Suggested Topics within your search.
Suggested Topics within your search.
-
341
A successive variational mode extraction method based on spectrum trend and its application in non‐contact vital sign detection
Published 2024-07-01Subjects: “…radar signal processing…”
Get full text
Article -
342
Polygraph-based deception detection and Machine Learning. Combining the Worst of Both Worlds?
Published 2024-01-01Get full text
Article -
343
An Inductive Logical Model with Exceptional Information for Error Detection and Correction in Large Knowledge Bases
Published 2025-06-01“…In this paper, an inductive logic programming with exceptional information (EILP) is proposed to automatically detect errors in large knowledge bases (KBs). …”
Get full text
Article -
344
Robust Symbol Detection in Large-Scale Overloaded NOMA Systems
Published 2021-01-01Subjects: Get full text
Article -
345
Dim and Small Target Detection Based on Improved Bilateral Filtering and Gaussian Motion Probability Estimation
Published 2024-01-01“…In this paper, we present a dim and small target detection algorithm based on improved bilateral filtering and Gaussian motion probability estimation, aiming to improve the detection efficiency of the detection system. …”
Get full text
Article -
346
-
347
Construction and application of foundational models for intelligent processing of microseismic events in mines
Published 2025-06-01“…Field application at a rockburst-prone coal face in Gansu Province confirmed the model’s engineering effectiveness, enabling fully automated processing from event detection to source localization (errors <50 ms) and mechanism inversion. …”
Get full text
Article -
348
Application of Image Analysis Technology in Detecting and Diagnosing Liver Tumors
Published 2025-04-01Subjects: Get full text
Article -
349
Smart gloves-based triboelectric nanogenerator for sign language detection
Published 2025-07-01Subjects: “…Sign-language detection…”
Get full text
Article -
350
Visible feature engineering to detect fraud in black and red peppers
Published 2024-10-01Subjects: Get full text
Article -
351
Automated detection of wolf howls using audio spectrogram transformers
Published 2025-07-01“…As a key participant in ecosystem processes, it also serves as a model for investigating social structure formation and ecological adaptation. …”
Get full text
Article -
352
Development of an Automatic System to Detect and Spray Herbicides in Corn Fields
Published 2020-06-01Subjects: Get full text
Article -
353
METHOD OF IMAGE PROCESSING IN THE PROBLEM OF DETECTING MOVING OBJECTS IN OPTICAL-ELECTRONIC SURVEILLANCE SYSTEMS OF THERMAL IMAGING TYPE
Published 2020-03-01“…The article considers the method of image processing proposed by the author in relation to the problem of automatic detection of moving objects in optoelectronic thermal imaging systems. …”
Get full text
Article -
354
-
355
-
356
Fault Detection and Identification for Nonlinear Process Based on Inertia-Based KEPCA and a New Combined Monitoring Index
Published 2021-01-01“…The proposed approaches have been applied to process fault detection and diagnosis for the well-known benchmark Tennessee Eastman process (TE). …”
Get full text
Article -
357
Cooperative Detection for Cell-Free Massive MIMO With Multiple Central Processing Units Under Backhaul Capacity Limitation
Published 2025-01-01“…Cell-free massive multiple-input multiple-output (CF-mMIMO) systems offer enhanced spectral efficiency (SE) and uniform coverage through cooperative baseband signal processing across geographically distributed, interconnected central processing units (CPUs). …”
Get full text
Article -
358
A Novel Approach to Method for the Detection of Optic Disc Location in Retinal Images using Image Processing Techniques
Published 2016-11-01“…Biomedical image analysis used for which is applied to assist in clinical diagnosis processes, is one of the research areas that draw intense interest of scientists. …”
Get full text
Article -
359
-
360
Methods for semantic analysis of the state of the process of functioning of a system for detecting, preventing and eliminating the consequences of computer attacks
Published 2025-01-01“…The aim of the study is to determine the most effective method of semantic analysis of the state of the process of detection, prevention and elimination of consequences of computer attacks. …”
Get full text
Article