Search alternatives:
flow » low (Expand Search)
Showing 61 - 80 results of 455 for search 'flow detection algorithm', query time: 0.08s Refine Results
  1. 61

    High resolution weld semantic defect detection algorithm based on integrated double U structure by Xiaoyan Li, Yi Wei, Zhigang Lv, Peng Wang, Liangliang Li, Mengyu Sun, Chu Wang

    Published 2025-05-01
    “…In this study, a high-resolution semantic segmentation algorithm based on a double U-shaped network was proposed to meet the requirements of pressure vessel weld defect detection, and accurate detection was realized through innovative three-stage processing flow. …”
    Get full text
    Article
  2. 62

    Continuous Wavelet Transform-Based Method for High-Sensitivity Detection of Image Signals of Fluorescence Lateral Flow Assay by Tao Zhang, Xiaosong Wu, Qian Wang, Long Zhang, Zhigang Li, Yangyang Peng, Qian Bian, Hui Shi, Yong Liu, Shu Wang

    Published 2025-06-01
    “…Fluorescence lateral flow assays (FLFA) based on quantum dot probes have attracted significant attention in recent years due to their high sensitivity and quantitative detection capabilities. …”
    Get full text
    Article
  3. 63
  4. 64

    Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning. by Himanshi Babbar, Shalli Rani, Maha Driss

    Published 2024-01-01
    “…The proposed methodology aims to: (i) analyze statistical flow and compute entropy, and (ii) implement Machine Learning (ML) algorithms within SDN Intrusion Detection Systems for Internet of Things (IoT) environments. …”
    Get full text
    Article
  5. 65
  6. 66

    YOLOv8-DBW: An Improved YOLOv8-Based Algorithm for Maize Leaf Diseases and Pests Detection by Xiang Gan, Shukun Cao, Jin Wang, Yu Wang, Xu Hou

    Published 2025-07-01
    “…To solve the challenges of low detection accuracy of maize pests and diseases, complex detection models, and difficulty in deployment on mobile or embedded devices, an improved YOLOv8 algorithm was proposed. …”
    Get full text
    Article
  7. 67

    GCS-YOLO: A Lightweight Detection Algorithm for Grape Leaf Diseases Based on Improved YOLOv8 by Qiang Hu, Yunhua Zhang

    Published 2025-04-01
    “…In view of the issues of high complexity, significant computational resource consumption, and slow inference speed in the detection algorithm for grape leaf diseases, this paper proposes GCS-YOLO, a lightweight detection algorithm based on an improved YOLOv8. …”
    Get full text
    Article
  8. 68

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  9. 69

    Anomaly Detection Dataset for Industrial Control Systems by Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, Hans Hansson

    Published 2023-01-01
    “…Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. …”
    Get full text
    Article
  10. 70

    Method of Video-Measurements of Traffic Flow Characteristics at a Road Junction by Marina Yashina, Maria Belova, Alexey Mokhov

    Published 2020-09-01
    “…The automation of obtaining characteristics is based on the application of image recognition algorithms (virtual detection method).…”
    Get full text
    Article
  11. 71

    Moving Vehicle Detection and Tracking Based on Optical Flow Method and Immune Particle Filter under Complex Transportation Environments by Wei Sun, Min Sun, Xiaorui Zhang, Mian Li

    Published 2020-01-01
    “…To solve this problem, this paper proposes a kind of moving vehicle detection and tracking based on the optical flow method and immune particle filter algorithm. …”
    Get full text
    Article
  12. 72
  13. 73

    Noise Effects on Detection and Localization of Faults for Unified Power Flow Controller-Compensated Transmission Lines Using Traveling Waves by Javier Rodríguez-Herrejón, Enrique Reyes-Archundia, Jose A. Gutiérrez-Gnecchi, Marcos Gutiérrez-López, Juan C. Olivares-Rojas

    Published 2025-05-01
    “…This paper presents a comprehensive analysis of the effects of noise on the detection and localization of faults in transmission lines compensated with a unified power flow controller using traveling wave-based methods. …”
    Get full text
    Article
  14. 74

    An Immunology Inspired Flow Control Attack Detection Using Negative Selection with -Contiguous Bit Matching for Wireless Sensor Networks by Muhammad Zeeshan, Huma Javed, Amna Haider, Aumbareen Khan

    Published 2015-11-01
    “…This paper implemented an improved, decentralized, and customized version of the Negative Selection Algorithm (NSA) for data flow anomaly detection with learning capability. …”
    Get full text
    Article
  15. 75

    Outlier Traffic Flow Detection and Pattern Analysis Under Unplanned Disruptions: A Low-Rank Robust Decomposition Model by Zhipeng Duan

    Published 2025-01-01
    “…Outlier traffic flow detection under unplanned disruptions is vital for operational safety and management. …”
    Get full text
    Article
  16. 76

    Multi-keyword partial matching algorithm based on text fragments by LIAO Wei-qi, ZOU Wei

    Published 2010-01-01
    “…A novel multi-keyword partial matching algorithm was also de- signed and realized which could detect the fraction of keywords in data block without re-flow or re-file. …”
    Get full text
    Article
  17. 77

    Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short-Term Memory, and Autoencoder by Getahun Wassie Geremew, Jianguo Ding

    Published 2023-01-01
    “…The aim of this research is then to design a dynamic traffic classifier that can detect elephant flows to prevent network congestion. …”
    Get full text
    Article
  18. 78

    Development of Model for Traffic Flows on Urban Street and Road Network by D. V. Kapskiy, D. V. Navoy, P. A. Pegin

    Published 2019-02-01
    “…Innovation in the first-level model is an approach in determining conditions while detecting a fuzzy set without using a standard algorithm that is an algorithm of local flexible regulation. …”
    Get full text
    Article
  19. 79

    Policy conflict detection in software defined network by using deep learning by Chuanhuang LI, Cheng CHENG, Xiaoyong YUAN, Lijie CEN, Weiming WANG

    Published 2017-11-01
    “…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
    Get full text
    Article
  20. 80

    YOLO-AMM: A Real-Time Classroom Behavior Detection Algorithm Based on Multi-Dimensional Feature Optimization by Yi Cao, Qian Cao, Chengshan Qian, Deji Chen

    Published 2025-02-01
    “…However, the existing models are still deficient in detail feature capture capability, multi-layer feature correlation, and multi-scale target adaptability, making it challenging to realize high-precision real-time detection in complex scenes. This paper proposes an improved classroom behavior detection algorithm, YOLO-AMM, to solve these problems. …”
    Get full text
    Article