Showing 2,261 - 2,280 results of 25,128 for search 'detection (process OR programs)', query time: 0.32s Refine Results
  1. 2261

    Attention U-Net-based semantic segmentation for welding line detection by Hunor István Lukács, Bence Zsolt Beregi, Balázs Porteleki, Tamás Fischl, János Botzheim

    Published 2025-05-01
    “…Abstract In industrial processes, quality assurance through methods such as visual inspection is essential for ensuring process stability. …”
    Get full text
    Article
  2. 2262
  3. 2263

    eDNA‐Based Detection of Invasive Crayfish and Crayfish Plague in Estonia by Michael Oliewo Aluma, Katrin Kaldre, David A. Strand, Margo Hurt, Lilian Pukk

    Published 2025-05-01
    “…ABSTRACT In Estonia, three invasive North American crayfish species—Pacifastacus leniusculus, Faxonius limosus, and Procambarus virginalis—have been detected through the annual monitoring program. To protect Astacus astacus, the only native freshwater crayfish species in Estonia, rapid and effective conservation‐based management actions are necessary. …”
    Get full text
    Article
  4. 2264
  5. 2265

    Design of Display Software for Vehicle-mounted Catenary Detection Device on EMUs by LI Rui, YANG Wuzhou, RAO Tiangui

    Published 2019-01-01
    “…To this end, this paper presented a design of high-definition display software for EMU vehicle-mounted catenary detection device. It adopts the idea of modular design, separating the interface display and data communication, separating the video data processing and video display process. …”
    Get full text
    Article
  6. 2266

    A Deep Learning and Transfer Learning Approach for Vehicle Damage Detection by Lin Li, Koshin Ono, Chun-Kit Ngan

    Published 2021-04-01
    “…For insurance companies, it is very time-consuming and expensive to process claims for detecting and classifying vehicle damages; thus, deep learning techniques have been used to automate this process to reduce the time and the cost. …”
    Get full text
    Article
  7. 2267

    Application of Closed Reconstruction Method in Error Detection of RV Cycloidal Gear by Meng Tian, Tianxing Li, Yulong Li, Jinfan Li

    Published 2021-08-01
    “…Cycloidal gear adopts one-dimensional probe sampling mechanism when detecting on the gear measuring center. Due to the sensitive direction of one-dimensional probe is inconsistent with the definition direction of tooth profile normal error, the error calculation process is tedious, and even the error result is inaccurate, which can not truly reflect the machining shape of the actual tooth profile. …”
    Get full text
    Article
  8. 2268

    A Small Target Pedestrian Detection Model Based on Autonomous Driving by Yang Zhang, Shuaifeng Zhang, Dongrong Xin, Dewang Chen

    Published 2023-01-01
    “…To improve the accuracy of small-target pedestrian detection and the anti-interference ability of the model, a small-target pedestrian detection model that fuses residual networks and feature pyramids is proposed. …”
    Get full text
    Article
  9. 2269

    Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection by Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Fathi Amsaad, Ansagan Manasov, Salim Hariri, Banu B. Yergaliyeva, Aziz Alotaibi

    Published 2022-01-01
    “…The clickbait search process is accomplished by incorporating the binary search features for a faster and more efficient search process for malicious content-detection. …”
    Get full text
    Article
  10. 2270

    A Classification Data Packets Using the Threshold Method for Detection of DDoS by Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, Muhammad Nur Faiz, Arif Wirawan Muhammad, Santi Purwaningrum, Laura Sari

    Published 2024-06-01
    “…Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.…”
    Get full text
    Article
  11. 2271

    Dual-modal edible oil impurity dataset for weak feature detection by Huiyu Wang, Qianghua Chen, Jianding Zhao, Liwen Xu, Ming Li, Ying Zhao, Qinpei Zhao, Qin Lu

    Published 2024-12-01
    “…Abstract Edible oil may be mixed with tiny solid impurities like raw material fragments, hair, metal fragments and etc. during the production and manufacturing process. For food safety reasons, these tiny impurities need to be detected in the quality control process. …”
    Get full text
    Article
  12. 2272

    Proactive recognition and early detection in communities through targeted HIV screening by Mehdi Nejat, Hamid Reza Marateb, Mehrshad Alirezaei Farahani, Mohammad Zakaria Rajabi, Maryam Nasirian, Miguel Angel Mañanas, Mohammad Javad Tarrahi, Marjan Mansourian

    Published 2025-07-01
    “…In many resource-limited settings, early detection of HIV is hindered by stigma, limited access to testing, and low risk awareness. …”
    Get full text
    Article
  13. 2273

    Detection of prions in oocytes and ovaries of ewes naturally infected with classical scrapie by Paula A. Marco Lorente, Maialen Zinkunegi, Diego Sola, Nerea Larrañaga, Belén Marín, Bernardino Moreno, Juan J. Badiola, Rosa Bolea, Alicia Otero

    Published 2025-04-01
    “…Prion accumulation appears to be influenced by the host genotype and prion strain, emphasizing the need for ultrasensitive detection techniques. Further research under controlled conditions is necessary to elucidate the mechanisms and implications for disease control and breeding programs.…”
    Get full text
    Article
  14. 2274
  15. 2275

    Detect Windows Code Injection by Cross-validating Stack and VAD Information by ZHAI Jiqiang, HAN Xu, WANG Jiaqian, SUN Haixu, YANG Hailu

    Published 2024-04-01
    “…Then the data is combined with the process VAD structure to detect the function return address and match the file name to locate the injected code. …”
    Get full text
    Article
  16. 2276

    Spectral Information Divergence-Driven Diffusion Networks for Hyperspectral Target Detection by Jinfu Gong, Zhen Huang, Zhengye Yang, Xuezhuan Ding, Fanming Li

    Published 2025-04-01
    “…This method introduces an adaptive coarse detection module, which optimizes the coarse detection process in generative hyperspectral target detection, effectively reducing the background-target misclassification. …”
    Get full text
    Article
  17. 2277

    Identification and evaluation of the effective criteria for detection of congestion in a smart city by Anita Mohanty, Subrat Kumar Mohanty, Bhagyalaxmi Jena, Ambarish G. Mohapatra, Ahmed N. Rashid, Ashish Khanna, Deepak Gupta

    Published 2022-03-01
    “…This parameter is utilized in analytical hierarchy process to detect the highest priorities parameter and based on that the congestion is detected in particular lane. …”
    Get full text
    Article
  18. 2278

    Machine learning to detect melanoma exploiting nuclei morphology and Spatial organization by Giulia Veronesi, Nico Curti, Aldo Gardini, Giulia Querzoli, Gastone Castellani, Emi Dika

    Published 2025-07-01
    “…The images were first processed using a multi-resolution image processing pipeline with the aim of segmenting nuclei, evaluating their geometrical and morphological features, as well as their spatial organization. …”
    Get full text
    Article
  19. 2279

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  20. 2280

    Rumor detection model with weighted GraphSAGE focusing on node location by Manfu Ma, Cong Zhang, Yong Li, Jiahao Chen, Xuegang Wang

    Published 2024-11-01
    “…Traditional deep learning models ignore the relationship and topology between nodes in the rumor detection task and use fixed weights or mean aggregation strategies in the feature aggregation process, which fail to capture the complex interactions between nodes and the dynamics of information propagation, limiting the accuracy and robustness of the rumor detection model. …”
    Get full text
    Article