Showing 1,521 - 1,540 results of 20,691 for search 'detection process', query time: 0.21s Refine Results
  1. 1521

    Application of machine learning methods for automated detection of network intrusions by M. V. Babicheva, I. A. Tretyakov

    Published 2023-05-01
    “…Development of automated network attack detection systems capable of adapting to the ever-changing nature of network attacks and new types of threats. …”
    Get full text
    Article
  2. 1522

    SSCANL decoder based joint iterative detection and decoding algorithm by Chongyang LIU, Rui GUO

    Published 2022-10-01
    “…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
    Get full text
    Article
  3. 1523

    Enhancing Weakly-Supervised Video Anomaly Detection With Temporal Constraints by Francisco Caetano, Pedro Carvalho, Christina Mastralexi, Jaime S. Cardoso

    Published 2025-01-01
    “…Anomaly Detection has been a significant field in Machine Learning since it began gaining traction. …”
    Get full text
    Article
  4. 1524

    Progress in Nondestructive Detection Techniques for Internal Defects of Agro-products by Rong PENG, Zhenzhen LÜ, Xuan LUO, Wen ZHANG

    Published 2025-08-01
    “…Internal defects can easily develop during the growth process of agro-products, significantly affecting their economic value. …”
    Get full text
    Article
  5. 1525

    Community Detection in Social Network Based on Node Influence Expansion by YANG Hailu, ZHAO Xin, CHEN Chen, WANG Lili

    Published 2023-06-01
    “…Finally, to finish the process of community detection, dynamic programming is employed for seed expansion.The results of the experiments reveal that community detection based on node influence expansion can effectively discover the community structure with small granularity and has certain performance advantages in modularity, D-score, and other indicators.…”
    Get full text
    Article
  6. 1526

    Impedance Spectrum Measurement and Fault Detection for XLPE Coaxial Cables by LIU Chunqi, LI Shufeng, HUANG Yu, CHEN Dongsheng

    Published 2024-10-01
    “… XLPE coaxial cables are prone to faults and defects in the process of power transmission, seriously jeopardizing the safe operation of the power system. …”
    Get full text
    Article
  7. 1527

    Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression by Kyusoon Kim, Seunghee Oh, Kiwook Bae, Hee-Seok Oh

    Published 2025-01-01
    “…Optical emission spectroscopy (OES) data is essential for virtual metrology, enabling accurate predictions of wafer performance in plasma etching processes. This approach not only reduces the need for physical measurements of product quality, leading to significant resource savings, but also supports improved decision-making, particularly in process control and quality assurance. …”
    Get full text
    Article
  8. 1528

    Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces by Rishi Gupta, Amit Kumar Gupta, Deepak Panwar, Ashish Jain, Partha Chakraborty

    Published 2023-01-01
    “…The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. …”
    Get full text
    Article
  9. 1529

    Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection by Kenan Kiliç, Kazım Kiliç, İbrahim Alper Doğru, Uğur Özcan

    Published 2025-01-01
    “…Detection of defects on wood during quality processes in the wood industry is extremely important both economically and in terms of production and use. …”
    Get full text
    Article
  10. 1530

    AI-driven epidemic intelligence: the future of outbreak detection and response by Jasleen Kaur, Jasleen Kaur, Zahid Ahmad Butt

    Published 2025-07-01
    “…Epidemic intelligence, the process of detecting, verifying, and analyzing public health threats to enable timely responses, traditionally relies heavily on manual reporting and structured data, often causing delays and coverage gaps. …”
    Get full text
    Article
  11. 1531

    Detecting House of Spirit Attacks by Glibc Heap Information Extraction by ZHAI Jiqiang, WANG Jiaqian, HAN Xu, SUN Haixu

    Published 2024-02-01
    “…The experimental results show that this method can effectively extract the heap information in the memory of the Linux system process,and successfully detect the House of Spirit attack in the memory based on the information combined with the attack detection algorithm.…”
    Get full text
    Article
  12. 1532

    Relative Pose Estimation of an Uncooperative Target with Camera Marker Detection by Batu Candan, Simone Servadio

    Published 2025-05-01
    “…This paper introduces a novel method to detect structural markers on the European Space Agency’s Environmental Satellite (ENVISAT) for safe de-orbiting using image processing and Convolutional Neural Networks (CNNs). …”
    Get full text
    Article
  13. 1533

    Combined Method for Informative Feature Selection for Speech Pathology Detection by D. S. Likhachov, M. I. Vashkevich, N. A. Petrovsky, E. S. Azarov

    Published 2023-08-01
    “…The task of detecting vocal abnormalities is characterized by a small amount of available data for training, as a consequence of which classification systems that use low-dimensional data are the most relevant. …”
    Get full text
    Article
  14. 1534

    Enhancing Fabric Detection and Classification Using YOLOv5 Models by Makara Mao, Jun Ma, Ahyoung Lee, Min Hong

    Published 2025-03-01
    “…The developed model detected and classified fabrics with an accuracy of 81.08%. …”
    Get full text
    Article
  15. 1535

    IOT System for Detecting Epileptic Seizures Based on Fuzzy Logic by Jehan A. abbas, Manaf K. Hussei, Riyadh A. Abbas

    Published 2025-06-01
    “…To achieve this the proposed system utilizes the STM32F103C8T6 microcontroller to process data from a 3-axis accelerometer, heart rate sensor and temperature sensor. …”
    Get full text
    Article
  16. 1536

    An Empirical Evaluation of Ensemble Models for Python Code Smell Detection by Rajwant Singh Rao, Seema Dewangan, Alok Mishra

    Published 2025-07-01
    “…Code smells, which represent poor design choices or suboptimal code implementations, reduce software quality and hinder the code maintenance process. Detecting code smells is, therefore, essential during software development. …”
    Get full text
    Article
  17. 1537

    Systematic Review of Deep Learning Techniques in Skin Cancer Detection by Carolina Magalhaes, Joaquim Mendes, Ricardo Vardasca

    Published 2024-11-01
    “…Nevertheless, these processes are strongly dependent on dermatologists’ experience, with excision advised only when cancer is suspected by a physician. …”
    Get full text
    Article
  18. 1538

    Anomaly Detection for Wireless Cellular Communication Based on Synthetic Anomaly by Hyeongwoo Kim, Jinha Kim, Youngseo Ji, Byungkwan Kim

    Published 2025-01-01
    “…The method achieved AUROC scores of 90% (image-level) and 82% (pixel-level) under ISR 0 dB, outperforming traditional unsupervised learning-based detection methods. An ablation study demonstrated the effectiveness of the synthetic anomaly generation process, highlighting its contribution to enhanced detection performance. …”
    Get full text
    Article
  19. 1539

    iSentenizer-μ: Multilingual Sentence Boundary Detection Model by Derek F. Wong, Lidia S. Chao, Xiaodong Zeng

    Published 2014-01-01
    “…The genres of data are often referred to the shifts of text topics and new languages domains. Although new detection models can be retrained for different languages or new text genres, previous model has to be thrown away and the creation process has to be restarted from scratch. …”
    Get full text
    Article
  20. 1540

    Analysis for Detecting Banana Leaf Disease Using the CNN Method by Nita Helmawati, Ema Utami

    Published 2025-03-01
    “…This accuracy confirms the potential of CNN in significantly improving the disease detection process on banana plants. This research is expected to help farmers identify diseases more quickly and accurately, thereby minimizing yield losses and increasing productivity. …”
    Get full text
    Article