Showing 2,321 - 2,340 results of 25,128 for search 'detection (process OR programs)', query time: 0.27s Refine Results
  1. 2321
  2. 2322
  3. 2323

    Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks by Kobozeva A.A., Grigorenko S.N.

    Published 2016-08-01
    “…The method is intended for clone detection areas and pre-image in terms of additional disturbing influences in the image after the cloning operation for "masking" of the results, which complicates the search process. …”
    Get full text
    Article
  4. 2324

    Small parallel residual convolutional neural network and traffic congestion detection by Shan Jiang, Yuming Feng

    Published 2025-04-01
    “…Abstract In the development process of modern cities, traffic congestion has become an increasingly severe challenge. …”
    Get full text
    Article
  5. 2325

    Detection of Attacks in Network Traffic with the Autoencoder-Based Unsupervised Learning Method by Yalçın Özkan

    Published 2022-12-01
    “…It is observed that supervised learning methods lead to difficulties and cost increases in the detection of cyber-attacks and the labeling process. …”
    Get full text
    Article
  6. 2326

    Music Rhythm Detection Algorithm Based on Multipath Search and Cluster Analysis by Shuqing Ma

    Published 2021-01-01
    “…Music rhythm detection and tracking is an important part of the music comprehension system and visualization system. …”
    Get full text
    Article
  7. 2327

    BN-SNN: Spiking neural networks with bistable neurons for object detection. by Siddiqui Muhammad Yasir, Hyun Kim

    Published 2025-01-01
    “…Additionally, the application of SNNs in object detection tasks remains largely under-explored. In this study, we propose a novel approach utilizing a bistable integrate-and-fire (BIF) neuron model integrated with a single-shot multibox detector (SSD) as the detection head. …”
    Get full text
    Article
  8. 2328

    HTAD: a human-in-the-loop framework for supervised chromatin domain detection by Wei Shen, Ping Zhang, Yiwei Jiang, Hailin Tao, Zhike Zi, Li Li

    Published 2024-12-01
    “…HTAD begins with feature extraction for potential TAD border pairs, followed by an interactive labeling process through active learning. Performance assessments using public curation and synthetic datasets demonstrate HTAD’s superiority over other state-of-the-art methods and reveal highly hierarchical TAD structures, offering a human-in-the-loop solution for detecting complex genomic patterns.…”
    Get full text
    Article
  9. 2329

    YOLOGX: an improved forest fire detection algorithm based on YOLOv8 by Caixiong Li, Yue Du, Xing Zhang, Peng Wu

    Published 2025-01-01
    “…Finally, the proposed Focal-SIoU loss function replaces the original loss function, effectively reducing directional errors by combining angle, distance, shape, and IoU losses, thus optimizing the model training process. YOLOGX was evaluated on the D-Fire dataset, achieving a mAP@0.5 of 80.92% and a detection speed of 115 FPS, surpassing most existing classical detection algorithms and specialized fire detection models. …”
    Get full text
    Article
  10. 2330

    Lateral Change Detection of Ghezlozan River Channel from 1993 to 2013 by fariba Esfandiary Darabad, Masoud Rahimi, khodadad lotfy, ebadi elhameh

    Published 2020-06-01
    “…The channel duct was divided into 24 transects based on morphology and the process of change. The average migration rate of the Gezelozan River duct has been around 4.47 m / year over the past 20 years. …”
    Get full text
    Article
  11. 2331

    Modeling of Preload Bolted Flange Connection Structure for Loosening Analysis and Detection by Weicheng Sun, Zhenqun Guan, Yan Chen, Jiacheng Pan, Yan Zeng

    Published 2022-01-01
    “…A fine hexahedral mesh model of the bolt is used to predict the dynamic response of the structure accurately. The tightening process, which is ignored in the traditional I-shaped simplified model of bolted flange connection structure, can be simulated well based on the proposed model. …”
    Get full text
    Article
  12. 2332

    Target Detection Technology of Mechanical, Electrical, and Plumbing Components Based on CV by Guohua Wei, Ding Zhou, Xiaojun Yuan

    Published 2025-03-01
    “…The proposed architecture addresses the limitations of existing techniques in handling MEP complexities, and through an automatic comparison and verification process, it detects deviations promptly, ensuring adherence to design specifications. …”
    Get full text
    Article
  13. 2333

    Research Status and Prospect of Torsional Vibration Detection Methods for Rotating Machinery by GUO Yan-ling, QIU Feng, LI Zhi-peng

    Published 2021-12-01
    “…In recent years, the number of large units accidents caused by torsional vibration is increasing. Therefore, how to detect torsional vibration has become a major focus in the machinery increasing.The process of torsional vibration of detection method can be divided into two steps: the measurement of torsional vibration signals and the extraction and analysis of torsional vibration signal. …”
    Get full text
    Article
  14. 2334

    Deep learning for malignant lymph node segmentation and detection: a review by Wenxia Wu, Adrien Laville, Eric Deutsch, Roger Sun

    Published 2025-04-01
    “…This paper provides an in-depth review of the advancements in deep learning for malignant lymph node segmentation and detection. After a brief overview of deep learning methodologies, the review examines specific models and their outcomes for malignant lymph node segmentation and detection across five clinical sites: head and neck, upper extremity, chest, abdomen, and pelvis. …”
    Get full text
    Article
  15. 2335

    Induction Machine Bearing Fault Detection Using Empirical Wavelet Transform by Ricardo Lopez-Gutierrez, Jose de Jesus Rangel-Magdaleno, Carlos Javier Morales-Perez, Arturo García-Perez

    Published 2022-01-01
    “…The detection of faults related to the optimal condition of induction motors is an important task to avoid the malfunction or loss of the motor, thus avoiding high repair or replacement costs and faults in the efficiency of the process to which they belong. …”
    Get full text
    Article
  16. 2336

    The Case of a Primary Tuberculosis Complex in a Child With Late Detection by Irina Yu. Petrakova, Marina F. Gubkina, Yury S. Berezovsky, Mamed A. Bagirov, Bagirov V. Yukhimenko

    Published 2018-01-01
    “…We present a case of late detection and course of the primary tuberculosis complex in a child who was previously in an unknown contact with a tuberculosis patient at the first year of life. …”
    Get full text
    Article
  17. 2337

    Detection of grains in aluminium metal matrix composites using image fusion by Tapasmini Sahoo, Sweta Rani Biswal, Kunal Kumar Das

    Published 2025-06-01
    “…This piece of work illustrates an image fusion approach using discrete wavelet transform (DWT) for the detection of grains present in the hybrid composite to study the metallographic characterization. …”
    Get full text
    Article
  18. 2338

    Dual Feature-Based Intrusion Detection System for IoT Network Security by A. Biju, S. Wilfred Franklin

    Published 2025-03-01
    “…The proposed method utilizes the bald eagle search (BES) algorithm and butterfly optimization algorithm (BOA) to capture both flow and packet level features to enhance the accuracy of the intrusion detection process. Moreover, a multi-head attention-based bidirectional gated recurrent unit (MHA-BiGRU) is utilized to classify Attack and Non-Attack classes with high precision. …”
    Get full text
    Article
  19. 2339

    Early Heart Attack Detection Using Hybrid Deep Learning Techniques by Niga Amanj Hussain, Aree Ali Mohammed

    Published 2025-04-01
    “…These algorithms can process large datasets, extracting valuable insights that help mitigate the risk of fatal outcomes. …”
    Get full text
    Article
  20. 2340

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article