Showing 181 - 200 results of 20,691 for search 'detection process', query time: 0.26s Refine Results
  1. 181

    Breaking language barriers with image detection and natural language processing model for English to Spanish translation by Bakhita Salman, Andres Lopez, Nathanielle Delapena

    Published 2025-07-01
    “…Abstract This research proposes an advanced approach that integrates multiple image detection techniques and natural language processing (NLP) methodologies for English-to-Spanish language translation. …”
    Get full text
    Article
  2. 182
  3. 183
  4. 184
  5. 185
  6. 186

    Influence of Heat Processing on DNA Degradation and PCR-Based Detection of Wild-Type and Transgenic Maize by Kakha Bitskinashvili, Inga Gabriadze, Tamara Kutateladze, Boris Vishnepolsky, David Mikeladze, Nelly Datukishvili

    Published 2019-01-01
    “…A new PCR method was developed targeting the Cry1Ab gene to detect insect-resistant GM plants. The yield of genomic DNAs extracted by the DNeasy plant mini kit dramatically decreased while DNAs obtained by cetyltrimethyl ammonium bromide- (CTAB-) based method did not show any visible changes in the yield by the time of processing. …”
    Get full text
    Article
  7. 187
  8. 188

    Healthcare Economics-Vital Threat Detection System Efficiency: A Business Process Analysis Methodology by Salma Elhag, Amal Alghamdi, Amal Alahmari, Abeer Alharbi

    Published 2025-01-01
    “…After realizing and analyzing the data of KPI extracted from the “SafePulse” process, the IoT solution emerges as an effective and adaptable solution for addressing the challenges of vital sign monitoring; and this answers the main research question of this work; which is; how a business process methodology is used to analyze, implement and monitor continuous improvements of the process of continuous monitoring of vital threat signs.…”
    Get full text
    Article
  9. 189

    PcBD: A Novel Point Cloud Processing Flow for Boundary Detecting and De-Noising by Shuyu Sun, Jianqiang Huang, Shuai Zhao, Tengchao Huang

    Published 2025-06-01
    “…In target detection tasks equipped with depth sensors, it is crucial to adopt the point cloud pretreatment process, which is directly related to the quality of the obtained three-dimensional model of the target. …”
    Get full text
    Article
  10. 190
  11. 191
  12. 192

    A novel data processing approach to detect fraudulent insurance claims for physical damage to cars by Ahmet Yücel

    Published 2022-08-01
    “…Some automobile insurance companies use computerized auto-detection systems to expedite claims payment decisions for insured vehicles. …”
    Get full text
    Article
  13. 193

    Proactive Detection of Malicious Webpages Using Hybrid Natural Language Processing and Ensemble Learning Techniques by Althaf Ali A, Rama Devi K, Syed Siraj Ahmed N, Ramchandran P, Parvathi S

    Published 2024-01-01
    “…The proliferation of malicious webpages presents a growing threat to online security, necessitating advanced detection methods to mitigate risks. This paper proposes a novel approach that integrates Natural Language Processing (NLP) techniques with an ensemble of machine learning models for the proactive detection of malicious web content. …”
    Get full text
    Article
  14. 194

    Aqueous Ammonia Sensor with Neuromorphic Detection by Kateryna Vyshniakova, Mohammad Javad Mirshojaeian Hosseini, Huiwen Bai, Masoome Fatahi, Victor Marco Rocha Malacco, Shawn S Donkin, Richard M Voyles, Robert A. Nawrocki

    Published 2024-12-01
    “…Abstract A hybrid inorganic–organic neuromorphic sensor utilizing a thin film zinc oxide (ZnO) detector with organic neuromorphic pre‐processing is developed to quantify ammonia in aqueous environments, including biological analytes. …”
    Get full text
    Article
  15. 195

    Transitivity Analysis in Detecting Fraudulent Language in Email: Forensic Linguistics Approach by Yudia Rifki, Sawirman Sawirman, Fajri Usman

    Published 2020-12-01
    “… This research discusses the analysis of transitivity in detecting the fraudulent language in email fraud. The research purposes are (1) to identify the process types of transitivity systems in clauses used in email fraud, and (2) to explain how the fraudulent language is identified by using the transitivity system. …”
    Get full text
    Article
  16. 196
  17. 197
  18. 198

    Multimodal anomaly detection in complex environments using video and audio fusion by Yuanyuan Wang, Yijie Zhao, Yanhua Huo, Yiping Lu

    Published 2025-05-01
    “…Abstract Due to complex environmental conditions and varying noise levels, traditional models are limited in their effectiveness for detecting anomalies in video sequences. Aiming at the challenges of accuracy, robustness, and real-time processing requirements in the field of image and video processing, this study proposes an anomaly detection and recognition algorithm for video image data based on deep learning. …”
    Get full text
    Article
  19. 199
  20. 200