Search alternatives:
progress » process (Expand Search)
Showing 1 - 20 results of 12,642 for search 'detection (progress OR programs)', query time: 0.20s Refine Results
  1. 1
  2. 2

    Approach to Plagiarism Detection in Programming Assignments by Malek Algabri, Firdaus Alhrazi

    Published 2025-03-01
    Subjects: “…Index Terms Plagiarism Detection…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    RETRACTED: Computerized Detection of Calcium Oxalate Crystal Progression by Hanan A. Hosni Mahmoud

    Published 2022-10-01
    “…A new fast search algorithm—ODS: One Direction Search—is proposed to detect calcium oxalate crystal progression. The calcium oxalate crystal progression is detected on the basis of electron micrographs of calcium oxalate crystals by means of a temporal test. …”
    Get full text
    Article
  8. 8

    Research Progress of Detection Technology of Viable Foodborne Pathogens by Tingyu LIU, Qingli DONG, Jiaming LI, Hongxiang GAN, Linlin XIAO, Xiaojie QIN

    Published 2025-07-01
    “…Therefore, the viable status of foodborne pathogens in foods is summarized in this paper, and the latest research progress of the current viable detection methods of foodborne pathogens is summarized from the perspective of their culturable, nucleic acid, cell membrane integrity, metabolites, and phage. …”
    Get full text
    Article
  9. 9

    Research progress of near infrared spectroscopy in condiments detection by YU Xinlei, ZHANG Jiahui, LIU Taiang, YIN Mingyu, WANG Xichang

    Published 2024-09-01
    “…The principle, characteristics and rapid detection model of NIRS are outlined. The research progress of near infrared spectroscopy in condiment in recent years is reviewed, including ingredient detection, adulteration identification, brand traceability and quality detection. …”
    Get full text
    Article
  10. 10
  11. 11

    Identification of Programs Based on the Behavior by M. V. Baklanovsky, A. R. Khanov

    Published 2014-12-01
    “…After 20 minutes of learning the algorithm is able to identify any thread of any process with 85% precision. Program identification based on behavior is used for anomaly detection of malicious activities in system.…”
    Get full text
    Article
  12. 12

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…This requires constant attention to new vulnerabilities and attack methods, as well as the search for innovative approaches to detecting and preventing cyber threats. The paper examines an algorithm for detecting the execution of malicious code in the process of a protected program. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    A SPIN-based Approach for Detecting Vulnerabilities in C Programs by N. G. Kushik, A. . Mammar, A. . Cavalli, N. V. Yevtushenko, W. . Jimenez, E. . Montes De Oca

    Published 2011-12-01
    “…Correspondingly, the security of such programs should be thoroughly tested, i.e., it is important to develop techniques for detecting vulnerabilities in C programs. …”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Research Progress on Non-destructive Detection Techniques for Potatoes Quality by YANG Guang-hui, LI Hong-ling, ZHANG Hua, LI Hui, LIU Xiao-long, JIA Shang-yun, HU Bo, SHANG Yi-bo

    Published 2024-11-01
    “…Aiming at the problems of traditional manual potato quality classification, such as high labor intensity, low efficiency, easy to cause secondary damage, and inability to judge internal quality, this article elaborated on the research progress of domestic and foreign hyperspectral detection technology, near-infrared spectroscopy detection technology, machine vision detection technology, and ultrasonic detection technology in the application of internal and external quality detection of potatoes. …”
    Get full text
    Article
  20. 20