Suggested Topics within your search.
Suggested Topics within your search.
-
1
Approach to Plagiarism Detection in Programming Assignments
Published 2025-03-01Subjects: “…Index Terms Plagiarism Detection…”
Get full text
Article -
2
Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes
Published 2022-05-01Subjects: “…outlier detection, outlier correction, python programming language, standard deviation…”
Get full text
Article -
3
Automated Detection of Deviations in Bankruptcy Processes Using Process Mining
Published 2025-01-01Subjects: “…Process mining…”
Get full text
Article -
4
Detecting Anomalies in CPU Behavior Using Clustering Algorithms from the Scikit-Learn Library in Python Programming Language
Published 2024-03-01Subjects: “…anomaly detection…”
Get full text
Article -
5
Programmed Host Cell Death and Infectious Process of Mycoplasma
Published 2022-09-01“…All of these play crucial roles in the infectious process. This paper seeks to provide a thorough assessment of recent developments in our understanding of Mycoplasma pathogenesis with the understanding of its virulence mechanisms.…”
Get full text
Article -
6
Identification of Programs Based on the Behavior
Published 2014-12-01“…Program identification based on behavior is used for anomaly detection of malicious activities in system.…”
Get full text
Article -
7
-
8
On the study of one way to detect anomalous program execution
Published 2024-06-01“…This requires constant attention to new vulnerabilities and attack methods, as well as the search for innovative approaches to detecting and preventing cyber threats. The paper examines an algorithm for detecting the execution of malicious code in the process of a protected program. …”
Get full text
Article -
9
DETECTION OF DEADLOCKS IN PARALLEL PROGRAMS AS SOLUTION OF LINEAR DIOPHANTINE EQUATIONS
Published 2011-08-01Get full text
Article -
10
A SPIN-based Approach for Detecting Vulnerabilities in C Programs
Published 2011-12-01“…Correspondingly, the security of such programs should be thoroughly tested, i.e., it is important to develop techniques for detecting vulnerabilities in C programs. …”
Get full text
Article -
11
Monitoring the quality of the hospital pharmacoterapeutic process by sentinel patient program
Published 2018-03-01“…Objective: To analyze the results of sentinel patient program to monitoring the quality pharmacoterapeutic process in the hospitalized patient through medication errors. …”
Get full text
Article -
12
Detecting Learning Behavior in Programming Assignments by Analyzing Versioned Repositories
Published 2024-01-01Get full text
Article -
13
Emerging Electrochemical Approaches for the Early Detection of Programmed Cell Death
Published 2025-07-01Get full text
Article -
14
Efficacy of the Leak Detection and Repair Program in the Italian Industrial Plants
Published 2025-06-01“…The European Commission has established Leak Detection and Repair (LDAR) programs to monitor VOCs, focusing on emissions from equipment deterioration over time. …”
Get full text
Article -
15
Image processing for microprocessors TIM voids detection
Published 2025-03-01“…To address this issue, non-destructive testing (NDT) imaging techniques are often employed to inspect and detect TIM voids. Common methods include Scanning Acoustic Microscopy (SAM) and X-ray Laminography, which provide detailed visualization of void distribution and structural defects.To automatically quantify void occupation within each rectangular shape die ROI (Region Of Interest), a traditional image processing-based void detection software has been developed. …”
Get full text
Article -
16
Nested Pattern Detection and Unidimensional Process Characterization
Published 2024-09-01Get full text
Article -
17
Detection of outliers in processing of small size data
Published 2016-10-01“…This article describes the criteria for detection of outliers power depending on a small size sample. …”
Get full text
Article -
18
Domain Knowledge-Enhanced Process Mining for Anomaly Detection in Commercial Bank Business Processes
Published 2025-07-01Subjects: “…process mining…”
Get full text
Article -
19
A Survey on Various Edge Detection Techniques in Image Processing and Applied Disease Detection
Published 2024-09-01Subjects: “…Edge detection…”
Get full text
Article -
20
Urban Road Change Detection using Morphological Processing
Published 2021-02-01“…Extraction road from planet pictures is hard matter with many realistic application programs. The primary points in the model are the advancement of the picture, the segmentation of that picture, the application of the morphological operators, and finally the detection of the roadway network. …”
Get full text
Article