Academic literature on the topic 'Detection approach'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Detection approach.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Detection approach"
Yeh, Cheng-Yu, and Shaw-Hwa Hwang. "Efficient Detection Approach for DTMF Signal Detection." Applied Sciences 9, no. 3 (2019): 422. http://dx.doi.org/10.3390/app9030422.
Full textR, Vijaya Geetha, Chetan S, K. Deepika, Kishore R, and Likitha S. "A MULTISCALE APPROACH BASED AUTOMATIC SHIP DETECTION." International Journal of Current Engineering and Scientific Research 6, no. 6 (2019): 33–39. http://dx.doi.org/10.21276/ijcesr.2019.6.6.7.
Full textLijo, V. P., and Hari Seetha. "A Distributed Approach for Tweet Polarity Detection." Journal of Advanced Research in Dynamical and Control Systems 11, no. 10-SPECIAL ISSUE (2019): 891–900. http://dx.doi.org/10.5373/jardcs/v11sp10/20192884.
Full textPervin, Tamanna, Sharmin Akter, Sadia Afrin, et al. "A Hybrid CNN-LSTM Approach for Detecting Anomalous Bank Transactions: Enhancing Financial Fraud Detection Accuracy." American Journal of Management and Economics Innovations 07, no. 04 (2025): 116–23. https://doi.org/10.37547/tajmei/volume07issue04-15.
Full textPervin, Tamanna, Sharmin Akter, Sadia Afrin, et al. "A Hybrid CNN-LSTM Approach for Detecting Anomalous Bank Transactions: Enhancing Financial Fraud Detection Accuracy." International Journal of Economics Finance & Management Science 10, no. 04 (2025): 47–54. https://doi.org/10.55640/ijefms/volume10issue04-04.
Full textLatha, Ch Madhavi. "Intrusion Detection on Smart Hotel through HISI Approach." Journal of Advanced Research in Dynamical and Control Systems 12, SP8 (2020): 393–401. http://dx.doi.org/10.5373/jardcs/v12sp8/20202537.
Full textSavenko, Oleg, Anatoliy Sachenko, Sergii Lysenko, George Markowsky, and Nadiia Vasylkiv. "BOTNET DETECTION APPROACH BASED ON THE DISTRIBUTED SYSTEMS." International Journal of Computing 19, no. 2 (2020): 190–98. http://dx.doi.org/10.31891/1727-6209/2020/19/2-190-198.
Full textP, Dinesh, Aakash Prabhu P, and Rajaesh Kanna R. "Modeling of Social Distancing Detection UsingDeep Learning Approach." International Journal of Research Publication and Reviews 4, no. 5 (2023): 1646–52. http://dx.doi.org/10.55248/gengpi.234.5.40503.
Full textI, I., I. I, and I. I. "Detection of Traditional Costumes: A Computer Vision Approach." Korean Institute of Smart Media 12, no. 11 (2023): 125–33. http://dx.doi.org/10.30693/smj.2023.12.11.125.
Full textKaur, Amandeep, and Mandeep Singh Sandhu. "SOFTWARE CODE CLONE DETECTION MODEL USING HYBRID APPROACH." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (2012): 275–78. http://dx.doi.org/10.24297/ijct.v3i2b.2875.
Full textDissertations / Theses on the topic "Detection approach"
McGuinness, Kevin. "Cough detection. a physiological approach." Thesis, University of Manchester, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.528494.
Full textYerra, Rajiv. "Detecting Similar HTML Documents Using A Sentence-Based Copy Detection Approach." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd977.pdf.
Full textYadav, Kamna. "Improving Accuracy of the Edgebox Approach." DigitalCommons@USU, 2018. https://digitalcommons.usu.edu/etd/7326.
Full textFischer, Anja, and Zak Blacher. "An Ontological Approach to SIP DoS Detection." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-5100.
Full textMorales, Jose Andre. "A Behavior Based Approach to Virus Detection." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/41.
Full textEriksson, André. "Anomaly Detection inMachine-Generated Data:A Structured Approach." Thesis, KTH, Matematisk statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121549.
