Suggested Topics within your search.
Suggested Topics within your search.
-
3181
LiDAR-Based Detection of Urban Trees Using a Backpack System
Published 2025-07-01Get full text
Article -
3182
Automated Caries Detection Under Dental Restorations and Braces Using Deep Learning
Published 2025-05-01“…This study proposes an innovative deep learning and image processing-based approach for automated caries detection under restoration and dental braces, aiming to reduce the clinical burden on dental practitioners. …”
Get full text
Article -
3183
Early Fault Detection in FOC Driven Induction Motors: A Case Study
Published 2024-01-01Get full text
Article -
3184
Detection of African swine fever virus in pork products brought to Taiwan by travellers
Published 2019-01-01Get full text
Article -
3185
Evaluating Machine Learning Algorithms for Financial Fraud Detection: Insights from Indonesia
Published 2025-02-01Get full text
Article -
3186
Interpretable Deep Learning for Pneumonia Detection Using Chest X-Ray Images
Published 2025-01-01Get full text
Article -
3187
-
3188
Ultra tough and high resilience mechanochromic fibres for real world stress detection
Published 2025-03-01Get full text
Article -
3189
Research on industrial control system intrusion detection method based on simulation modelling
Published 2017-07-01“…At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.…”
Get full text
Article -
3190
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
3191
MAGECODE: Machine-Generated Code Detection Method Using Large Language Models
Published 2024-01-01“…Consequently, various machine-generated text (MGT) detection methods, developed from metric-based and model-based approaches, were proposed and shown to be highly effective. …”
Get full text
Article -
3192
Accelerated active case detection of visceral leishmaniasis patients in endemic villages of Bangladesh.
Published 2014-01-01“…We recommend that the National VL Program should consider AACD to strengthen its early VL case detection strategy.…”
Get full text
Article -
3193
Intelligent vulnerability detection system based on graph structured source code slice
Published 2021-10-01“…For the intelligent vulnerability detection, the system extracts the graph structured source code slices according to the vulnerability characteristics from the program dependency graph of source code, and then presents the graph structured slice information to carry out vulnerability detection by using the graph neural network model.Slice level vulnerability detection was realized and the vulnerability line was located at the code line level.In order to verify the effectiveness of the system, compared with the static vulnerability detection systems, the vulnerability detection system based on serialized text information, and the vulnerability detection system based on graph structured information, the experimental results show that the proposed system has a high accuracy in the vulnerability detection capability and a good performance in the vulnerability code line prediction.…”
Get full text
Article -
3194
Biological markers of auditory gap detection in young, middle-aged, and older adults.
Published 2010-04-01Get full text
Article -
3195
Detection of Victimization Patterns and Risk of Gender Violence Through Machine Learning Algorithms
Published 2025-02-01Get full text
Article -
3196
Asumu Fractional Derivative Applied to Edge Detection on SARS-COV2 Images
Published 2022-01-01“…The experimental comparison show that the proposed method outperforms some edge detection methods. In the next paper, we are planning to improve and combine the proposed filters with artificial intelligence algorithm in order to program a training system for SARS-COV2 image classification with the aim of having a supplemental medical diagnostic.…”
Get full text
Article -
3197
A non-anatomical graph structure for boundary detection in continuous sign language
Published 2025-07-01“…More concretely, the content of each window is processed using the pre-trained model obtained from the first step and the class probabilities of the Fully Connected (FC) layer embedded in the Transformer model are fed to the post-processing module, which aims to detect the accurate boundary of the un-processed isolated signs. …”
Get full text
Article -
3198
A simultaneous EEG and eye-tracking dataset for remote sensing object detection
Published 2025-04-01“…This task reflects the typical cognitive processes associated with human visual search and object identification in remote sensing imagery. …”
Get full text
Article -
3199
Development of alternative models for early detection of religiously legitimated anarchism in Bali Province
Published 2022-05-01Get full text
Article -
3200
Single-Frame Infrared Target Detection Based on Fast Content-Related Modeling
Published 2025-01-01Get full text
Article