Showing 1,481 - 1,500 results of 20,691 for search 'detection process', query time: 0.21s Refine Results
  1. 1481
  2. 1482

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  3. 1483

    DualAD: Dual adversarial network for image anomaly detection⋆ by Yonghao Wan, Aimin Feng

    Published 2024-12-01
    “…The method incorporates the FC module during the reconstruction training process to impose constraints on the latent space of images, thereby yielding feature representations more conducive to anomaly detection. …”
    Get full text
    Article
  4. 1484
  5. 1485

    Detection of defects in printed circuit boards by the acoustic emission method by S. U. Uvaysov, N. T. Luu, C. D. Nguyen, Th. H. Vo, A. V. Dolmatov

    Published 2024-02-01
    “…The studies demonstrated that the AE method allows the presence of defects in MPCB occurring during the lamination process to be detected effectively and reliably. This study proposes a new approach to non-destructive testing of MPCB using the AE method. …”
    Get full text
    Article
  6. 1486

    Green Apple Detector Based on Optimized Deformable Detection Transformer by Qiaolian Liu, Hu Meng, Ruina Zhao, Xiaohui Ma, Ting Zhang, Weikuan Jia

    Published 2024-12-01
    “…In the process of smart orchard construction, accurate detection of target fruit is an important guarantee to realize intelligent management of orchards. …”
    Get full text
    Article
  7. 1487

    Research on Fire Detection of Cotton Picker Based on Improved Algorithm by Zhai Shi, Fangwei Wu, Changjie Han, Dongdong Song

    Published 2025-01-01
    “…According to the physical characteristics of cotton and the work characteristics of cotton pickers in the field, during the picking process, there is a risk of cotton combustion. The cotton picker working environment is complex, cotton ignition can be hidden, and fire is difficult to detect. …”
    Get full text
    Article
  8. 1488

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…And most methods are combined with machine learning and deep learning technologies, which require a large amount of training data to obtain high-precision detection models. Therefore, preventing malicious persons from stealing data to infer privacy during the botnet detection process has become an issue worth pondering. …”
    Get full text
    Article
  9. 1489

    Research on malicious behavior detection based on iOS system by Yuliang WANG, Xiaodong CHEN, Tun WU

    Published 2017-02-01
    “…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
    Get full text
    Article
  10. 1490

    Research on malicious behavior detection based on iOS system by Yuliang WANG, Xiaodong CHEN, Tun WU

    Published 2017-02-01
    “…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
    Get full text
    Article
  11. 1491

    Locomotive Maintenance Management System for Crack Detection Standard Operating by 王铁城

    Published 2010-01-01
    “…In order to ensure safe production needs of railway locomotive maintenance system, we develop a set of software of locomotive maintenance management system for crack detection standard operating. The system makeup, field operations control procedure and data process has been introduced. …”
    Get full text
    Article
  12. 1492

    Survey on model checking based hardware Trojan detection technology by Qizhi ZHANG, Yiqiang ZHAO, Ya GAO, Haocheng MA

    Published 2021-04-01
    “…Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.…”
    Get full text
    Article
  13. 1493

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  14. 1494

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  15. 1495

    Detection of selfish nodes based on credit mechanism in opportunistic networks by Zuo-yong TANG, Yi-jia YUAN, Yong-qiang DONG, Guo-xin WU

    Published 2012-11-01
    “…The existence of selfish nodes seriously affects the routing performance of opportunistic networks(OppNet).To protect the OppNet against the nodes’ selfish behavior,a credit-based selfish nodes detection mechanism was proposed to make it possible to keep away from such nodes during the process of message forwarding.The mechanism leverages 2-ACK messages to observe the nodes’behavior.Then the credit value was calculated based on the observation information and accordingly acts as the metric to distinguish the selfish nodes.Simulation results show that,when coupled with various routing algorithms,the mechanism could detect selfish nodes out accurately,and improve network performance effectively in terms of delivery rate and traffic load.…”
    Get full text
    Article
  16. 1496

    Target Maneuver Detection Method Based on Likelihood Ratio Test by Shao Lei, He Yangchao, Zhao Jin

    Published 2024-12-01
    “…Aiming at the target maneuver detection in antagonistic process, a detection method is proposed based on likelihood ratio test. …”
    Get full text
    Article
  17. 1497

    Using A One-Class SVM To Optimize Transit Detection by Jakob Roche

    Published 2024-07-01
    “…As machine learning algorithms become increasingly accessible, a growing number of organizations and researchers are using these technologies to automate the process of exoplanet detection. These mainly utilize Convolutional Neural Networks (CNNs) to detect periodic dips in lightcurve data. …”
    Get full text
    Article
  18. 1498

    Fault Detection Based on Kernel Global Local Preserving Projection by Wenbiao Wang, Qianqian Zhang, Youwei Hao

    Published 2025-03-01
    “…Experiments on the Tennessee Eastman process and industrial boilers demonstrate that the proposed method balances global and local data structures, reduces nonlinear influences, and improves the fault detection rate.…”
    Get full text
    Article
  19. 1499

    Paper-Based Aptasensor Assay for Detection of Food Adulterant Sildenafil by Murat Kavruk, Veli Cengiz Ozalp

    Published 2024-12-01
    “…This study introduces a lateral flow strip test using aptamers specific to sildenafil for detecting its illegal presence in food. The process involved using graphene oxide SELEX to identify high-affinity aptamers, which were then converted into molecular gate structures on mesoporous silica nanoparticles, creating a unique signaling system. …”
    Get full text
    Article
  20. 1500

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article