Showing 8,721 - 8,740 results of 25,128 for search 'detection (process OR programs)', query time: 0.34s Refine Results
  1. 8721

    A Tunnel Lining Line Identification Algorithm Based on Supervised Heatmap by Heng SONG, Yisheng ZHANG, Tianbao GENG, Dongjie WANG

    Published 2024-07-01
    “…Initially, during the two-stage training process, the keypoint detection phase aims to improve the CenterNet algorithm’s limited heatmap fitting capability for dense keypoints by incorporating a heatmap grid classification task. …”
    Get full text
    Article
  2. 8722
  3. 8723

    End-of-Line Quality Control Based on Mel-Frequency Spectrogram Analysis and Deep Learning by Jernej Mlinarič, Boštjan Pregelj, Gregor Dolanc

    Published 2025-07-01
    “…The proposed approach addresses these issues by learning discriminative patterns directly from raw sensor data and automating the classification process. The results confirm that this approach can reduce the need for human expert engagement during commissioning, eliminate redundant inspection steps, and improve fault detection consistency, offering significant production efficiency gains.…”
    Get full text
    Article
  4. 8724

    LiDAR-Based Optimized Normal Distribution Transform Localization on 3-D Map for Autonomous Navigation by Abhishek Thakur, P. Rajalakshmi

    Published 2024-01-01
    “…Autonomous navigation has become a topic of immense interest in robotics in recent years. Light detection and ranging (LiDAR) can perceive the environment in 3-D by creating the point cloud data that can be used in constructing a 3-D or high-definition (HD) map. …”
    Get full text
    Article
  5. 8725
  6. 8726

    Análisis del proceso de digitalización de un centro de Enseñanza Secundaria desde el modelo DigCompOrg / Analysis of the digitization process of a Secondary School from the DigComp... by Ángel David Fernández-Miravete, Mª Paz Prendes-Espinosa

    Published 2021-06-01
    “…This first stage of detection of needs has allowed the center to establish a self-reflection and self-evaluation process on its digitization process, as well as the proposal of actions and improvement strategies that reinforce its commitment to digital pedagogies. …”
    Article
  7. 8727

    An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images by S. Nagadevi, G. Abirami, R. Brindha, T. Prabhakara Rao, Gyanendra Prasad Joshi, Woong Cho

    Published 2025-07-01
    “…Deep learning (DL) methods are essential for processing security problems in UAV networks. This paper presents a Privacy-Preserving Intrusion Detection Model for UAV-Based Remote Sensing Applications in Land Cover Classification Using Multilevel Fusion Feature Engineering (IDUAVRS-LCCMFFE) technique. …”
    Get full text
    Article
  8. 8728

    An Efficient Algorithm for Finding a Threshold of Useful Signals in the Analysis of Magnetic and Eddy Current Defectograms by Egor V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin

    Published 2018-08-01
    “…The analysis means a process of determining the presence of defective sections along with identifying structural elements of railway tracks on defectograms. …”
    Get full text
    Article
  9. 8729

    Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication by J. K. Periasamy, S. Prabhakar, A. Vanathi, Liu Yu

    Published 2025-08-01
    “…The proposed SALIGP method leverages Genetic Programming and a Geometric Approach, integrating Bloom Filters for efficient duplication detection. …”
    Get full text
    Article
  10. 8730

    Secure federated distillation GAN for CIDS in industrial CPS by Junwei LIANG, Geng YANG, Maode MA, Sadiq Muhammad

    Published 2023-12-01
    “…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
    Get full text
    Article
  11. 8731

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  12. 8732
  13. 8733

    NARX Neural Network for Safe Human–Robot Collaboration Using Only Joint Position Sensor by Abdel-Nasser Sharkawy, Mustafa M. Ali

    Published 2022-10-01
    “…<i>Methods</i>: In this manuscript, a nonlinear autoregressive model with an exog-enous inputs neural network (NARXNN) is developed for the detection of collisions between a manipulator and human. …”
    Get full text
    Article
  14. 8734

    Active Heat Method with Distribution Fiber Temperature Sensing for Suspension Location of Submarine Power Cable by ZHANG Weichao, ZHANG Li yong

    Published 2020-06-01
    “…In order to solve the problem that it is difficult to detect submarine power cables suspended in the sea, an active heat method is proposed to detect and locate suspended cable in the sea with distribution optical fiber temperature sensing technology. …”
    Get full text
    Article
  15. 8735
  16. 8736

    Rock mass integrity evaluation method of roadway surrounding rock mass based on borehole image acoustic radar data by Wang Jinchao, Han Zengqiang, Wang Chao, Zhang Guohua, Li Xiaobin

    Published 2025-07-01
    “…Abstract The integrity of the roadway surrounding rock is directly related to the safety and stability of the mine, and it is of great significance to carry out a rapid evaluation method for the surrounding rock integrity of the coal mine roadway during the construction process. In response to the limitation of traditional borehole rock integrity evaluation methods on borehole wall images, this paper proposes a coal mine roadway rock integrity evaluation method based on borehole image-acoustic-radar data, utilizing the unique advantages of borehole image, acoustic scanning, and radar detection technologies in-situ. …”
    Get full text
    Article
  17. 8737
  18. 8738

    Uncertainty CNNs: A path to enhanced medical image classification performance by Vasileios E. Papageorgiou, Georgios Petmezas, Pantelis Dogoulis, Maxime Cordy, Nicos Maglaveras

    Published 2025-02-01
    “…The automated detection of tumors using medical imaging data has garnered significant attention over the past decade due to the critical need for early and accurate diagnoses. …”
    Get full text
    Article
  19. 8739

    Advanced Segmentation of Gastrointestinal (GI) Cancer Disease Using a Novel U-MaskNet Model by Aditya Pal, Hari Mohan Rai, Mohamed Ben Haj Frej, Abdul Razaque

    Published 2024-11-01
    “…Consequently, the developed model increased the accuracy and reliability in detecting and segmenting GI cancer, and it was proven that the proposed model can potentially be used for improving the diagnostic process and, consequently, patient care in the clinical environment. …”
    Get full text
    Article
  20. 8740

    Optimization of Dust Spray Parameters for Simulated LiDAR Sensor Contamination in Autonomous Vehicles Using a Face-Centered Composite Design by Sungho Son, Hyunmi Lee, Jiwoong Yang, Jungki Lee, Jeongah Jang, Charyung Kim, Joonho Jun, Hyungwon Park, Sunyoung Park, Woongsu Lee

    Published 2025-08-01
    “…Light detection and ranging (LiDAR) provides three-dimensional environmental information that is critical for maintaining the safety and reliability of autonomous driving systems. …”
    Get full text
    Article