Showing 1 - 20 results of 25,128 for search 'detection (process OR programs)', query time: 0.24s Refine Results
  1. 1

    Approach to Plagiarism Detection in Programming Assignments by Malek Algabri, Firdaus Alhrazi

    Published 2025-03-01
    Subjects: “…Index Terms Plagiarism Detection…”
    Get full text
    Article
  2. 2

    Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes by T. V. Zolotova, D. A. Volkova

    Published 2022-05-01
    Subjects: “…outlier detection, outlier correction, python programming language, standard deviation…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Programmed Host Cell Death and Infectious Process of Mycoplasma by Alaa Abed, Ali Al-Iedani, Ahmed Neamah

    Published 2022-09-01
    “…All of these play crucial roles in the infectious process. This paper seeks to provide a thorough assessment of recent developments in our understanding of Mycoplasma pathogenesis with the understanding of its virulence mechanisms.…”
    Get full text
    Article
  6. 6

    Identification of Programs Based on the Behavior by M. V. Baklanovsky, A. R. Khanov

    Published 2014-12-01
    “…Program identification based on behavior is used for anomaly detection of malicious activities in system.…”
    Get full text
    Article
  7. 7
  8. 8

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…This requires constant attention to new vulnerabilities and attack methods, as well as the search for innovative approaches to detecting and preventing cyber threats. The paper examines an algorithm for detecting the execution of malicious code in the process of a protected program. …”
    Get full text
    Article
  9. 9
  10. 10

    A SPIN-based Approach for Detecting Vulnerabilities in C Programs by N. G. Kushik, A. . Mammar, A. . Cavalli, N. V. Yevtushenko, W. . Jimenez, E. . Montes De Oca

    Published 2011-12-01
    “…Correspondingly, the security of such programs should be thoroughly tested, i.e., it is important to develop techniques for detecting vulnerabilities in C programs. …”
    Get full text
    Article
  11. 11

    Monitoring the quality of the hospital pharmacoterapeutic process by sentinel patient program by María José Fernández-Megía, Matilde Merino Sanjuán, Isabel Font Noguera, José Luis Poveda Andrés

    Published 2018-03-01
    “…Objective: To analyze the results of sentinel patient program to monitoring the quality pharmacoterapeutic process in the hospitalized patient through medication errors. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Efficacy of the Leak Detection and Repair Program in the Italian Industrial Plants by Nicoletta Lotrecchiano, Angelo Pecci, Nicola Zappimbulso, Michele Antonino Ilacqua, Fabio Ferranti

    Published 2025-06-01
    “…The European Commission has established Leak Detection and Repair (LDAR) programs to monitor VOCs, focusing on emissions from equipment deterioration over time. …”
    Get full text
    Article
  15. 15

    Image processing for microprocessors TIM voids detection by Ting Ying Jiang, Mei-Hui Song, Zi-Ying Oh, Tong Liu

    Published 2025-03-01
    “…To address this issue, non-destructive testing (NDT) imaging techniques are often employed to inspect and detect TIM voids. Common methods include Scanning Acoustic Microscopy (SAM) and X-ray Laminography, which provide detailed visualization of void distribution and structural defects.To automatically quantify void occupation within each rectangular shape die ROI (Region Of Interest), a traditional image processing-based void detection software has been developed. …”
    Get full text
    Article
  16. 16
  17. 17

    Detection of outliers in processing of small size data by B. C. Попукайло

    Published 2016-10-01
    “…This article describes the criteria for detection of outliers power depending on a small size sample. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Urban Road Change Detection using Morphological Processing by Ei Phyu Sin Win

    Published 2021-02-01
    “…Extraction road from planet pictures is hard matter with many realistic application programs. The primary points in the model are the advancement of the picture, the segmentation of that picture, the application of the morphological operators, and finally the detection of the roadway network. …”
    Get full text
    Article