-
61
High resolution weld semantic defect detection algorithm based on integrated double U structure
Published 2025-05-01“…In this study, a high-resolution semantic segmentation algorithm based on a double U-shaped network was proposed to meet the requirements of pressure vessel weld defect detection, and accurate detection was realized through innovative three-stage processing flow. …”
Get full text
Article -
62
Continuous Wavelet Transform-Based Method for High-Sensitivity Detection of Image Signals of Fluorescence Lateral Flow Assay
Published 2025-06-01“…Fluorescence lateral flow assays (FLFA) based on quantum dot probes have attracted significant attention in recent years due to their high sensitivity and quantitative detection capabilities. …”
Get full text
Article -
63
Charge‐coupled device based on optical tomography system for monitoring two‐phase flow
Published 2017-03-01Get full text
Article -
64
Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning.
Published 2024-01-01“…The proposed methodology aims to: (i) analyze statistical flow and compute entropy, and (ii) implement Machine Learning (ML) algorithms within SDN Intrusion Detection Systems for Internet of Things (IoT) environments. …”
Get full text
Article -
65
-
66
YOLOv8-DBW: An Improved YOLOv8-Based Algorithm for Maize Leaf Diseases and Pests Detection
Published 2025-07-01“…To solve the challenges of low detection accuracy of maize pests and diseases, complex detection models, and difficulty in deployment on mobile or embedded devices, an improved YOLOv8 algorithm was proposed. …”
Get full text
Article -
67
GCS-YOLO: A Lightweight Detection Algorithm for Grape Leaf Diseases Based on Improved YOLOv8
Published 2025-04-01“…In view of the issues of high complexity, significant computational resource consumption, and slow inference speed in the detection algorithm for grape leaf diseases, this paper proposes GCS-YOLO, a lightweight detection algorithm based on an improved YOLOv8. …”
Get full text
Article -
68
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
69
Anomaly Detection Dataset for Industrial Control Systems
Published 2023-01-01“…Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. …”
Get full text
Article -
70
Method of Video-Measurements of Traffic Flow Characteristics at a Road Junction
Published 2020-09-01“…The automation of obtaining characteristics is based on the application of image recognition algorithms (virtual detection method).…”
Get full text
Article -
71
Moving Vehicle Detection and Tracking Based on Optical Flow Method and Immune Particle Filter under Complex Transportation Environments
Published 2020-01-01“…To solve this problem, this paper proposes a kind of moving vehicle detection and tracking based on the optical flow method and immune particle filter algorithm. …”
Get full text
Article -
72
The use of artificial intelligence to analyze and optimize financial flows
Published 2025-03-01Get full text
Article -
73
Noise Effects on Detection and Localization of Faults for Unified Power Flow Controller-Compensated Transmission Lines Using Traveling Waves
Published 2025-05-01“…This paper presents a comprehensive analysis of the effects of noise on the detection and localization of faults in transmission lines compensated with a unified power flow controller using traveling wave-based methods. …”
Get full text
Article -
74
An Immunology Inspired Flow Control Attack Detection Using Negative Selection with -Contiguous Bit Matching for Wireless Sensor Networks
Published 2015-11-01“…This paper implemented an improved, decentralized, and customized version of the Negative Selection Algorithm (NSA) for data flow anomaly detection with learning capability. …”
Get full text
Article -
75
Outlier Traffic Flow Detection and Pattern Analysis Under Unplanned Disruptions: A Low-Rank Robust Decomposition Model
Published 2025-01-01“…Outlier traffic flow detection under unplanned disruptions is vital for operational safety and management. …”
Get full text
Article -
76
Multi-keyword partial matching algorithm based on text fragments
Published 2010-01-01“…A novel multi-keyword partial matching algorithm was also de- signed and realized which could detect the fraction of keywords in data block without re-flow or re-file. …”
Get full text
Article -
77
Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short-Term Memory, and Autoencoder
Published 2023-01-01“…The aim of this research is then to design a dynamic traffic classifier that can detect elephant flows to prevent network congestion. …”
Get full text
Article -
78
Development of Model for Traffic Flows on Urban Street and Road Network
Published 2019-02-01“…Innovation in the first-level model is an approach in determining conditions while detecting a fuzzy set without using a standard algorithm that is an algorithm of local flexible regulation. …”
Get full text
Article -
79
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
80
YOLO-AMM: A Real-Time Classroom Behavior Detection Algorithm Based on Multi-Dimensional Feature Optimization
Published 2025-02-01“…However, the existing models are still deficient in detail feature capture capability, multi-layer feature correlation, and multi-scale target adaptability, making it challenging to realize high-precision real-time detection in complex scenes. This paper proposes an improved classroom behavior detection algorithm, YOLO-AMM, to solve these problems. …”
Get full text
Article