Suggested Topics within your search.
Suggested Topics within your search.
-
1481
Quantifying Post-Purchase Service Satisfaction: A Topic–Emotion Fusion Approach with Smartphone Data
Published 2025-05-01Subjects: “…natural language processing…”
Get full text
Article -
1482
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
1483
DualAD: Dual adversarial network for image anomaly detection⋆
Published 2024-12-01“…The method incorporates the FC module during the reconstruction training process to impose constraints on the latent space of images, thereby yielding feature representations more conducive to anomaly detection. …”
Get full text
Article -
1484
Laser radiation detection of the fluctuation alpha particle tracks in PADC
Published 2025-08-01Get full text
Article -
1485
Detection of defects in printed circuit boards by the acoustic emission method
Published 2024-02-01“…The studies demonstrated that the AE method allows the presence of defects in MPCB occurring during the lamination process to be detected effectively and reliably. This study proposes a new approach to non-destructive testing of MPCB using the AE method. …”
Get full text
Article -
1486
Green Apple Detector Based on Optimized Deformable Detection Transformer
Published 2024-12-01“…In the process of smart orchard construction, accurate detection of target fruit is an important guarantee to realize intelligent management of orchards. …”
Get full text
Article -
1487
Research on Fire Detection of Cotton Picker Based on Improved Algorithm
Published 2025-01-01“…According to the physical characteristics of cotton and the work characteristics of cotton pickers in the field, during the picking process, there is a risk of cotton combustion. The cotton picker working environment is complex, cotton ignition can be hidden, and fire is difficult to detect. …”
Get full text
Article -
1488
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…And most methods are combined with machine learning and deep learning technologies, which require a large amount of training data to obtain high-precision detection models. Therefore, preventing malicious persons from stealing data to infer privacy during the botnet detection process has become an issue worth pondering. …”
Get full text
Article -
1489
Research on malicious behavior detection based on iOS system
Published 2017-02-01“…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
Get full text
Article -
1490
Research on malicious behavior detection based on iOS system
Published 2017-02-01“…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
Get full text
Article -
1491
Locomotive Maintenance Management System for Crack Detection Standard Operating
Published 2010-01-01“…In order to ensure safe production needs of railway locomotive maintenance system, we develop a set of software of locomotive maintenance management system for crack detection standard operating. The system makeup, field operations control procedure and data process has been introduced. …”
Get full text
Article -
1492
Survey on model checking based hardware Trojan detection technology
Published 2021-04-01“…Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.…”
Get full text
Article -
1493
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
1494
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
1495
Detection of selfish nodes based on credit mechanism in opportunistic networks
Published 2012-11-01“…The existence of selfish nodes seriously affects the routing performance of opportunistic networks(OppNet).To protect the OppNet against the nodes’ selfish behavior,a credit-based selfish nodes detection mechanism was proposed to make it possible to keep away from such nodes during the process of message forwarding.The mechanism leverages 2-ACK messages to observe the nodes’behavior.Then the credit value was calculated based on the observation information and accordingly acts as the metric to distinguish the selfish nodes.Simulation results show that,when coupled with various routing algorithms,the mechanism could detect selfish nodes out accurately,and improve network performance effectively in terms of delivery rate and traffic load.…”
Get full text
Article -
1496
Target Maneuver Detection Method Based on Likelihood Ratio Test
Published 2024-12-01“…Aiming at the target maneuver detection in antagonistic process, a detection method is proposed based on likelihood ratio test. …”
Get full text
Article -
1497
Using A One-Class SVM To Optimize Transit Detection
Published 2024-07-01“…As machine learning algorithms become increasingly accessible, a growing number of organizations and researchers are using these technologies to automate the process of exoplanet detection. These mainly utilize Convolutional Neural Networks (CNNs) to detect periodic dips in lightcurve data. …”
Get full text
Article -
1498
Fault Detection Based on Kernel Global Local Preserving Projection
Published 2025-03-01“…Experiments on the Tennessee Eastman process and industrial boilers demonstrate that the proposed method balances global and local data structures, reduces nonlinear influences, and improves the fault detection rate.…”
Get full text
Article -
1499
Paper-Based Aptasensor Assay for Detection of Food Adulterant Sildenafil
Published 2024-12-01“…This study introduces a lateral flow strip test using aptamers specific to sildenafil for detecting its illegal presence in food. The process involved using graphene oxide SELEX to identify high-affinity aptamers, which were then converted into molecular gate structures on mesoporous silica nanoparticles, creating a unique signaling system. …”
Get full text
Article -
1500
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01“…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
Get full text
Article