Showing 1,821 - 1,840 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 1821

    Algorithms of diagnosis and therapy of a primary depressive episode by V. L. Pidlubnyi, V. S. Makoid

    Published 2023-07-01
    “…The proposed diagnostic and treatment algorithms are reliable enough to detect and treat such a category as the primary depressive episode. …”
    Get full text
    Article
  2. 1822

    REASONING FOR THE USE OF TEMPORO-MANDIBULAR DISORDER DIAGNOSTIC ALGORITHMS by V. Makeyev, U. Telishevska, A. Kucher

    Published 2018-03-01
    “…The degree of necessity and sequence of application of methods of radial investigation of temporo-mandibular disorders is taken into account using these algorithms. The algorithm based on organ principle unites information of different radial investigation methods in detecting structural disorders in soft tissue and bone tissue elements of the joint. …”
    Get full text
    Article
  3. 1823

    An Innovative Analysis of Time Series-Based Detection Models for Improved Cancer Detection in Modern Healthcare Environments by Uma Shankari Srinivasan, Venkat Pavithra, Kaliappan Sutha, Sridevi Ramachandiran, Nallathambi Indumathi

    Published 2023-12-01
    “…Early detection of cancer is important for successful treatment and improved survival of many cancer types. …”
    Get full text
    Article
  4. 1824

    Enhanced Detection of Intrusion Detection System in Cloud Networks Using Time-Aware and Deep Learning Techniques by Nima Terawi, Huthaifa I. Ashqar, Omar Darwish, Anas Alsobeh, Plamen Zahariev, Yahya Tashtoush

    Published 2025-07-01
    “…This study introduces an enhanced Intrusion Detection System (IDS) framework for Denial-of-Service (DoS) attacks, utilizing network traffic inter-arrival time (IAT) analysis. …”
    Get full text
    Article
  5. 1825
  6. 1826

    Detecting LDoS attack based on ASPQ by Jing ZHANG, Hua-ping HU, Bo LIU, Feng-tao XIAO

    Published 2012-05-01
    “…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
    Get full text
    Article
  7. 1827
  8. 1828

    About Detection of Code Reuse Attacks by Yury V. Kosolapov

    Published 2019-06-01
    “…The developed algorithm is based on a modified QEMU virtualization system. …”
    Get full text
    Article
  9. 1829

    Trajectory of Fifths in Tonal Mode Detection by Tomasz Lukaszewicz, Dariusz Kania

    Published 2025-01-01
    “…The results indicate high detection accuracy, demonstrating the algorithm’s potential for reliable tonal mode identification.…”
    Get full text
    Article
  10. 1830

    Microarray Core Detection by Geometric Restoration by Jimmy C. Azar, Christer Busch, Ingrid B. Carlbom

    Published 2012-01-01
    “…The results show that the proposed method is able to reconstruct core locations without any evidence of localization. Furthermore, the algorithm is more efficient than existing methods based on the Hough transform for circle detection. …”
    Get full text
    Article
  11. 1831

    EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES by Anastasiya V. Vasileva

    Published 2016-08-01
    “…The article presents the methodological and technical foundations of the study evaluating the effectiveness of measures to detect misuse of resources. The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
    Get full text
    Article
  12. 1832

    Detection of the permutation symmetry in pattern sets by Dong Ji-Yang, Zhang Jun-Ying

    Published 2006-01-01
    “…In this paper, a genetic algorithm-based permutation symmetry detection approach is proposed for pattern set. …”
    Get full text
    Article
  13. 1833

    Moving Object Detection for Video Surveillance by K. Kalirajan, M. Sudha

    Published 2015-01-01
    “…In this paper, a novel approach of object detection for video surveillance is presented. The proposed algorithm consists of various steps including video compression, object detection, and object localization. …”
    Get full text
    Article
  14. 1834

    High-Precision Chip Detection Using YOLO-Based Methods by Ruofei Liu, Junjiang Zhu

    Published 2025-07-01
    “…Experimental results show that the ghost module reduces the FLOPs from 6.48 G to 5.72 G compared to YOLOv11n, with a negligible accuracy loss, while the DNMS algorithm improves the debris detection precision across different YOLO versions. …”
    Get full text
    Article
  15. 1835
  16. 1836

    Road Obstacle Detection Method Based on Improved YOLOv5 by Pengliu Tan, Zhi Wang, Xin Chang

    Published 2025-05-01
    “…To address these issues, an enhanced obstacle detection algorithm based on YOLOv5 (YOLOv5-EC3F) is proposed. …”
    Get full text
    Article
  17. 1837
  18. 1838
  19. 1839
  20. 1840

    SMALL OBJECT DETECTION APPROACH BASED ON ENHANCED SINGLE-SHOT DETECTOR FOR DETECTION AND RECOGNITION OF INDONESIAN TRAFFIC SIGNS by Phie Chyan, Norbertus Tri Suswanto Saptadi, Jeremias Mathias Leda

    Published 2024-10-01
    “…Addressing these challenges, this research proposes an enhanced version of the single shot detector (SSD) algorithm, commonly used in object detection, to improve the algorithm's ability to detect small objects. …”
    Get full text
    Article