Showing 1,861 - 1,880 results of 20,691 for search 'detection process', query time: 0.21s Refine Results
  1. 1861
  2. 1862
  3. 1863
  4. 1864
  5. 1865

    Soybeans tempeh image dataset for tempeh maturity detectionGitHub by Riccosan, Soni Yora, Nur Azmi Karim, Ezrela Fidelyn Surya Wibisana

    Published 2025-08-01
    “…The creation of tempeh until now still utilizes the traditional method from the beginning, observation, until the collection of the final product, which still includes the human role inside the process. The process of creating tempeh products takes approximately 1 to 4 days. …”
    Get full text
    Article
  6. 1866
  7. 1867
  8. 1868

    Vahagn: VisuAl Haptic Attention Gate Net for slip detection by Jinlin Wang, Yulong Ji, Hongyu Yang

    Published 2024-11-01
    “…The success of a specific grasping maneuver is contingent upon the confluence of two factors: the spatial accuracy of the contact and the stability of the continuous process.MethodsIn this paper, for the task of perceiving grasping results using visual-haptic information, we propose a new method for slip detection, which synergizes visual and haptic information from spatial-temporal dual dimensions. …”
    Get full text
    Article
  9. 1869

    Related and independent variable fault detection method based on KPCA-SVM by GUO Jinyu, YU Huan, LI Yuan

    Published 2023-01-01
    “…In the real industrial process, some process variables are independent of other variables, a fault detection method of related and independent variable based on kernel principal component analysis and support vector machine (KPCA-SVM) is proposed to detect these independent variables separately from related variables. …”
    Get full text
    Article
  10. 1870

    Lightweight malicious domain name detection model based on separable convolution by Luhui YANG, Huiwen BAI, Guangjie LIU, Yuewei DAI

    Published 2020-12-01
    “…The application of artificial intelligence in the detection of malicious domain names needs to consider both accuracy and calculation speed,which can make it closer to the actual application.Based on the above considerations,a lightweight malicious domain name detection model based on separable convolution was proposed.The model uses a separable convolution structure.It first applies depthwise convolution on every input channel,and then performs pointwise convolution on all output channels.This can effectively reduce the parameters of convolution process without impacting the effectiveness of convolution feature extraction,and realize faster convolution process while keeping high accuracy.To improve the detection accuracy considering the imbalance of the number and difficulty of positive and negative samples,a focal loss function was introduced in the training process of the model.The proposed algorithm was compared with three typical deep-learning-based detection models on a public data set.Experimental results denote that the proposed algorithm achieves detection accuracy close to the state-of-the-art model,and can significantly improve model inference speed on CPU.…”
    Get full text
    Article
  11. 1871

    Comparative study of apoptosis-detecting techniques: TUNEL, apostain, and lamin B by Jirina Prochazkova, Dana Kylarova, Pavel Vranka, Vaclav Lichnovsky

    Published 2003-09-01
    “…Unfortunately, so is its detection. The concept of detection sensitivity reflects not only the ability of a particular technique to label most of the cells displaying the appropriate marker but also the possibility of labeling cells in the earliest phase of the apoptotic process. …”
    Get full text
    Article
  12. 1872

    AI-based defect detection and self-healing in metal additive manufacturing by Jan Akmal, Kevin Minet-Lallemand, Jukka Kuva, Tatu Syvänen, Pilvi Ylander, Tuomas Puttonen, Roy Björkstrand, Jouni Partanen, Olli Nyrhilä, Mika Salmi

    Published 2025-12-01
    “…This pilot study develops a process to evaluate in-situ defect detection and self-healing in Ti-6Al-4V fabricated using laser-based powder bed fusion. …”
    Get full text
    Article
  13. 1873

    On Some Issues of Handprints Detection and the Mechanism of Trace Formation on Porous Surfaces by V. A. Vasil’ev, T. A. Ermakova, Yu. A. Druzhinin, I. B. Afanas’ev, T. Yu. Yudina, E. Yu. Rusanov

    Published 2020-10-01
    “…For more comprehensive research of this process, the authors of the article have conducted multiple experiments on the ninhydrin reaction with the sweat and grease of the deposits, analyzed the interaction of the chemical agent with the sweat and grease, with the properties of porous (paper) materials using electron microscopy, and also looked into the display features of pore and edgeoscopic signs in the deposits under different storage conditions.As a result of the research, it is shown that such parameters of deposits carriers (paper) as porosity and hydrophilic properties and ambient humidity as well as the time of storage have a significant influence on the process of detecting the sweat and grease deposits on porous surfaces and their quality.…”
    Get full text
    Article
  14. 1874

    Attention U-Net-based semantic segmentation for welding line detection by Hunor István Lukács, Bence Zsolt Beregi, Balázs Porteleki, Tamás Fischl, János Botzheim

    Published 2025-05-01
    “…Abstract In industrial processes, quality assurance through methods such as visual inspection is essential for ensuring process stability. …”
    Get full text
    Article
  15. 1875
  16. 1876

    Design of Display Software for Vehicle-mounted Catenary Detection Device on EMUs by LI Rui, YANG Wuzhou, RAO Tiangui

    Published 2019-01-01
    “…To this end, this paper presented a design of high-definition display software for EMU vehicle-mounted catenary detection device. It adopts the idea of modular design, separating the interface display and data communication, separating the video data processing and video display process. …”
    Get full text
    Article
  17. 1877

    A Deep Learning and Transfer Learning Approach for Vehicle Damage Detection by Lin Li, Koshin Ono, Chun-Kit Ngan

    Published 2021-04-01
    “…For insurance companies, it is very time-consuming and expensive to process claims for detecting and classifying vehicle damages; thus, deep learning techniques have been used to automate this process to reduce the time and the cost. …”
    Get full text
    Article
  18. 1878

    Application of Closed Reconstruction Method in Error Detection of RV Cycloidal Gear by Meng Tian, Tianxing Li, Yulong Li, Jinfan Li

    Published 2021-08-01
    “…Cycloidal gear adopts one-dimensional probe sampling mechanism when detecting on the gear measuring center. Due to the sensitive direction of one-dimensional probe is inconsistent with the definition direction of tooth profile normal error, the error calculation process is tedious, and even the error result is inaccurate, which can not truly reflect the machining shape of the actual tooth profile. …”
    Get full text
    Article
  19. 1879

    A Small Target Pedestrian Detection Model Based on Autonomous Driving by Yang Zhang, Shuaifeng Zhang, Dongrong Xin, Dewang Chen

    Published 2023-01-01
    “…To improve the accuracy of small-target pedestrian detection and the anti-interference ability of the model, a small-target pedestrian detection model that fuses residual networks and feature pyramids is proposed. …”
    Get full text
    Article
  20. 1880

    Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection by Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Fathi Amsaad, Ansagan Manasov, Salim Hariri, Banu B. Yergaliyeva, Aziz Alotaibi

    Published 2022-01-01
    “…The clickbait search process is accomplished by incorporating the binary search features for a faster and more efficient search process for malicious content-detection. …”
    Get full text
    Article