Showing 1,621 - 1,640 results of 20,691 for search 'detection process', query time: 0.20s Refine Results
  1. 1621
  2. 1622

    Concept Drift Detection Based on Deep Neural Networks and Autoencoders by Lisha Hu, Yaru Lu, Yuehua Feng

    Published 2025-03-01
    “…In domains such as fraud detection, healthcare, and industrial equipment maintenance, streaming data often exhibit characteristics such as continuous generation, high real-time processing requirements, and complex distributions, making it susceptible to concept drift. …”
    Get full text
    Article
  3. 1623

    Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection by Lu Haowen

    Published 2025-01-01
    “…With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption. …”
    Get full text
    Article
  4. 1624

    Detection of smoke from infrared image frames in the aircraft cargoes by Li Deng, Qian Chen, Yuanhua He, Xiubao Sui, Qin Wang

    Published 2021-04-01
    “…Since, in the cargo of civil aircraft, visible image processing technology cannot be used to detect smoke in the event of a fire due to the closed dark environment, a novel smoke detection method using infrared image processing technology is presented. …”
    Get full text
    Article
  5. 1625

    Dynamics of the island mass effect – Part 1: Detecting the extent by G. Bourdin, L. Karp-Boss, L. Karp-Boss, F. Lombard, G. Gorsky, E. Boss

    Published 2025-07-01
    “…<p>In the vast Pacific Ocean, remote islands and atolls induce mesoscale and sub-mesoscale processes that significantly impact the surrounding oligotrophic ocean, collectively referred to as the island mass effect (IME). …”
    Get full text
    Article
  6. 1626

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  7. 1627
  8. 1628

    Ensemble Transformer–Based Detection of Fake and AI–Generated News by Md. Ishraquzzaman, Mohammed Ashraful Islam Chowdhury, Shahreen Rahman, Riasat Khan

    Published 2025-01-01
    “…This work leverages advanced natural language processing, machine learning, and deep learning algorithms to effectively detect fake and AI–generated content. …”
    Get full text
    Article
  9. 1629

    Detection and quantification of methane plumes with the MethaneAIR airborne spectrometer by L. Guanter, L. Guanter, J. Warren, M. Omara, A. Chulakadabba, A. Chulakadabba, J. Roger, M. Sargent, J. E. Franklin, S. C. Wofsy, R. Gautam

    Published 2025-08-01
    “…In this work, we present a computationally efficient data processing chain optimized for the detection and quantification of methane plumes with MethaneAIR. …”
    Get full text
    Article
  10. 1630
  11. 1631
  12. 1632
  13. 1633
  14. 1634
  15. 1635
  16. 1636
  17. 1637
  18. 1638
  19. 1639
  20. 1640

    Defect detection based on extreme edge of defective region histogram by Zouhir Wakaf, Hamid A. Jalab

    Published 2018-01-01
    “…Automatic thresholding has been used by many applications in image processing and pattern recognition systems. Specific attention was given during inspection for quality control purposes in various industries like steel processing and textile manufacturing. …”
    Get full text
    Article