Showing 1,961 - 1,980 results of 25,128 for search 'detection (programs OR process)', query time: 0.25s Refine Results
  1. 1961

    Malicious Traffic Detection on Tofino Using Graph Attention Model by Xichang Gao, Lizhuang Tan, Shengpeng Chen, Peiying Zhang, Jian Wang

    Published 2025-06-01
    “…With the surge of malicious traffic in networks, existing detection methods struggle to balance real-time performance and efficiency. …”
    Get full text
    Article
  2. 1962
  3. 1963

    Fast horizon detection in maritime images using region-of-interest by Chi Yoon Jeong, Hyun S Yang, KyeongDeok Moon

    Published 2018-07-01
    “…However, these methods suffer from high processing times, requiring tens of seconds to complete horizon detection. …”
    Get full text
    Article
  4. 1964
  5. 1965

    High-Precision Chip Detection Using YOLO-Based Methods by Ruofei Liu, Junjiang Zhu

    Published 2025-07-01
    “…This lightweight and efficient approach is particularly effective in detecting small-scale objects within images and accurately analyzing dynamic debris in video sequences, providing a robust solution for automated debris monitoring in machine tool processing applications.…”
    Get full text
    Article
  6. 1966

    Machine vision-based automatic fruit quality detection and grading by Amna, Muhammad Waqar AKRAM, Guiqiang LI, Muhammad Zuhaib AKRAM, Muhammad FAHEEM, Muhammad Mubashar OMAR, Muhammad Ghulman HASSAN

    Published 2025-06-01
    “…The prototype consisted of defective fruit detection and mechanical sorting systems. Image processing algorithms and deep learning frameworks were used for detection of defective fruit. …”
    Get full text
    Article
  7. 1967

    Multiclass Evaluation of Vision Transformers for Industrial Welding Defect Detection by Antonio Contreras Ortiz, Ricardo Rioda Santiago, Daniel E. Hernandez, Miguel Lopez-Montiel

    Published 2025-02-01
    “…While welding tasks are frequently automated, inspection processes remain largely manual. Advances in computer vision and AI, especially ViTs, now enable more effective defect detection and classification, offering opportunities to automate these workflows. …”
    Get full text
    Article
  8. 1968

    Indirect detection constraints on semi-annihilation of inert scalar multiplets by Hugues Beauchesne, Cheng-Wei Chiang

    Published 2025-07-01
    “…The existence of these processes can alleviate certain constraints and substantially modify the indirect detection signal. …”
    Get full text
    Article
  9. 1969

    Improving Threat Detection in Wazuh Using Machine Learning Techniques by Samir Achraf Chamkar, Mounia Zaydi, Yassine Maleh, Noreddine Gherabi

    Published 2025-06-01
    “…Real-time deployment requirements are rigorously evaluated, with all models maintaining end-to-end processing latencies below 100 milliseconds and 95% of events processed within 500 milliseconds. …”
    Get full text
    Article
  10. 1970

    Methods to detect avian influenza virus for food safety surveillance by Ping SHI, Shu Geng, Ting-ting LI, Yu-shui LI, Ting FENG, Hua-nan WU

    Published 2015-11-01
    “…Conventional methods usually applied for the purpose of AI diagnosis face some practical challenges to establishing a comprehensive poultry surveillance program in the poultry supply chain. Diverse development of new technologies can meet the specific requirements of AI virus detection in various stages or scenarios throughout the poultry supply chain where onsite, rapid and ultrasensitive methods are emphasized. …”
    Get full text
    Article
  11. 1971
  12. 1972
  13. 1973
  14. 1974

    Concept Drift Detection Based on Deep Neural Networks and Autoencoders by Lisha Hu, Yaru Lu, Yuehua Feng

    Published 2025-03-01
    “…In domains such as fraud detection, healthcare, and industrial equipment maintenance, streaming data often exhibit characteristics such as continuous generation, high real-time processing requirements, and complex distributions, making it susceptible to concept drift. …”
    Get full text
    Article
  15. 1975

    Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection by Lu Haowen

    Published 2025-01-01
    “…With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption. …”
    Get full text
    Article
  16. 1976

    Detection of smoke from infrared image frames in the aircraft cargoes by Li Deng, Qian Chen, Yuanhua He, Xiubao Sui, Qin Wang

    Published 2021-04-01
    “…Since, in the cargo of civil aircraft, visible image processing technology cannot be used to detect smoke in the event of a fire due to the closed dark environment, a novel smoke detection method using infrared image processing technology is presented. …”
    Get full text
    Article
  17. 1977

    Dynamics of the island mass effect – Part 1: Detecting the extent by G. Bourdin, L. Karp-Boss, L. Karp-Boss, F. Lombard, G. Gorsky, E. Boss

    Published 2025-07-01
    “…<p>In the vast Pacific Ocean, remote islands and atolls induce mesoscale and sub-mesoscale processes that significantly impact the surrounding oligotrophic ocean, collectively referred to as the island mass effect (IME). …”
    Get full text
    Article
  18. 1978

    Comparison of bluetongue virus detection and quantitation methods in south India by Subhra Subhadra, Subrat Kumar, Veluvarthy VS Suryanarayana, Daggupati Sreenivasulu

    Published 2014-10-01
    “…Polymerase chain reaction (PCR)-based real-time detection assays may be an ideal method to detect the BTV genome in animal blood at an early stage of infection. …”
    Get full text
    Article
  19. 1979

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  20. 1980