Search alternatives:
method » methods (Expand Search)
Showing 621 - 640 results of 8,230 for search 'Optimal detection method', query time: 0.21s Refine Results
  1. 621

    Defect R-CNN: A Novel High-Precision Method for CT Image Defect Detection by Zirou Jiang, Jintao Fu, Tianchen Zeng, Renjie Liu, Peng Cong, Jichen Miao, Yuewen Sun

    Published 2025-04-01
    “…The inference speed reaches 76.2 frames per second (FPS), representing an optimal balance between accuracy and efficiency. This study demonstrates that Defect R-CNN offers a robust and reliable approach for industrial scenarios that require high-precision and real-time defect detection.…”
    Get full text
    Article
  2. 622
  3. 623

    Acoustic emission detection and defect identification method for micro-leakage in natural gas pipeline valves by Lizhen ZHANG, Wen'ao WANG

    Published 2024-06-01
    “…To this end, it is imperative to develop an effective method for detecting and identifying micro-leakage defects. …”
    Get full text
    Article
  4. 624

    DART–Triple Quadrupole Mass Spectrometry Method for Multi-Target and Fast Detection of Adulterants in Saffron by Linda Monaci, Anna Luparelli, William Matteo Schirinzi, Laura Quintieri, Alexandre Verdu

    Published 2025-05-01
    “…<b>Background</b>: Different methods have been developed for detecting saffron adulteration. …”
    Get full text
    Article
  5. 625

    Detection of network anomaly based on hybrid intelligence techniques by Shahbaa Khaleel, Karam mahdi saleh

    Published 2012-12-01
    “…This research focuses on finding out how to make an Intrusion Detection Systems environment learn the preferences and work practices of a security officer, In this research hybrid intelligence system is designed and developed for network intrusion detection, where the research was presented four methods for network anomaly detection using clustering technology and dependence on artificial intelligence techniques, which include a Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) to develop and improve the performance of intrusion detection system. …”
    Get full text
    Article
  6. 626

    Methods for the detection of tumor-specific single nucleotide somatic mutations in plasma cDNA samples by L. M. Dyakov, O. M. Krivtsova, P. A. Khesina, I. F. Kustova, N. A. Dyakova, N. S. Muge, N. E. Kudashkin, Yu. I. Patyutko, N. L. Lazarevich

    Published 2022-10-01
    “…Liquid biopsy is considered as a minimally invasive method of molecular genetic analysis that can be used for early diagnosis, prognosis of disease development, monitoring of residual disease or treatment outcomes, and selection of optimal drug therapy schemes for a patient. …”
    Get full text
    Article
  7. 627
  8. 628

    Preparation of carbon dots from Folium nelumbinis and their application in the detection of food carmine by HE Li, LI Jiaxin, HU Chengna, FENG Xiangxin, FENG Tinging

    Published 2024-11-01
    “…ObjectiveTo establish a fast, sensitive, and accurate method for detecting carmine.MethodsUsing Folium Nelumbinis; as the carbon source, carbon dots (FN-CDs) were prepared using a solvent thermal method, and the preparation conditions were optimized using a single factor test. …”
    Get full text
    Article
  9. 629

    Hybrid quantum enhanced federated learning for cyber attack detection by G. Subramanian, M. Chinnadurai

    Published 2024-12-01
    “…The centralized approach is developed by integrating spatio-temporal attention network and also introduces a quantum inspired federated averaging optimization procedure for cyber-attack detection. The presented model utilizes a hierarchical model aggregation procedure which dynamically groups nodes into regions based on the network condition and data similarity. …”
    Get full text
    Article
  10. 630
  11. 631

    A New Damage Detection Method: Big Bang-Big Crunch (BB-BC) Algorithm by Zahra Tabrizian, Ehsan Afshari, Gholamreza Ghodrati Amiri, Morteza Hossein Ali Beigy, Seyed Mohammad Pourhoseini Nejad

    Published 2013-01-01
    “…This work shows that BB-BC optimization method is a feasible methodology to detect damage location and severity while introducing numerous advantages compared to referred method.…”
    Get full text
    Article
  12. 632

    Integrated Sensing and Communication Target Detection Framework and Waveform Design Method Based on Information Theory by Qilong Miao, Xiaofeng Shen, Chenfei Xie, Yong Gao, Lu Chen

    Published 2025-01-01
    “…This method utilizes the minorization-maximization (MM) algorithm framework and semidefinite relaxation (SDR) technique to transform the non-convex optimization problem into an iterative convex optimization problem for resolution. …”
    Get full text
    Article
  13. 633

    A Novel Distributed Online Anomaly Detection Method in Resource-Constrained Wireless Sensor Networks by Zhiguo Ding, Haikuan Wang, Minrui Fei, Dajun Du

    Published 2015-10-01
    “…In this paper, a novel distributed online anomaly detection method in resource-constrained WSNs was proposed. …”
    Get full text
    Article
  14. 634

    Detection Method for Safety Helmet Wearing on Construction Sites Based on UAV Images and YOLOv8 by Xin Jiao, Cheng Li, Xin Zhang, Jian Fan, Zhenwei Cai, Zhenglong Zhou, Ying Wang

    Published 2025-01-01
    “…To address these issues, this study proposes a helmet detection method based on unmanned aerial vehicles (UAVs) and the YOLOv8 object detection algorithm. …”
    Get full text
    Article
  15. 635

    Enhancing Fault Detection in AUV-Integrated Navigation Systems: Analytical Models and Deep Learning Methods by Huibao Yang, Bangshuai Li, Xiujing Gao, Bo Xiao, Hongwu Huang

    Published 2025-06-01
    “…Furthermore, to improve the detection of gradual faults, artificial intelligence-based fault detection methods were also explored. …”
    Get full text
    Article
  16. 636

    Spectrophotometric and cloud point extraction methods to detect Quercetin Dihydrate in supplement formulations and urine samples by Sadeem Subhi Abed, Mayasa Mansour Mohammed

    Published 2024-10-01
    “…The CPE method significantly improved the sensitivity of QRC detection, reducing the LOD from 0.0351 μg/mL (without CPE) to 0.0234 μg/mL (with CPE). …”
    Get full text
    Article
  17. 637

    Detection of Salmonella and several common Salmonella serotypes in food by loop-mediated isothermal amplification method by Zhongqiang Chen, Ke Zhang, Huan Yin, Qi Li, Lan Wang, Zhiguo Liu

    Published 2015-06-01
    “…The results show that LAMP is a rapid, sensitive and specific method for Salmonella detection and can be used for the rapid detection of Salmonella in food.…”
    Get full text
    Article
  18. 638
  19. 639
  20. 640

    A visual SLAM loop closure detection method based on lightweight siamese capsule network by Yuhan Zhou, Mingli Sun

    Published 2025-03-01
    “…Abstract Loop closure detection is a key module in visual SLAM. During the robot’s movement, the cumulative error of the robot is reduced by the loop closure detection method, which can provide constraints for the back-end pose optimization, and the SLAM system can build an accurate map. …”
    Get full text
    Article