
Dynamics of the island mass effect – Part 1: Detecting the extent
Published 2025-07-01“…<p>In the vast Pacific Ocean, remote islands and atolls induce mesoscale and sub-mesoscale processes that significantly impact the surrounding oligotrophic ocean, collectively referred to as the island mass effect (IME). …”
Get full text
Article -
1978
Comparison of bluetongue virus detection and quantitation methods in south India
Published 2014-10-01“…Polymerase chain reaction (PCR)-based real-time detection assays may be an ideal method to detect the BTV genome in animal blood at an early stage of infection. …”
Get full text
Article -
1979
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1980
Optical Differentiation and Edge Detection Based on Birefringence of Uniaxial Crystals
Published 2025-04-01Get full text
Article