Showing 2,301 - 2,320 results of 25,128 for search 'detection (process OR programs)', query time: 0.29s Refine Results
  1. 2301

    Significance of transvaginal Doppler ultrasonography for detection of malignant gestational trophoblastic disease by Nikolić Branka, Rakić Snežana, Pavlović Dejan, Popovac Svetlana, Lukić Relja

    Published 2005-01-01
    “…Resistance Index (RI) values were measured at the level of blood vessels of peritrophoblastic tissue and of suspected zones in the uterine tissue to detect neovascularization, which followed the malignant process. …”
    Get full text
    Article
  2. 2302

    Imaginary latent variables: Empirical testing for detecting deficiency in reflective measures by Marco Vassallo

    Published 2024-11-01
    “…This rationale is based on the theory of complex numbers used in the measurement process of common factor model–based structural equation modeling. …”
    Get full text
    Article
  3. 2303

    Fault detection and diagnosis method for heterogeneous wireless network based on GAN by Xiaorong ZHU, Peipei ZHANG

    Published 2020-08-01
    “…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
    Get full text
    Article
  4. 2304

    Fast detection method for IC card data integrity protection mechanism by Tang Zhongze, Huang Xiaopeng, Liu Qi

    Published 2025-05-01
    “…An improved power-off-testing theory is proposed aiming at the limitations and shortcomings of traditional single-command power-off detection methods, to detect and verify IC card transaction protection mechanism during data recovery process. …”
    Get full text
    Article
  5. 2305

    On detection of crack-like welding defects by existing quality control methods by V. A. Peredelsky, V. Y. Harchenko, A. I. Chernogorov, S. V. Tihinov

    Published 2021-04-01
    “…Welding defects were detected by standard quality control methods prescribed by the SPD and GOST standards.Results. …”
    Get full text
    Article
  6. 2306

    Parametric Design of Steel Ball Automatic Detection System Based on VB by ZHAO Yanling, WANG Qiyu, BAO Yudong, PAN Chengyi, ZHAO Zhiqiang

    Published 2020-10-01
    “…Firstly, establishing the template model library of steel ball automatic detection system, and the library is divided into general parts model library and key parts design library through analyzing the function structure, using SolidWorks part design table function realizes parametric design of key components; Calling the model library to complete the establishment of detection system virtual assembly model, and using SolidWorks macro function to make the driver program of key parts and assembly model,Finally, the simulation technology is used to simulate the process of steel ball, and the correctness of the theoretical analysis results is verified Finally, the parametric design method of automatic detection system of steel ball is put forward…”
    Get full text
    Article
  7. 2307

    Leveraging edge learning and game theory for intrusion detection in Internet of things by Haoran LIANG, Jun WU, Chengcheng ZHAO, Jianhua LI

    Published 2021-06-01
    “…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
    Get full text
    Article
  8. 2308

    Fault detection and diagnosis method for heterogeneous wireless network based on GAN by Xiaorong ZHU, Peipei ZHANG

    Published 2020-08-01
    “…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
    Get full text
    Article
  9. 2309

    Strategy optimization method based on UAVs-assisted detection of covert communication by Xiaohan Wang, Wen Tian, Guangjie Liu, Yuwei Dai

    Published 2025-08-01
    “…Specifically, the UAV actively transmitsnoise to Alice’s transmission channels to disrupt covert transmission whenWillie detects a covert communication transmission. Furthermore, we ana-lyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditionsfor the existence of a Nash equilibrium, and formulate optimal strategiesfor both sides.…”
    Get full text
    Article
  10. 2310

    Multiresolution Rotational Symmetry Detection via Radius-Based Frieze-Expansion by Gang Pan, Di Sun, Yarui Chen, Chuanlei Zhang

    Published 2016-01-01
    “…Multiresolution pyramid is used to accelerate this detection process. We also discuss a solution to deal with rotational symmetry detection under slight affine transformation. …”
    Get full text
    Article
  11. 2311
  12. 2312

    A comprehensive literature review on ransomware detection using deep learning by Er. Kritika

    Published 2025-12-01
    “…The paper delves into providing the literature review on ransomware detection using deep learning techniques.…”
    Get full text
    Article
  13. 2313

    OFDM-NOMA Error Rate Reduction Using Direct Data Detection by Tasneem Assaf, Arafat Al-Dweik, Anshul Pandey, Jean-Pierre Giacalone

    Published 2025-01-01
    “…Therefore, this article proposes an integrated <inline-formula> <tex-math notation="LaTeX">$D^{3}$ </tex-math></inline-formula>-NOMA where the channel state information estimation (CSIE), equalization, and detection are consolidated into one unified process. …”
    Get full text
    Article
  14. 2314
  15. 2315
  16. 2316
  17. 2317

    A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans by Jonathan Cruz, Jason Hamlet

    Published 2025-01-01
    “…The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs. …”
    Get full text
    Article
  18. 2318

    Efficient and real-time lane detection using CUDA-based implementation by El Boussaki Hoda, Latif Rachid, Saddik Amine

    Published 2024-01-01
    “…Median filtering is an essential pre-processing step for reducing noise and improving lane detection accuracy. …”
    Get full text
    Article
  19. 2319

    Background dictionary construction-based sparse representation hyperspectral target detection by Tao Yang, Lin Feipeng, Yang Wen, Weng Shan

    Published 2022-01-01
    “…Aiming at the existing target detection algorithms based on sparse representation, in the process of building the background dictionary with concentric double windows, the target pixels will interfere with the background dictionary. …”
    Get full text
    Article
  20. 2320

    Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection by Alebachew Chiche, Million Meshesha

    Published 2021-01-01
    “…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
    Get full text
    Article