Suggested Topics within your search.
Suggested Topics within your search.
-
1521
Application of machine learning methods for automated detection of network intrusions
Published 2023-05-01“…Development of automated network attack detection systems capable of adapting to the ever-changing nature of network attacks and new types of threats. …”
Get full text
Article -
1522
SSCANL decoder based joint iterative detection and decoding algorithm
Published 2022-10-01“…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
Get full text
Article -
1523
Enhancing Weakly-Supervised Video Anomaly Detection With Temporal Constraints
Published 2025-01-01“…Anomaly Detection has been a significant field in Machine Learning since it began gaining traction. …”
Get full text
Article -
1524
Progress in Nondestructive Detection Techniques for Internal Defects of Agro-products
Published 2025-08-01“…Internal defects can easily develop during the growth process of agro-products, significantly affecting their economic value. …”
Get full text
Article -
1525
Community Detection in Social Network Based on Node Influence Expansion
Published 2023-06-01“…Finally, to finish the process of community detection, dynamic programming is employed for seed expansion.The results of the experiments reveal that community detection based on node influence expansion can effectively discover the community structure with small granularity and has certain performance advantages in modularity, D-score, and other indicators.…”
Get full text
Article -
1526
Impedance Spectrum Measurement and Fault Detection for XLPE Coaxial Cables
Published 2024-10-01“… XLPE coaxial cables are prone to faults and defects in the process of power transmission, seriously jeopardizing the safe operation of the power system. …”
Get full text
Article -
1527
Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression
Published 2025-01-01“…Optical emission spectroscopy (OES) data is essential for virtual metrology, enabling accurate predictions of wafer performance in plasma etching processes. This approach not only reduces the need for physical measurements of product quality, leading to significant resource savings, but also supports improved decision-making, particularly in process control and quality assurance. …”
Get full text
Article -
1528
Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces
Published 2023-01-01“…The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. …”
Get full text
Article -
1529
Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection
Published 2025-01-01“…Detection of defects on wood during quality processes in the wood industry is extremely important both economically and in terms of production and use. …”
Get full text
Article -
1530
AI-driven epidemic intelligence: the future of outbreak detection and response
Published 2025-07-01“…Epidemic intelligence, the process of detecting, verifying, and analyzing public health threats to enable timely responses, traditionally relies heavily on manual reporting and structured data, often causing delays and coverage gaps. …”
Get full text
Article -
1531
Detecting House of Spirit Attacks by Glibc Heap Information Extraction
Published 2024-02-01“…The experimental results show that this method can effectively extract the heap information in the memory of the Linux system process,and successfully detect the House of Spirit attack in the memory based on the information combined with the attack detection algorithm.…”
Get full text
Article -
1532
Relative Pose Estimation of an Uncooperative Target with Camera Marker Detection
Published 2025-05-01“…This paper introduces a novel method to detect structural markers on the European Space Agency’s Environmental Satellite (ENVISAT) for safe de-orbiting using image processing and Convolutional Neural Networks (CNNs). …”
Get full text
Article -
1533
Combined Method for Informative Feature Selection for Speech Pathology Detection
Published 2023-08-01“…The task of detecting vocal abnormalities is characterized by a small amount of available data for training, as a consequence of which classification systems that use low-dimensional data are the most relevant. …”
Get full text
Article -
1534
Enhancing Fabric Detection and Classification Using YOLOv5 Models
Published 2025-03-01“…The developed model detected and classified fabrics with an accuracy of 81.08%. …”
Get full text
Article -
1535
IOT System for Detecting Epileptic Seizures Based on Fuzzy Logic
Published 2025-06-01“…To achieve this the proposed system utilizes the STM32F103C8T6 microcontroller to process data from a 3-axis accelerometer, heart rate sensor and temperature sensor. …”
Get full text
Article -
1536
An Empirical Evaluation of Ensemble Models for Python Code Smell Detection
Published 2025-07-01“…Code smells, which represent poor design choices or suboptimal code implementations, reduce software quality and hinder the code maintenance process. Detecting code smells is, therefore, essential during software development. …”
Get full text
Article -
1537
Systematic Review of Deep Learning Techniques in Skin Cancer Detection
Published 2024-11-01“…Nevertheless, these processes are strongly dependent on dermatologists’ experience, with excision advised only when cancer is suspected by a physician. …”
Get full text
Article -
1538
Anomaly Detection for Wireless Cellular Communication Based on Synthetic Anomaly
Published 2025-01-01“…The method achieved AUROC scores of 90% (image-level) and 82% (pixel-level) under ISR 0 dB, outperforming traditional unsupervised learning-based detection methods. An ablation study demonstrated the effectiveness of the synthetic anomaly generation process, highlighting its contribution to enhanced detection performance. …”
Get full text
Article -
1539
iSentenizer-μ: Multilingual Sentence Boundary Detection Model
Published 2014-01-01“…The genres of data are often referred to the shifts of text topics and new languages domains. Although new detection models can be retrained for different languages or new text genres, previous model has to be thrown away and the creation process has to be restarted from scratch. …”
Get full text
Article -
1540
Analysis for Detecting Banana Leaf Disease Using the CNN Method
Published 2025-03-01“…This accuracy confirms the potential of CNN in significantly improving the disease detection process on banana plants. This research is expected to help farmers identify diseases more quickly and accurately, thereby minimizing yield losses and increasing productivity. …”
Get full text
Article