Showing 21 - 40 results of 8,285 for search '(pattern OR patterns) detection', query time: 0.18s Refine Results
  1. 21
  2. 22

    Construction and application of march tests for pattern sensitive memory faults detection by V. N. Yarmolik, V. A. Levantsevich, D. V. Demenkovets, I. Mrozek

    Published 2021-03-01
    “…The mathematical models of their faults and the methods used for testing the most complex cases by classical march tests are investigated. Passive pattern sensitive faults (PNPSFk) are allocated, in which arbitrary k from N memory cells participate, where k << N, and N is the memory capacity in bits. …”
    Get full text
    Article
  3. 23

    Length of Polarization-Correlation Based on Speckle Pattern for Optical Coherent Detection by Longkun Zhang, Jianfeng Sun, Qian Xu, Weibiao Chen

    Published 2024-01-01
    “…A length of polarization-correlation (LPC) based on speckle pattern of the non-uniform spatial polarization distribution is proposed and measured by using the classical measurement method of the Stokes polarization parameters for optical coherent detection. …”
    Get full text
    Article
  4. 24

    Multiscale mobility patterns and the restriction of human movement by Juni Schindler, Jonathan Clarke, Mauricio Barahona

    Published 2023-10-01
    “…Furthermore, the flow communities in the fine-scale partition not only match well the UK travel to work areas but also capture mobility patterns beyond commuting to work. We also examine the evolution of mobility under lockdown and show that mobility first reverted towards fine-scale flow communities already found in the pre-lockdown data, and then expanded back towards coarser flow communities as restrictions were lifted. …”
    Get full text
    Article
  5. 25

    Accuracy of self-reported foot strike pattern detection among endurance runners by Heather K. Vincent, Kyle Coffey, Aiden Villasuso, Kevin R. Vincent, Sharareh Sharififar, Lydia Pezzullo, Ryan M. Nixon

    Published 2024-12-01
    “…Accurate foot strike pattern detection may help prevent running related injury (RRI) and facilitate gait modifications and shoe transitions. …”
    Get full text
    Article
  6. 26

    Effects of search intent on eye-movement patterns in a change detection task by Sangil Lee, Minho Lee, Hyeonggyu Park, Mun-Seon Chang, Ho-Wan Kwak

    Published 2015-08-01
    “…The goal of the present study was to examine whether intention type affects eye movement patterns in a change detection task In addition, we assessed whether the eye movement index could be used to identify human implicit intent. …”
    Get full text
    Article
  7. 27

    Detection and Tracking of MAVs Using a Rosette Scanning Pattern LiDAR by Sandor Gazdag, Tom Moller, Anita Keszler, Andras L. Majdik

    Published 2025-01-01
    “…In this study, we tackle this challenge, by using non-repetitive rosette scanning pattern LiDARs, particularly focusing on increasing the detection distance by leveraging the characteristics of the sensor. …”
    Get full text
    Article
  8. 28

    Traffic Pattern Analysis at Urban Intersections through Vehicle Detection in Aerial Imagery by R. Bahmanyar, J. Hellekes, M. Mühlhaus, V. Gstaiger, F. Kurz

    Published 2025-07-01
    “…This approach allows us to infer vehicle density, identify queuing patterns, and analyze traffic light cycles. Such analysis can assess the robustness of signal timing under different traffic flows and the factors that influence intersection performance. …”
    Get full text
    Article
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34

    Generate vector graphics of fine-grained pattern based on the Xception edge detection. by Anqi Chen, Yicui Peng, Meng Li, Hao Chen, Chang Liu, Jinrong Hu, Xiang Wen, Guo Huang

    Published 2025-01-01
    “…We firstly adopt appropriate pre-processing methods, improved adaptive median filtering(IAMF) and non-local mean for the two different types of Qiang embroidery patterns to reduce image noise. Then, the Xception algorithm based on convolutional neural networks(CNNs) is used for edge detection and extraction to generate vector graphics of the patterns. …”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    Optimization of Complex Cancer Morphology Detection Using the SIVQ Pattern Recognition Algorithm by Jason Hipp, Steven Christopher Smith, Jerome Cheng, Scott Arthur Tomlins, James Monaco, Anant Madabhushi, Lakshmi Priya Kunju, Ulysses J. Balis

    Published 2012-01-01
    “…Especially important is the determination of relative contributions of each key SIVQ matching parameter with respect to the algorithm’s overall detection performance. Herein, by combinatorial testing of SIVQ ring size, sub-ring number, and inter-ring wobble parameters, in the setting of a morphologically complex bladder cancer use case, we ascertain the relative contributions of each of these parameters towards overall detection optimization using urothelial carcinoma as a use case, providing an exemplar by which this algorithm and future histology-oriented pattern matching tools may be validated and subsequently, implemented broadly in other appropriate microscopic classification settings.…”
    Get full text
    Article
  18. 38

    Mining behavior pattern of mobile malware with convolutional neural network by Xin ZHANG, Weizhong QIANG, Yueming WU, Deqing ZOU, Hai JIN

    Published 2020-12-01
    “…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
    Get full text
    Article
  19. 39

    Repeated Web Page Visits and the Scanpath Theory: A Recurrent Pattern Detection Approach by Michael Burmester, Marcus Mast

    Published 2010-10-01
    “…With a recurrent temporal pattern detection technique, we examine additional aspects and expose scanpaths. …”
    Get full text
    Article
  20. 40

    Detecting Fraudulent Transactions for Different Patterns in Financial Networks Using Layer Weigthed GCN by Shaziya Islam, Gagan Raj Gupta, Apu Chakraborty, Santosh Singh, Anisha Soni, Chhavi Patle

    Published 2025-04-01
    “…The proposed approach integrates adaptive layer weighting, enabling the model to dynamically adjust the contribution of different GNN layers to better capture intricate transaction patterns. Additionally, the flexible architecture of LayerWeighted-GCN enhances its ability to model complex financial relationships, improving fraud detection accuracy and robustness. …”
    Get full text
    Article