Showing 1,941 - 1,960 results of 25,128 for search 'detection (process OR programs)', query time: 0.29s Refine Results
  1. 1941
  2. 1942

    Cross-language refactoring detection method based on edit sequence by Tao LI, Dongwen ZHANG, Yang ZHANG, Kun ZHENG

    Published 2024-12-01
    “…The research results realize cross-language refactoring detection and effectively compensate for the defect of unreliable commit messages, which provides some reference for the detection of other programming languages and refactoring types.…”
    Get full text
    Article
  3. 1943
  4. 1944
  5. 1945

    On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code by Yury V. Kosolapov

    Published 2020-06-01
    “…An algorithm and a system for detecting abnormal code execution are proposed. The work carried out experiments in the case when P is the FireFox browser. …”
    Get full text
    Article
  6. 1946
  7. 1947
  8. 1948

    TEST DETERMINATION OF PROBABILITY OF AIRBORNE DETECTION OF GROUND SURFACE OBJECTS by S. V. Nikolaev

    Published 2017-11-01
    “…The relative discrepancy between the indicators obtained in the flight experiment and calculated by the developed program is less than 5%.The author proposes new private efficiency indicators for the visual detection task of typical ground objects. …”
    Get full text
    Article
  9. 1949

    Burden of pulmonary tuberculosis and challenges related to tuberculosis detection in Ethiopia by Letebrhan Weldemhret

    Published 2023-05-01
    “…The need for rapid, accurate and affordable methods for TB management should be considered by policy makers to improve TB detection rate and reduction of TB related deaths in line with the stop TB strategy by 2030 in Ethiopia. …”
    Get full text
    Article
  10. 1950

    Exploit detection based on illegal control flow transfers identification by Ming-hua WANG, Ling-yun YING, Deng-guo FENG

    Published 2014-09-01
    “…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
    Get full text
    Article
  11. 1951
  12. 1952

    An Improved Generalized Flexibility Sensitivity Method for Structural Damage Detection by NIU Zirong, WU Feng, HAN Zhaolong, ZHUO Yang, CHE Ailan, ZHU Hongbo

    Published 2025-04-01
    “…Then, the resulting nonlinear damage detection equations are solved using sequential quadratic programming method, whose calculation is simple and efficient. …”
    Get full text
    Article
  13. 1953
  14. 1954
  15. 1955
  16. 1956

    Anomaly detection research using Isolation Forest in Machine Learning by A. S. Kechedzhiev, O. L. Tsvetkova

    Published 2024-04-01
    “…The study is devoted to assessing the applicability of the Isolation Forest method in the task of detecting anomalies in network traffic data characterized by insufficient markup. …”
    Get full text
    Article
  17. 1957
  18. 1958
  19. 1959

    DAGAN-Based Gait Features Augmentation for Ankle Instability Detection by Xin Liu, Yao Zhang, Yuwei Jiao, Bin Zheng, Qinwei Guo, Yuanyuan Yu, Aziguli Wulamu

    Published 2025-01-01
    “…We developed a computer-aided program for the diagnosis of ankle ligament injury. …”
    Get full text
    Article
  20. 1960

    Evaluating Flood Damages using Land Cover Changes Detection by P. Raeva, S. Katsarska-Filipova, D. Filipov

    Published 2025-05-01
    “…The methodology integrates Sentinel-1 SAR and Sentinel-2 optical satellite imagery with open-access data from Bulgarian institutions, processed using open-source software platforms. Flooded areas and shifts in land use were mapped using computed optical indices and SAR backscatter change detection. …”
    Get full text
    Article