Showing 921 - 940 results of 20,691 for search 'detection process', query time: 0.20s Refine Results
  1. 921

    Detection of Deaths Caused by Hyperkalemia by Małgorzata Żulicka, Kamila Sobczak, Dominik Kowalczyk, Sylwia Sikorska, Wioletta Arendt, Marta Hałas-Wiśniewska

    Published 2025-01-01
    “…The disruption of this transcellular process leads to elevated potassium ion levels in the extracellular space, and thus in the blood, a condition known as hyperkalemia. …”
    Get full text
    Article
  2. 922

    SFFNet: Shallow Feature Fusion Network Based on Detection Framework for Infrared Small Target Detection by Zhihui Yu, Nian Pan, Jin Zhou

    Published 2024-11-01
    “…Infrared small target detection (IRSTD) is the process of recognizing and distinguishing small targets from infrared images that are obstructed by crowded backgrounds. …”
    Get full text
    Article
  3. 923

    A SAM-Based Detection Method for the Distance Between Air-Craft Fire Detection Lines by Mo Chen, Sheng Cheng, Yan Liu, Qifan Yin, Hongfu Zuo

    Published 2025-05-01
    “…Checking the distance between aircraft fire detection lines is a crucial task in the conformity inspection process of civil aircraft manufacturing. …”
    Get full text
    Article
  4. 924

    Enhanced Face Detection Using Multi-Cascade Face Detection and Deep Ladder Neural Network by Pande Anshul, Voditel Priti

    Published 2025-01-01
    “…Among these technologies, the MTCNN and deep ladder imputation network have emerged as pivotal tool in advancing the accuracy and reliability of face recognition, by employing a three-stage cascade framework that enhances feature detection capabilities. During this deep ladder imputation network point out the provocation of missing data and ensure that incomplete dataset should not hamper the recognition process. …”
    Get full text
    Article
  5. 925
  6. 926

    Research of phishing detection technology by Xi ZHANG, Zhi-wei YAN, Hong-tao LI, Guang-gang GENG

    Published 2017-07-01
    “…The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.…”
    Get full text
    Article
  7. 927

    Detection of inhibitor residues in milk by Blyumskaya S.N., Naumov M.M.

    Published 2025-02-01
    “…The results indicate a high prevalence of antibiotic residues in milk, which may adversely affect its processing and safety. The Delvotest T and Eclipse tests were found to be the most effective in detecting a wide range of inhibitory substances, confirming their importance for monitoring. …”
    Get full text
    Article
  8. 928
  9. 929

    Ringworm Detection and Diagnosis System. by Asiimwe, Joab, Barigye, Deus Dedet

    Published 2024
    “…This report presents a novel ringworm detection system utilizing deep learning and image processing. …”
    Get full text
    Thesis
  10. 930

    Detection of «Telegram Rat» virus by A. I. Dubrovina, M. H. Alkordi

    Published 2024-04-01
    “…Practical methods of threat detection and neutralization are stipulated. The method of «Telegram Rat» virus threat detection is based on the analysis of active processes, network activity and file system. …”
    Get full text
    Article
  11. 931

    Blur Feature Extraction Plus Automatic KNN Matting: A Novel Two Stage Blur Region Detection Method for Local Motion Blurred Images by Minghua Zhao, Dan Li, Zhenghao Shi, Shuangli Du, Peng Li, Jing Hu

    Published 2019-01-01
    “…First, blur feature discriminant criteria in frequency domain and spatial domain is defined to generate blur feature image; then, binarization is used on the blur feature image to obtain the coarse blur region detection map; subsequently, morphological methods are used to process the clear and blur areas and the trimap is obtained. …”
    Get full text
    Article
  12. 932

    Disease Detection Algorithm for Tea Health Protection Based on Improved Real-Time Detection Transformer by Zhijie Lin, Zilong Zhu, Lingling Guo, Jingjing Chen, Jiyi Wu

    Published 2025-02-01
    “…The enhanced RT-DETR model achieves a detection precision of 89.20% and a processing speed of 346.40 FPS. …”
    Get full text
    Article
  13. 933

    Framelet transform based edge detection for straight line detection from remote sensing images by Vidhya Rangasamy, Sulochana Subramaniam

    Published 2017-01-01
    “… Edge detection has been widely used as a pre-processing step for image processing applications such as region segmentation, feature extraction and object boundary description. …”
    Get full text
    Article
  14. 934

    Dual-Branch Diffusion Detection Model for Photovoltaic Array and Hotspot Defect Detection in Infrared Images by Ruide Li, Wenjun Yan, Chaoqun Xia

    Published 2025-03-01
    “…The proposed model encodes infrared images to extract semantic features, which are then processed through an PV array detection branch and a hotspot detection branch. …”
    Get full text
    Article
  15. 935

    HSF-DETR: Hyper Scale Fusion Detection Transformer for Multi-Perspective UAV Object Detection by Yi Mao, Haowei Zhang, Rui Li, Feng Zhu, Rui Sun, Pingping Ji

    Published 2025-06-01
    “…Further validation across multiple public remote sensing datasets confirms the robust generalization capability of HSF-DETR in diverse aerial scenarios, offering a practical solution for resource-constrained UAV applications where both detection quality and processing speed are crucial.…”
    Get full text
    Article
  16. 936
  17. 937

    Applying Robotic Process Automation to Monitor Business Processes in Hospital Information Systems: Mixed Method Approach by Adam Park, Se Young Jung, Ilha Yune, Ho-Young Lee

    Published 2025-03-01
    “…The increasing complexity within health care systems necessitates enhanced process reengineering and system monitoring approaches. …”
    Get full text
    Article
  18. 938
  19. 939
  20. 940