-
1
Influence of multilayered environment ON THE hydrocarbon deposits DETECTION process
Published 2019-06-01Get full text
Article -
2
Advancement of Fault Diagnosis and Detection Process in Industrial Machine Environment
Published 2019-09-01Get full text
Article -
3
Effects of Hybridizing the U-Net Neural Network in Traffic Lane Detection Process
Published 2025-07-01Get full text
Article -
4
-
5
-
6
Measurement-induced entanglement entropy of gravitational wave detections
Published 2025-09-01“…Coincident multiple detector operations make it possible to consider the bipartite measurement-induced entanglement, in the detection process, as a signature of non-classicality. …”
Get full text
Article -
7
Quantitative study of local defects by pulsed eddy current testing
Published 2024-12-01“…Analytical formulas are derived to describe the detection process, providing a foundation for subsequent error analysis. …”
Get full text
Article -
8
A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network
Published 2019-06-01“…Holes and edges detection process is performed by the sink node to reduce energy consumption of wireless sensor network nodes. …”
Get full text
Article -
9
Pengolahan Citra Berbasis Video Proccesing dengan Metode Frame Difference untuk Deteksi Gerak
Published 2024-06-01“…This method process is based on the difference between two consecutive frames in the video aimed at finding differences that occur during the detection process. When processed for detection, the absolute value in the pixel is greater than the predetermined threshold value, it will be considered as a moving object, so that the detection results from the motion detection process will form a box object on the moving object. …”
Get full text
Article -
10
A new Hybrid Metaheuristic Model for Image Edge Detection
Published 2025-04-01“…These techniques may have the potential to provide advanced capabilities to improve the image edge detection process. A metaheuristic model such as the Bat algorithm may offer appropriate parameters for the edge detection algorithm. …”
Get full text
Article -
11
A cooperative intrusion detection system for internet of things using fuzzy logic and ensemble of convolutional neural networks
Published 2025-05-01“…Abstract Intrusion detection in the Internet of Thing (IoT) faces several challenges, including scalability, attack diversity, and the need for components to cooperate in the threat detection process. Current approaches have failed to simultaneously address these challenges. …”
Get full text
Article -
12
Research on malicious behavior detection based on iOS system
Published 2017-02-01“…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
Get full text
Article -
13
Research on malicious behavior detection based on iOS system
Published 2017-02-01“…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
Get full text
Article -
14
Rapid video copy detection on compressed domain
Published 2009-01-01“…To reduce the detection time efficiency under large scale data environment, a rapid algorithm was proposed on compressed domain using a two-level hierarchical detection scheme.The ordinal measures of DCT coefficients were adopted as visual features for similarity-matching in order to reduce the computational load in video decoding.Inverted indexing structure was used to accelerate the first level detection process.The experiment results show, compared with the previous algorithm, the algorithm can improve the detection speed obviously with the similar detection precision.…”
Get full text
Article -
15
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01“…Moreover, the FDIA detection process is performed by modelling an improved deep belief network (IDBN) model. …”
Get full text
Article -
16
IMAGE SEGMENTATION FOR INDUSTRIAL QUALITY INSPECTION
Published 2012-05-01“…The contaminant detection process of an industrial product is an important stage of a modern production factory. …”
Get full text
Article -
17
Effect of Laser Distance Measurement for Fatigue Crack Detection on Aluminium Plate Using Laser Doppler Vibro-Meter
Published 2024-06-01“…The analyzed data shows that measuring the laser distance will influence the crack detection process. …”
Get full text
Article -
18
Empowering Retail Through Advanced Consumer Product Recognition Using Aquila Optimization Algorithm With Deep Learning
Published 2024-01-01“…To boost the complete product detection process, the ACPR-AOADL technique involves AOA based hyperparameter selection process. …”
Get full text
Article -
19
Shot boundary detection algorithm based on ORB
Published 2013-11-01“…An SBD algorithm based on ORB was proposed in order to effectively deal with these changes, in which shot boundary was located by computing the matching degree of ORB descriptor between adjacent images. In the detection process, the matching number and matching rate of the feature points were used to describe the characteristics of shot boundary, and the similarity degree curve was used to represent the relationship between image frames. …”
Get full text
Article -
20
Parallel Network Control Method on Auxiliary Power Supply System of Subway Train
Published 2019-07-01“…Aiming at the advantages and disadvantages of two kinds of power supply modes, i.e. extended power supply and grid power supply, the grid power supply mode was introduces, and the time-sharing start control algorithm of grid power supply of auxiliary converter, the control method of medium voltage contactor and the short circuit detection process were analyzed in detail.The application of the control algorithm in a metro train was stable, which indicated that the development of medium voltage AC grid power supply technology has been basically mature.…”
Get full text
Article