Showing 341 - 360 results of 25,128 for search 'detection (process OR programs)', query time: 0.25s Refine Results
  1. 341
  2. 342
  3. 343

    An Inductive Logical Model with Exceptional Information for Error Detection and Correction in Large Knowledge Bases by Yan Wu, Xiao Lin, Haojie Lian, Zili Zhang

    Published 2025-06-01
    “…In this paper, an inductive logic programming with exceptional information (EILP) is proposed to automatically detect errors in large knowledge bases (KBs). …”
    Get full text
    Article
  4. 344
  5. 345

    Dim and Small Target Detection Based on Improved Bilateral Filtering and Gaussian Motion Probability Estimation by Fan Xiangsuo, Qin Wenlin, Feng Gaoshan, Huang Qingnan, Min Lei

    Published 2024-01-01
    “…In this paper, we present a dim and small target detection algorithm based on improved bilateral filtering and Gaussian motion probability estimation, aiming to improve the detection efficiency of the detection system. …”
    Get full text
    Article
  6. 346
  7. 347

    Construction and application of foundational models for intelligent processing of microseismic events in mines by Anye CAO, Maotao LI, Xu YANG, Yao YANG, Sen LI, Yaoqi LIU, Changbin WANG

    Published 2025-06-01
    “…Field application at a rockburst-prone coal face in Gansu Province confirmed the model’s engineering effectiveness, enabling fully automated processing from event detection to source localization (errors <50 ms) and mechanism inversion. …”
    Get full text
    Article
  8. 348
  9. 349
  10. 350
  11. 351

    Automated detection of wolf howls using audio spectrogram transformers by Nikolai Makarov, Andrey Savchenko, Iuliia Zemtsova, Maxim Novopoltsev, Andrey Poyarkov, Anastasia Viricheva, Maria Chistopolova, Alexander Nikol’skii, Jose A. Hernandez-Blanco

    Published 2025-07-01
    “…As a key participant in ecosystem processes, it also serves as a model for investigating social structure formation and ecological adaptation. …”
    Get full text
    Article
  12. 352
  13. 353

    METHOD OF IMAGE PROCESSING IN THE PROBLEM OF DETECTING MOVING OBJECTS IN OPTICAL-ELECTRONIC SURVEILLANCE SYSTEMS OF THERMAL IMAGING TYPE by E. I. Mikhnionok

    Published 2020-03-01
    “…The article considers the method of image processing proposed by the author in relation to the problem of automatic detection of moving objects in optoelectronic thermal imaging systems. …”
    Get full text
    Article
  14. 354
  15. 355
  16. 356

    Fault Detection and Identification for Nonlinear Process Based on Inertia-Based KEPCA and a New Combined Monitoring Index by Loubna El Fattahi, El Hassan Sbai

    Published 2021-01-01
    “…The proposed approaches have been applied to process fault detection and diagnosis for the well-known benchmark Tennessee Eastman process (TE). …”
    Get full text
    Article
  17. 357

    Cooperative Detection for Cell-Free Massive MIMO With Multiple Central Processing Units Under Backhaul Capacity Limitation by Faurdoir Ndimumahoro, Koji Ishibashi

    Published 2025-01-01
    “…Cell-free massive multiple-input multiple-output (CF-mMIMO) systems offer enhanced spectral efficiency (SE) and uniform coverage through cooperative baseband signal processing across geographically distributed, interconnected central processing units (CPUs). …”
    Get full text
    Article
  18. 358

    A Novel Approach to Method for the Detection of Optic Disc Location in Retinal Images using Image Processing Techniques by Kemal Adem, Mahmut Hekım, Onur Comert, Selim Demır

    Published 2016-11-01
    “…Biomedical image analysis used for which is applied to assist in clinical diagnosis processes, is one of the research areas that draw intense interest of scientists. …”
    Get full text
    Article
  19. 359
  20. 360

    Methods for semantic analysis of the state of the process of functioning of a system for detecting, preventing and eliminating the consequences of computer attacks by V. O. Shablya, S. A. Konovalenko, E. O. Orlov

    Published 2025-01-01
    “…The aim of the study is to determine the most effective method of semantic analysis of the state of the process of detection, prevention and elimination of consequences of computer attacks. …”
    Get full text
    Article