Showing 1,961 - 1,980 results of 20,691 for search 'detection process', query time: 0.22s Refine Results
  1. 1961

    Detection of Inception Cavitation in Centrifugal Pump by Fluid-Borne Noise Diagnostic by Liang Dong, Yuqi Zhao, Cui Dai

    Published 2019-01-01
    “…The change laws of total level of vibration and noise signals throughout the cavitation process were emphatically investigated. After comparing the sensitivity and reliability of different detection methods, the method based on overall sound pressure level of liquid-borne noise is found to present high sensitivity to cavitation. …”
    Get full text
    Article
  2. 1962

    Early surface crack detection and localization in structures: an artificial intelligence approach by Biswarup Yogi, Sourav Kumar Das, Soham Modak, Aritra Biswas, Satyabrata Roy

    Published 2025-08-01
    “…Abstract Detecting cracks on the roof is crucial for protecting buildings. …”
    Get full text
    Article
  3. 1963

    Through-Wall Detection with LS-SVM under Unknown Wall Characteristics by Fangfang Wang, Yerong Zhang, Huamei Zhang

    Published 2016-01-01
    “…In this paper, a two-step procedure for the through-wall detection is proposed. Firstly, an effective clutter mitigation method based on singular value decomposition (SVD) is used. …”
    Get full text
    Article
  4. 1964

    Detective Gadget: Generic Iterative Entity Resolution over Dirty Data by Marcello Buoncristiano, Giansalvatore Mecca, Donatello Santoro, Enzo Veltri

    Published 2024-11-01
    “…Detective Gadgetemploys an alias-based hashing mechanism for fast and scalable matching, check functions to detect and correct mismatches, and a human-in-the-loop framework to refine results through expert feedback. …”
    Get full text
    Article
  5. 1965
  6. 1966

    Spectral Clustering-Guided News Environments Perception for Fake News Detection by Kun Wang, Yuzhen Yang, Xiaoyang Wang

    Published 2024-01-01
    “…Finally, we provide textual perspective and stylistic perspective approaches during the detection process and soften the loss terms in multiple environments to alleviate the strict constraints, thus making it more compatible with the fake news detection task. …”
    Get full text
    Article
  7. 1967
  8. 1968

    MHFS-FORMER: Multiple-Scale Hybrid Features Transformer for Lane Detection by Dongqi Yan, Tao Zhang

    Published 2025-05-01
    “…Furthermore, a significant drawback of most existing lane-detection algorithms lies in their reliance on complex post-processing and strong prior knowledge. …”
    Get full text
    Article
  9. 1969

    Enhancing credit card fraud detection: highly imbalanced data case by Dalia Breskuvienė, Gintautas Dzemyda

    Published 2024-12-01
    “…Given the inherent imbalance in fraud detection data, feature selection must be done with an enhanced focus. …”
    Get full text
    Article
  10. 1970

    BEHAVE - facilitating behaviour coding from videos with AI-detected animals by Reinoud Elhorst, Martyna Syposz, Katarzyna Wojczulanis-Jakubas

    Published 2025-07-01
    “…The results are saved in a .csv file for further processing. BEHAVE includes a component that allows doing AI detections, on non-specialised hardware, also in a zero-install, user-friendly way. …”
    Get full text
    Article
  11. 1971

    Shifting of Research Trends in Fault Detection and Estimation of Location in Power System by Mallinath, Soham Dutta, Jayalakshimi N. S., Vinay Kumar Jadoun

    Published 2025-01-01
    “…Fault detection is a critical process in ensuring the reliability and safety of modern power systems. …”
    Get full text
    Article
  12. 1972

    Parametric Design of Steel Ball Automatic Detection System Based on VB by ZHAO Yanling, WANG Qiyu, BAO Yudong, PAN Chengyi, ZHAO Zhiqiang

    Published 2020-10-01
    “…Firstly, establishing the template model library of steel ball automatic detection system, and the library is divided into general parts model library and key parts design library through analyzing the function structure, using SolidWorks part design table function realizes parametric design of key components; Calling the model library to complete the establishment of detection system virtual assembly model, and using SolidWorks macro function to make the driver program of key parts and assembly model,Finally, the simulation technology is used to simulate the process of steel ball, and the correctness of the theoretical analysis results is verified Finally, the parametric design method of automatic detection system of steel ball is put forward…”
    Get full text
    Article
  13. 1973

    Detection of Malicious Clients in Federated Learning Using Graph Neural Network by Anee Sharma, Ningrinla Marchang

    Published 2025-01-01
    “…However, due to its distributed nature, this paradigm is susceptible to adversarial threats such as sign-flipping attacks, in which malicious clients reverse model parameter signs in order to poison the global aggregation process. This study introduces a detection framework that is graph-based and leverages Graph Attention Networks (GATs) to overcome these challenges. …”
    Get full text
    Article
  14. 1974

    Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques by Yadigar Imamverdiyev, Elshan Baghirov, John Chukwu Ikechukwu

    Published 2025-01-01
    “…The analysis revealed vital features significantly impacting malware detection, such as process services, active services, file handles, registry keys, and callback functions. …”
    Get full text
    Article
  15. 1975

    Automated Seizure Detection through EEG Analysis and Deep Learning Technique by Srinivas Nowduri, M. Madhusudhana Subramanyam

    Published 2024-06-01
    “…This is because neurologists are burdened with analyzing electroencephalogram (EEG) data via visual inspection, and automating the process can reduce their workload. However, one of the challenges of automatic seizure detection using EEG analysis is extracting optimal features that can distinguish between different states of epilepsy. …”
    Get full text
    Article
  16. 1976

    Multimodal fusion based few-shot network intrusion detection system by Congyuan Xu, Yong Zhan, Zhiqiang Wang, Jun Yang

    Published 2025-07-01
    “…Existing few-shot learning methods, while reducing reliance on large datasets, mostly handle single-modality data and fail to fully exploit complementary information across different modalities, limiting detection performance. To address this challenge, we introduce a multimodal fusion based few-shot network intrusion detection method that merges traffic feature graphs and network feature sets. …”
    Get full text
    Article
  17. 1977

    Longitudinal tear detection system for belt conveyor based on deep learning by Zhiqiang YU, Xiangsheng PAN, Wei JIANG

    Published 2025-07-01
    “…In response to the common problems faced by belt conveyors in the field of longitudinal tear detection, such as high missed detection rate, frequent false alarms, and insufficient intelligence level, we develop an intelligent detection system for longitudinal tearing of strip surfaces that integrates machine vision and line laser technology. …”
    Get full text
    Article
  18. 1978
  19. 1979

    PVLF: point-voxel local feature fusion for 3D detection by Haowei Zhao, Zhuolei Xiao

    Published 2025-06-01
    “…PVLF explores local spatial features to improve accuracy regarding tiny object detection. To address the potential complex computational issues in the convolution process, we have designed an innovative Adaptive Sparse Convolution (ASC) module that effectively eliminates redundant information in the feature layer. …”
    Get full text
    Article
  20. 1980

    Application of Deep Learning in Food Safety Detection and Risk Early Warning by DING Haohan, WANG Long, HOU Haoke, XIE Zhenqi, HAN Yu, CUI Xiaohui

    Published 2025-03-01
    “…The application of deep learning in food safety detection and risk early warning is becoming more and more extensive, thus providing new opportunities for improving food safety, quality control and authenticity identification. …”
    Get full text
    Article