Showing 3,181 - 3,200 results of 25,128 for search 'detection (process OR programs)', query time: 0.27s Refine Results
  1. 3181
  2. 3182

    Automated Caries Detection Under Dental Restorations and Braces Using Deep Learning by Yi-Cheng Mao, Yuan-Jin Lin, Jen-Peng Hu, Zi-Yu Liu, Shih-Lun Chen, Chiung-An Chen, Tsung-Yi Chen, Kuo-Chen Li, Liang-Hung Wang, Wei-Chen Tu, Patricia Angela R. Abu

    Published 2025-05-01
    “…This study proposes an innovative deep learning and image processing-based approach for automated caries detection under restoration and dental braces, aiming to reduce the clinical burden on dental practitioners. …”
    Get full text
    Article
  3. 3183
  4. 3184
  5. 3185
  6. 3186
  7. 3187
  8. 3188
  9. 3189

    Research on industrial control system intrusion detection method based on simulation modelling by Yi-wei GAO, Rui-kang ZHOU, Ying-xu LAI, Ke-feng FAN, Xiang-zhen YAO, Lin LI

    Published 2017-07-01
    “…At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.…”
    Get full text
    Article
  10. 3190

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    “…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
    Get full text
    Article
  11. 3191

    MAGECODE: Machine-Generated Code Detection Method Using Large Language Models by Hung Pham, Huyen Ha, van Tong, Dung Hoang, Duc Tran, Tuyen Ngoc Le

    Published 2024-01-01
    “…Consequently, various machine-generated text (MGT) detection methods, developed from metric-based and model-based approaches, were proposed and shown to be highly effective. …”
    Get full text
    Article
  12. 3192

    Accelerated active case detection of visceral leishmaniasis patients in endemic villages of Bangladesh. by Jahanara Khatun, M Mamun Huda, Md Shakhawat Hossain, Wolfgang Presber, Debashis Ghosh, Axel Kroeger, Greg Matlashewski, Dinesh Mondal

    Published 2014-01-01
    “…We recommend that the National VL Program should consider AACD to strengthen its early VL case detection strategy.…”
    Get full text
    Article
  13. 3193

    Intelligent vulnerability detection system based on graph structured source code slice by Deqing ZOU, Xiang LI, Minhuan HUANG, Xiang SONG, Hao LI, Weiming LI

    Published 2021-10-01
    “…For the intelligent vulnerability detection, the system extracts the graph structured source code slices according to the vulnerability characteristics from the program dependency graph of source code, and then presents the graph structured slice information to carry out vulnerability detection by using the graph neural network model.Slice level vulnerability detection was realized and the vulnerability line was located at the code line level.In order to verify the effectiveness of the system, compared with the static vulnerability detection systems, the vulnerability detection system based on serialized text information, and the vulnerability detection system based on graph structured information, the experimental results show that the proposed system has a high accuracy in the vulnerability detection capability and a good performance in the vulnerability code line prediction.…”
    Get full text
    Article
  14. 3194
  15. 3195
  16. 3196

    Asumu Fractional Derivative Applied to Edge Detection on SARS-COV2 Images by Gustavo Asumu Mboro Nchama, Leandro Daniel Lau Alfonso, Roberto Rodríguez Morales, Ezekiel Nnamere Aneke

    Published 2022-01-01
    “…The experimental comparison show that the proposed method outperforms some edge detection methods. In the next paper, we are planning to improve and combine the proposed filters with artificial intelligence algorithm in order to program a training system for SARS-COV2 image classification with the aim of having a supplemental medical diagnostic.…”
    Get full text
    Article
  17. 3197

    A non-anatomical graph structure for boundary detection in continuous sign language by Razieh Rastgoo, Kourosh Kiani, Sergio Escalera

    Published 2025-07-01
    “…More concretely, the content of each window is processed using the pre-trained model obtained from the first step and the class probabilities of the Fully Connected (FC) layer embedded in the Transformer model are fed to the post-processing module, which aims to detect the accurate boundary of the un-processed isolated signs. …”
    Get full text
    Article
  18. 3198

    A simultaneous EEG and eye-tracking dataset for remote sensing object detection by Bing He, Hongqiang Zhang, Tong Qin, Bowen Shi, Qiao Wang, Weihua Dong

    Published 2025-04-01
    “…This task reflects the typical cognitive processes associated with human visual search and object identification in remote sensing imagery. …”
    Get full text
    Article
  19. 3199
  20. 3200