Search alternatives:
progress » process (Expand Search)
Showing 1,241 - 1,260 results of 12,642 for search 'detection (progress OR programs)', query time: 0.21s Refine Results
  1. 1241
  2. 1242

    Detection of Cervical Uterine Cancer: cytology after 25 years old? by Eneida Bravo Polanco, Narciso Águila Rodríguez

    Published 2018-12-01
    “…This article is aimed at reflecting about the incidence of this disease at early ages; however the program for its detection includes performing cytology starting at 25 year old. …”
    Get full text
    Article
  3. 1243

    Deep ensemble learning with transformer models for enhanced Alzheimer’s disease detection by Shiza Latif, Naeem Ul Islam, Zaki Uddin, Khalid Mehmood Cheema, Syed Sohail Ahmed, Muhammad Farhan Khan

    Published 2025-07-01
    “…Currently, there is no remedy for this illness. Accurate detection and prompt intervention are pivotal in mitigating the progression of the disease. …”
    Get full text
    Article
  4. 1244
  5. 1245

    Evaluation of Scintillation Counter Detector Using Gamma Radiation for Gold Detection by Julia Ragab Khalil, Wael Hessen Alawad, Adil Elrayah, Ali Sulaiman Mohamed, Mubark Dirrar Abdallah, Azher S Barrak

    Published 2024-12-01
    “… The aim of this work is to evaluate the efficiency of a new gamma spectrometer technology using a scintillation counter detector. This technique can detect the backscattered gamma radiation emitted from the samples. …”
    Get full text
    Article
  6. 1246
  7. 1247
  8. 1248

    Research on Android malware detection method based on multimodal feature fusion by Ge Jike, He Mingkun, Chen Zuqin, Ling Jin, Zhang Yifan

    Published 2025-01-01
    “…Existing Android malware detection methods mainly use single-modal data to characterize program features, but fail to fully mine and fuse different feature information, resulting in unsatisfactory detection results. …”
    Get full text
    Article
  9. 1249

    Biosensors for Early Detection of Parkinson’s Disease: Principles, Applications, and Future Prospects by Panpan Jiang, Nan Gao, Gang Chang, Yuxiang Wu

    Published 2025-04-01
    “…Parkinson’s disease (PD), a neurodegenerative disorder marked by the progressive loss of dopaminergic neurons in the substantia nigra, imposes substantial economic burdens, including both direct and indirect costs. …”
    Get full text
    Article
  10. 1250
  11. 1251

    Parametric Design of Steel Ball Automatic Detection System Based on VB by ZHAO Yanling, WANG Qiyu, BAO Yudong, PAN Chengyi, ZHAO Zhiqiang

    Published 2020-10-01
    “…Firstly, establishing the template model library of steel ball automatic detection system, and the library is divided into general parts model library and key parts design library through analyzing the function structure, using SolidWorks part design table function realizes parametric design of key components; Calling the model library to complete the establishment of detection system virtual assembly model, and using SolidWorks macro function to make the driver program of key parts and assembly model,Finally, the simulation technology is used to simulate the process of steel ball, and the correctness of the theoretical analysis results is verified Finally, the parametric design method of automatic detection system of steel ball is put forward…”
    Get full text
    Article
  12. 1252

    Anomaly traffic detection method based on data augmentation and feature mining by AN Yishuai, FU Yu, YU Yihan, LIU Taotao

    Published 2025-01-01
    “…To address the limitations of existing anomaly traffic detection methods, such as insufficient recognition accuracy for minority classes and limited deep feature extraction capabilities, a novel anomaly traffic detection method based on data augmentation and feature mining was proposed. …”
    Get full text
    Article
  13. 1253

    A Driver’s Calling Behavior Detection Method Based on Deep Learning by XIONG Qunfang, LIN Jun, YUE Wei, LIU Shiwang, LUO Xiao, DING Chi

    Published 2019-01-01
    “…Firstly, face detection and face tracking is supported by PCN (progressive calibration networks) to determine the calling detection area. …”
    Get full text
    Article
  14. 1254

    Detection of chikungunya virus in Aedes aegypti in Ciudad Juárez, Chihuahua, Mexico by Eduardo Hernández-Acosta, Antonio De la Mora Covarrubias, Idelfonso Fernández-Salas, Angélica Escárcega-Ávila, Isabel Passalacqua Olivera, Florinda Jiménez-Vega

    Published 2025-04-01
    “…Background & objectives: Chikungunya fever is caused by an arbovirus transmitted primarily by Aedes aegypti mosquito, which is prevalent in Mexico along with other pathogens carried by this vector. This study aimed to detect the presence of the chikungunya virus (CHIKV) in Ae. aegypti in a vulnerable area of Ciudad Juárez, Chihuahua. …”
    Get full text
    Article
  15. 1255

    A Smart Device Enabled System for Autonomous Fall Detection and Alert by Jian He, Chen Hu, Xiaoyi Wang

    Published 2016-02-01
    “…The stream data via Bluetooth is then sent to a smart phone, which runs a program based on the k NN algorithm and sliding window to analyze the stream data and detect falls in the background. …”
    Get full text
    Article
  16. 1256

    A Hardware-Aware Failure-Detection Method for GPU Control-Logic by Hiroaki Itsuji, Takumi Uezono, Tadanobu Toba, Kojiro Ito, Masanori Hashimoto

    Published 2025-01-01
    “…This paper assumes three types of control-logic failures for a general GPU architecture and proposes efficient failure detection methods for each type. For instance, the proposed method efficiently detects GPU-specific control-logic failures caused by program counter faults with a detection rate of 99.5% and can be implemented with a runtime overhead of 5.3% and a memory-resource overhead of 4.2% for a matrix multiplication application. …”
    Get full text
    Article
  17. 1257

    Webshell malicious traffic detection method based on multi-feature fusion by Yuan LI, Yunpeng WANG, Tao LI, Baoqiang MA

    Published 2021-12-01
    “…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
    Get full text
    Article
  18. 1258

    “Poetics of Drunkenness” in Popular Literature (on Example of Ironic Detective by Darya Dontsova) by O. A. Dimitrieva

    Published 2018-11-01
    “…The features of verbalization of Bacchic stereotypes of the modern man on the example of the ironic detective by Daria Dontsova are considered. It is noted that the image of a drinking person is associated with certain stereotypes of appearance. …”
    Get full text
    Article
  19. 1259
  20. 1260

    Role of parathyroid hormone-related protein in breast cancer detection and prognosis by A. S. Shatokhina, I. M. Bykov, E. F. Filippov, V. A. Porhanov, A. N. Kurzanov

    Published 2022-09-01
    “…Use of parathyroid hormone-related protein for breast cancer early detection and disease prognosis is currently becoming a subject of detailed scientific research studies, which is confirmed by the facts presented in this literature review.…”
    Get full text
    Article