Search alternatives:
progress » process (Expand Search)
Showing 1,701 - 1,720 results of 12,642 for search 'detection (progress OR programs)', query time: 0.20s Refine Results
  1. 1701

    RST-YOLOv8: An Improved Chip Surface Defect Detection Model Based on YOLOv8 by Wenjie Tang, Yangjun Deng, Xu Luo

    Published 2025-06-01
    “…Surface defect detection in chips is crucial for ensuring product quality and reliability. …”
    Get full text
    Article
  2. 1702

    Missed opportunities for detection of hypertension in public health facilities of 18 districts in India, 2022 by Mogan Kaviprawin, Archana Ramalingam, Anu Varghese, Arun Vashishtha, Dogendra Singh Parihar, Inderjit Singla, Jhilam Mitra, Karanpreet Kaur Johal, Madhuri Birbal Nimsatkar, Mrunal Madhukar Mahadik, Muneer Mohd, Pranay Shukla, Rahul Gupta, Rajendran N, Robin C Oommen, Rupali Bharadwaj, Sandeep Singh Gill, Satish KN, Shrikant Kumar Chandrakar, Vazinder Kaur Dhunna, Sachin Tadas, Ganeshkumar Parasuraman, Sharan Murali, Ramya Nagarajan, Manikandanesan Sakthivel, Kalyani Sailesh, Srinath Ramamurthy, PavanKumar Gollapalli, Mohamed Jainul Azarudeen, Mohankumar Raju, S Yedhu, Aarthy Ramasamy, Abhishek Bicholkar, Prabhdeep Kaur

    Published 2025-03-01
    “…In the public health facilities across 18 districts in nine states of India, we estimated the missed opportunity for hypertension detection in routine program settings. Methods In each of the chosen districts, we conducted a cross-sectional study in one district hospital (DH), one community health centre (CHC), and three primary health centres (PHCs), selected randomly. …”
    Get full text
    Article
  3. 1703
  4. 1704
  5. 1705
  6. 1706
  7. 1707

    APPLICATION OF GPU-CUDA PARALLEL COMPUTING TO THE SMITH-WATERMAN ALGORITHM TO DETECT MUSIC PLAGIARISM by Alfredo Gormantara, Ferdianto Tangdililing, Sean Coonery Sumarta

    Published 2025-07-01
    “…However, the Smith-Waterman algorithm has a weakness, namely that the speed of this algorithm is relatively slow, so parallel computing is required to speed up the detection process. Parallel computing relies on the capabilities of multi-core GPUs that can be programmed using CUDA. …”
    Get full text
    Article
  8. 1708
  9. 1709

    DETECTING URBAN SLUMS IN DKI JAKARTA: A KOTAKU DATA APPROACH WITH ENSEMBLE METHODS by Muhammad Muawwad MS, Rani Nooraeni, Ananda Galuh Intan Prasetya

    Published 2024-07-01
    “…The PUPR Ministry representing the Indonesian government is trying to overcome slum settlements in Indonesia by creating the Cities Without Slums (KOTAKU) program. The KOTAKU program provides relevant and detailed data on slum settlements in Indonesia. …”
    Get full text
    Article
  10. 1710
  11. 1711
  12. 1712

    Design and Implementation of an Assistive Real-Time Red Lionfish Detection System for AUV/ROVs by M-Mahdi Naddaf-Sh, Harley Myler, Hassan Zargarzadeh

    Published 2018-01-01
    “…A small-sized, open source ROV with an integrated camera is programmed using Deep Learning methods to detect red lionfish in real time. …”
    Get full text
    Article
  13. 1713
  14. 1714
  15. 1715

    Detection of the Prognostic Gene CYB5D2 in Cervical Squamous Epithelial Lesions by Yanan Liu, Guoqiang Zhao, Yanqing Kong, Fengyuan Zhou, Tong Zhang, Xiaohang Chen, Haiyan Hu, Fengxiang Wei

    Published 2025-01-01
    “…Results revealed a progressive downregulation of CYB5D2 expression with advancing cervical lesions. …”
    Get full text
    Article
  16. 1716

    Designing a Smartphone Application for Detection of Oral Bite Force Using Artificial Intelligence by Jinxia Gao, Huazheng Zhou, Longjun Liu

    Published 2025-08-01
    “…Therefore, the purpose of this study is to design a smartphone application for intelligent detection of oral bite force. Methods: This study has developed an intelligent program software for analyzing bite force detection, which encompassing modules such as introduction, environment setup, data reception and transmission, analysis processing, installation and uninstallation, as well as user instructions. …”
    Get full text
    Article
  17. 1717
  18. 1718

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The exponential growth of third-party developer apps needs a robust code audit before upload. The weak program analysis at app stores adversely affects security. …”
    Get full text
    Article
  19. 1719
  20. 1720