Showing 1 - 20 results of 301 for search '"detection process"', query time: 0.13s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Measurement-induced entanglement entropy of gravitational wave detections by Preston Jones, Quentin G. Bailey, Andri Gretarsson, Edward Poon

    Published 2025-09-01
    “…Coincident multiple detector operations make it possible to consider the bipartite measurement-induced entanglement, in the detection process, as a signature of non-classicality. …”
    Get full text
    Article
  7. 7

    Quantitative study of local defects by pulsed eddy current testing by Zhaoyang Li, Liang Dong

    Published 2024-12-01
    “…Analytical formulas are derived to describe the detection process, providing a foundation for subsequent error analysis. …”
    Get full text
    Article
  8. 8

    A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network by Mohammad Z Masoud, Yousef Jaradat, Ismael Jannoud, Mustafa A Al Sibahee

    Published 2019-06-01
    “…Holes and edges detection process is performed by the sink node to reduce energy consumption of wireless sensor network nodes. …”
    Get full text
    Article
  9. 9

    Pengolahan Citra Berbasis Video Proccesing dengan Metode Frame Difference untuk Deteksi Gerak by Yovi Apridiansyah, Ardi Wijaya, Pahrizal, Rozali Toyib, Arif Setiawan

    Published 2024-06-01
    “…This method process is based on the difference between two consecutive frames in the video aimed at finding differences that occur during the detection process. When processed for detection, the absolute value in the pixel is greater than the predetermined threshold value, it will be considered as a moving object, so that the detection results from the motion detection process will form a box object on the moving object. …”
    Get full text
    Article
  10. 10

    A new Hybrid Metaheuristic Model for Image Edge Detection by Adil Khalil, Adel Abed Al Wahaab, Ahmed Abbas

    Published 2025-04-01
    “…These techniques may have the potential to provide advanced capabilities to improve the image edge detection process. A metaheuristic model such as the Bat algorithm may offer appropriate parameters for the edge detection algorithm. …”
    Get full text
    Article
  11. 11

    A cooperative intrusion detection system for internet of things using fuzzy logic and ensemble of convolutional neural networks by Xiongwei Qiu, Lianzhi Shi, Pengtong Fan

    Published 2025-05-01
    “…Abstract Intrusion detection in the Internet of Thing (IoT) faces several challenges, including scalability, attack diversity, and the need for components to cooperate in the threat detection process. Current approaches have failed to simultaneously address these challenges. …”
    Get full text
    Article
  12. 12

    Research on malicious behavior detection based on iOS system by Yuliang WANG, Xiaodong CHEN, Tun WU

    Published 2017-02-01
    “…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
    Get full text
    Article
  13. 13

    Research on malicious behavior detection based on iOS system by Yuliang WANG, Xiaodong CHEN, Tun WU

    Published 2017-02-01
    “…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
    Get full text
    Article
  14. 14

    Rapid video copy detection on compressed domain by ZHANG Yong-dong, ZHANG Dong-ming, GUO Jun-bo, TANG Sheng

    Published 2009-01-01
    “…To reduce the detection time efficiency under large scale data environment, a rapid algorithm was proposed on compressed domain using a two-level hierarchical detection scheme.The ordinal measures of DCT coefficients were adopted as visual features for similarity-matching in order to reduce the computational load in video decoding.Inverted indexing structure was used to accelerate the first level detection process.The experiment results show, compared with the previous algorithm, the algorithm can improve the detection speed obviously with the similar detection precision.…”
    Get full text
    Article
  15. 15
  16. 16

    IMAGE SEGMENTATION FOR INDUSTRIAL QUALITY INSPECTION by Catalin Gh. AMZA, Gheorghe AMZA, Diana POPESCU

    Published 2012-05-01
    “…The contaminant detection process of an industrial product is an important stage of a modern production factory. …”
    Get full text
    Article
  17. 17
  18. 18

    Empowering Retail Through Advanced Consumer Product Recognition Using Aquila Optimization Algorithm With Deep Learning by Mohammed Alghamdi, Hanan Abdullah Mengash, Mohammed Aljebreen, Mohammed Maray, Abdulbasit A. Darem, Ahmed S. Salama

    Published 2024-01-01
    “…To boost the complete product detection process, the ACPR-AOADL technique involves AOA based hyperparameter selection process. …”
    Get full text
    Article
  19. 19

    Shot boundary detection algorithm based on ORB by Jiang-qi TANG, Lin-jiang XIE, Qing-sheng YUAN, Dong-ming ZHANG, Xiu-guo BAO, Wei Guo

    Published 2013-11-01
    “…An SBD algorithm based on ORB was proposed in order to effectively deal with these changes, in which shot boundary was located by computing the matching degree of ORB descriptor between adjacent images. In the detection process, the matching number and matching rate of the feature points were used to describe the characteristics of shot boundary, and the similarity degree curve was used to represent the relationship between image frames. …”
    Get full text
    Article
  20. 20

    Parallel Network Control Method on Auxiliary Power Supply System of Subway Train by Junjun SONG, Miaomiao DU, Wenyong GUO, Rushi LI, Hongxing ZHANG

    Published 2019-07-01
    “…Aiming at the advantages and disadvantages of two kinds of power supply modes, i.e. extended power supply and grid power supply, the grid power supply mode was introduces, and the time-sharing start control algorithm of grid power supply of auxiliary converter, the control method of medium voltage contactor and the short circuit detection process were analyzed in detail.The application of the control algorithm in a metro train was stable, which indicated that the development of medium voltage AC grid power supply technology has been basically mature.…”
    Get full text
    Article