Showing 1,221 - 1,240 results of 20,691 for search 'detection process', query time: 0.22s Refine Results
  1. 1221

    Research development on nondestructive determination of pork quality by CHENG Fang, LIAO Yi-tao, MA Jun-wei

    Published 2010-03-01
    “…Additionally, it illustrates that the online detection and the real-time determination in complex environments of slaughtering and processing are trends of pork quality detection, as well as the detection of quality in v ivo and the integration of several nondestructive detection technologies.…”
    Get full text
    Article
  2. 1222

    Measurement-induced entanglement entropy of gravitational wave detections by Preston Jones, Quentin G. Bailey, Andri Gretarsson, Edward Poon

    Published 2025-09-01
    “…Coincident multiple detector operations make it possible to consider the bipartite measurement-induced entanglement, in the detection process, as a signature of non-classicality. …”
    Get full text
    Article
  3. 1223
  4. 1224

    Detection and Defense: Student-Teacher Network for Adversarial Robustness by Kyoungchan Park, Pilsung Kang

    Published 2024-01-01
    “…In this paper, we propose a novel defense method based on the student-teacher framework that can minimize the classification performance degradation for NEs by detecting AEs and then applying the defense process only to AEs. …”
    Get full text
    Article
  5. 1225
  6. 1226
  7. 1227

    Cost-effective annotation of fisheye images for object detection by K. Zhang, A. Elalailyi, L. Perfetti, F. Fassi

    Published 2024-12-01
    “…It also seeks a way to prove that the annotation can be converted to fisheye images, resulted into a pre-process, which will facilitate the data preparation process. …”
    Get full text
    Article
  8. 1228

    Parameter Adaptive LCD Screen Defect Detection Framework by LIU Wang, SHAO Huili, HE Yongjun, XIE Yining, CHEN Deyun

    Published 2020-10-01
    “…It is necessary to detect defects in the production process of LCD screens for quality improvements Manual detection brings a heavy workload and low accuracy Therefore, an efficient and accurate automatic detection method is urgently needed To this end, this paper proposes a new defect detection framework, which mainly includes screen area extraction, preprocessing, threshold segmentation and defect selection By adaptive adjustment of parameters, the detection method can adapt to various complex situations In order to eliminate the influence of illumination changes, the defect region is segmented by automatic parameter adjustment in the threshold segmentation First, the maximum grayscale value of the image is calculated, and then the fixed parameters and the coefficient of the defect image are determined according to the nodefect image, and finally the maximum value which was selected as the minimum threshold of the threshold segmentation from the fixed parameters and the product of the maximum grayscale value and the coefficient In addition, in order to solve the problem that the brightness difference of the images captured by lowresolution cameras is too small to detect defects in the saturation condition, selfadaptive adjustment of exposure parameters was used to collect images to process different parts of images with large difference in light and shade Experiments show that the method can achieve high performance and efficiency in detecting defects such as points, lines, Mura, saturation…”
    Get full text
    Article
  9. 1229

    Center-Guided Network with Dynamic Attention for Transmission Tower Detection by Xiaobin Li, Zhuwei Liang, Jingbin Yang, Chuanlong Lyu, Yuge Xu

    Published 2025-04-01
    “…In addition, a two-stage detection head is proposed to employ a two-stage detection process to perform more accurate detection. …”
    Get full text
    Article
  10. 1230
  11. 1231

    Explainable handcrafted features for mitotic event detection and classification by Panason Manorost, Thomas Deckers, Veerle Bloemen, Jean Marie Aerts

    Published 2025-03-01
    “…These unwanted noise elements and artifacts can cause false positive detections and lead to low precision in detecting proliferation processes. …”
    Get full text
    Article
  12. 1232

    Method of detecting network anomaly on multi-time-scale by WANG Feng-yu1, YUN Xiao-chun1, CAO Zhen-zhong4

    Published 2007-01-01
    “…To detect anomaly timely and precisely in high-speed network,an algorithm,named DA-MTS(detecting anomaly on multi-time-scale synchronously),was proposed.Firstly,pre-process the time series of traffic with non-decimated Haar wavelet transform to produce detail signals,which approximately follow Gaussian white noise.Then detect anomaly based on "3σ" principal of normal distribution.Analysis and experiments reveal that this algorithm can detect anomaly on several time-scales recursively without delay,so it can detect anomaly precisely and timely.…”
    Get full text
    Article
  13. 1233

    Deviance detection and regularity sensitivity in dissociated neuronal cultures by Zhuo Zhang, Amit Yaron, Dai Akita, Tomoyo Isoguchi Shiramatsu, Zenas C. Chao, Hirokazu Takahashi, Hirokazu Takahashi

    Published 2025-08-01
    “…Crucially, we also showed sensitivity to the statistical regularity of stimuli, a phenomenon previously observed only in intact brains: the MMRs in a predictable, periodic sequence were smaller than those in a commonly used sequence in which the appearance of the deviant stimulus was random and unpredictable.DiscussionThese results challenge the traditional view that a hierarchically structured neural network is required to process complex temporal patterns, suggesting instead that deviant detection and regularity sensitivity are inherent properties arising from the primitive neural network. …”
    Get full text
    Article
  14. 1234

    Study on user behavior profiling in insider threat detection by Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG

    Published 2018-12-01
    “…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks details. …”
    Get full text
    Article
  15. 1235

    Approach to detecting SQL injection behaviors in network environment by Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI

    Published 2016-02-01
    “…SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. …”
    Get full text
    Article
  16. 1236

    GHSOM intrusion detection based on Dempster-Shafer theory by Jie SU, Wei-wei DONG, Xuan XU, Shuai LIU, Li-peng XIE

    Published 2015-11-01
    “…On the basis of incremental GHSOM,the GHSOM neural network intrusion detection based on the theory of evidence reasoning method was put forward.It can deal with the uncertainty caused by randomness and fuzziness,as well as can constantly narrowing assumptions set by accumulate the evidence,effectively control dynamic growth of network and keep a good accuracy in noise environment.Experiments show that GHSOM intrusion detection method based on the Dempster Shafer theory realized the dynamic control for the scale of expended subnet during the process of detection.It has the better detection accuracy in the noise environment and improves the adaptability and extensibility of incremental GHSOM neural network intrusion detection method when the scale of network is expanded.…”
    Get full text
    Article
  17. 1237

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…The study of Trojan virus detection on Android engine and the application of its outcome has become increasingly significant. …”
    Get full text
    Article
  18. 1238

    Concept Drift Detection in Dynamic Probabilistic Relational Models by Nils Finke, Tanya Braun, Marcel Gehrke, Ralf Möller

    Published 2021-04-01
    “…We propose an approach to account for non-stationary processes w.r.t. to changing probability distributions over time, an effect known as concept drift. …”
    Get full text
    Article
  19. 1239

    Grasp Detection under Occlusions Using SIFT Features by Zhaojun Ye, Yi Guo, Chengguang Wang, Haohui Huang, Genke Yang

    Published 2021-01-01
    “…There are two key steps for the proposed method in the process of grasping occluded object: generating template information and grasp detection using the matching algorithm. …”
    Get full text
    Article
  20. 1240