Showing 1,841 - 1,860 results of 25,128 for search 'detection (programs OR process)', query time: 0.24s Refine Results
  1. 1841
  2. 1842

    Pupil Detection Execution Time Reduction in Iris Recognition System by Maha Hasso, Bayez Al-Sulaifanie, Kaydar Quboa

    Published 2008-12-01
    “…The results of the study proved that the best technique for pupil detection is when using the combined technique. It gives about 100% success rate for pupil detection.…”
    Get full text
    Article
  3. 1843

    Surface roughness detection based on spindle motor current signal by Liu Xuejie, Li Guofu, Ren Lu

    Published 2024-02-01
    “…The total harmonic distortion feature achieves built-up edge detection during the machining process. The workpiece surface roughness detection accuracy is as high as 95%. …”
    Get full text
    Article
  4. 1844

    Target Detection Label Assignment Method Based on Global Information by ZHANG Pei-pei, LU Zhen-yu

    Published 2022-08-01
    “…Aiming at this problem, this paper proposes a target detection label allocation method based on global information, which uses the assignment method to establish a global optimal label allocation mathematical model based on the loss function in the model training stage, and gives the fusion mode of the model with other object detection models, and the role played by the method in the process of object detection. …”
    Get full text
    Article
  5. 1845

    Multimodal Fusion Anomaly Detection Model for Agricultural Wireless Sensors by Zhenggui Zhou

    Published 2024-12-01
    “…In order to detect anomalous data accurately for agricultural wireless sensors, in this article, we propose an anomaly detection model that combines multimodal fusion and error reconstruction. …”
    Get full text
    Article
  6. 1846

    Enhanced Detection of Human Plasma Proteins on Nanostructured Silver Surfaces by Zuzana Orságová Králová, Andrej Oriňák, Renáta Oriňáková, Lenka Škantárová, Jozef Radoňák

    Published 2013-08-01
    “…We also studied the effect of a working electrode polishing process on electrodeposition and identification of proteins. …”
    Get full text
    Article
  7. 1847
  8. 1848

    APPLICATION OF CLASSIFICATION BASED ASSOCIATION (CBA) FOR MONKEYPOX DISEASE DETECTION by Qoria Yudi Pratama, Mohammad Isa Irawan

    Published 2025-01-01
    “…In this study, researchers developed another method to detect monkeypox disease based on its symptoms using the classification by association (CBA) method. …”
    Get full text
    Article
  9. 1849

    SSCANL decoder based joint iterative detection and decoding algorithm by Chongyang LIU, Rui GUO

    Published 2022-10-01
    “…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
    Get full text
    Article
  10. 1850

    Recognition and Application of Wear Detection BTA Deep Hole Drilling by WU Xue-feng, WU Tong-kun, YANG Shu-cai, YUAN Zhong-liang

    Published 2018-10-01
    “…First,getting a clear image of the wear area through the tool wear image preprocessing which include image gray,filter denoising and threshold segmentation; Then the tool wear was obtained by using the minimum external rectangle method in the preprocessed image,and the effect of the wear rate on the processing aperture was analyzed; The above detection method is used to test the BTA deep hole drilling, which provides data support for improving the service life of the tool.…”
    Get full text
    Article
  11. 1851

    Application of machine learning methods for automated detection of network intrusions by M. V. Babicheva, I. A. Tretyakov

    Published 2023-05-01
    “…Development of automated network attack detection systems capable of adapting to the ever-changing nature of network attacks and new types of threats. …”
    Get full text
    Article
  12. 1852

    SSCANL decoder based joint iterative detection and decoding algorithm by Chongyang LIU, Rui GUO

    Published 2022-10-01
    “…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
    Get full text
    Article
  13. 1853

    Enhancing Weakly-Supervised Video Anomaly Detection With Temporal Constraints by Francisco Caetano, Pedro Carvalho, Christina Mastralexi, Jaime S. Cardoso

    Published 2025-01-01
    “…Anomaly Detection has been a significant field in Machine Learning since it began gaining traction. …”
    Get full text
    Article
  14. 1854

    Progress in Nondestructive Detection Techniques for Internal Defects of Agro-products by Rong PENG, Zhenzhen LÜ, Xuan LUO, Wen ZHANG

    Published 2025-08-01
    “…Internal defects can easily develop during the growth process of agro-products, significantly affecting their economic value. …”
    Get full text
    Article
  15. 1855

    Impedance Spectrum Measurement and Fault Detection for XLPE Coaxial Cables by LIU Chunqi, LI Shufeng, HUANG Yu, CHEN Dongsheng

    Published 2024-10-01
    “… XLPE coaxial cables are prone to faults and defects in the process of power transmission, seriously jeopardizing the safe operation of the power system. …”
    Get full text
    Article
  16. 1856

    Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression by Kyusoon Kim, Seunghee Oh, Kiwook Bae, Hee-Seok Oh

    Published 2025-01-01
    “…Optical emission spectroscopy (OES) data is essential for virtual metrology, enabling accurate predictions of wafer performance in plasma etching processes. This approach not only reduces the need for physical measurements of product quality, leading to significant resource savings, but also supports improved decision-making, particularly in process control and quality assurance. …”
    Get full text
    Article
  17. 1857

    Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces by Rishi Gupta, Amit Kumar Gupta, Deepak Panwar, Ashish Jain, Partha Chakraborty

    Published 2023-01-01
    “…The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. …”
    Get full text
    Article
  18. 1858

    Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection by Kenan Kiliç, Kazım Kiliç, İbrahim Alper Doğru, Uğur Özcan

    Published 2025-01-01
    “…Detection of defects on wood during quality processes in the wood industry is extremely important both economically and in terms of production and use. …”
    Get full text
    Article
  19. 1859

    AI-driven epidemic intelligence: the future of outbreak detection and response by Jasleen Kaur, Jasleen Kaur, Zahid Ahmad Butt

    Published 2025-07-01
    “…Epidemic intelligence, the process of detecting, verifying, and analyzing public health threats to enable timely responses, traditionally relies heavily on manual reporting and structured data, often causing delays and coverage gaps. …”
    Get full text
    Article
  20. 1860

    Detecting House of Spirit Attacks by Glibc Heap Information Extraction by ZHAI Jiqiang, WANG Jiaqian, HAN Xu, SUN Haixu

    Published 2024-02-01
    “…The experimental results show that this method can effectively extract the heap information in the memory of the Linux system process,and successfully detect the House of Spirit attack in the memory based on the information combined with the attack detection algorithm.…”
    Get full text
    Article