Full textRobinson, J. D. "Statistical approach to fault detection of gears." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/27285.
Full textAlsallal, M. "A machine learning approach for plagiarism detection." Thesis, Coventry University, 2016. http://curve.coventry.ac.uk/open/items/7e903a56-4845-4852-b1a8-2849b1cdb08a/1.
Full textWang, Xi Ph D. Massachusetts Institute of Technology. "A differential approach to undefined behavior detection." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93071.
Full textLee, Ann Ph D. Massachusetts Institute of Technology. "A comparison-based approach to mispronunciation detection." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/75660.
Full textBooks on the topic "Detection approach"
H, Cotton Richard G., Edkins E, and Forrest S, eds. Mutation detection: A practical approach. IRL Press at Oxford University Press, 1998.
Find full text-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. Imperial College Press, 2011.
Find full textRobinson, J. D. Statistical approach to fault detection of gears. Naval Postgraduate School, 1989.
Find full textCentre, Bhabha Atomic Research, ed. Seismic signal detection by fractal dimension approach. Bhabha Atomic Research Centre, 2003.
Find full textAbo-Amer, Aly E. Molecular approach for detection of waterborne pathogens. Nova Science Publisher's, 2011.
Find full textMoyer, Ellen E. Economics of leak detection: A case study approach. American Water Works Association, 1985.
Find full textBonnie, Brandl, ed. Elder abuse detection and intervention: A collaborative approach. Springer, 2007.
Find full textCho, C. K. Practical approach to prevention and detection of fraud. South Eastern Publishers, 2012.
Find full textNing, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Springer US, 2004.
Find full textWallin, P. Foreign body prevention, detection, and control: A practical approach. Blackie Academic & Professional, 1998.
Find full textBook chapters on the topic "Detection approach"
Tuzlukov, Vyacheslav P. "Generalized Approach." In Signal Detection Theory. Birkhäuser Boston, 2001. http://dx.doi.org/10.1007/978-1-4612-0187-8_4.
Full textTuzlukov, Vyacheslav P. "Generalized Approach: Communications." In Signal Detection Theory. Birkhäuser Boston, 2001. http://dx.doi.org/10.1007/978-1-4612-0187-8_6.
Full textAngelov, Plamen P., and Xiaowei Gu. "Anomaly Detection—Empirical Approach." In Empirical Approach to Machine Learning. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02384-3_6.
Full textEichmann, David, and Padmini Srinivasan. "A Cluster-Based Approach to Broadcast News." In Topic Detection and Tracking. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0933-2_8.
Full textVrij, Aldert. "A Cognitive Approach to Lie Detection." In Detecting Deception. John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch9.
Full textChen, Hsin-Hsi, and Lun-Wei Ku. "An NLP & IR Approach to Topic Detection." In Topic Detection and Tracking. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0933-2_12.
Full textAdolph, Karen E., Justine E. Hoch, and Ori Ossmy. "James Gibson’s Ecological Approach to Locomotion and Manipulation." In Perception as Information Detection. Routledge, 2019. http://dx.doi.org/10.4324/9780429316128-14.
Full textAngelov, Plamen P., and Xiaowei Gu. "Applications of Autonomous Anomaly Detection." In Empirical Approach to Machine Learning. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02384-3_10.
Full textHao, Chengpeng, Danilo Orlando, Jun Liu, and Chaoran Yin. "Adaptive Radar Detection: Classical Approach." In Advances in Adaptive Radar Detection and Range Estimation. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6399-4_2.
Full textShaw, Robert, and Jeffrey Kinsella-Shaw. "The Challenge of an Ecological Approach to Event Perception." In Perception as Information Detection. Routledge, 2019. http://dx.doi.org/10.4324/9780429316128-7.
Full textConference papers on the topic "Detection approach"
Manzoor, Er Suhail, Radhika Malhotra, Rahul Bhat, and Shivam Shekhar. "Apple Detection: A CNN Approach for Diseases Detection." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690497.
Full textPang, Hongbo, and Changcheng Huang. "Pedestrian Detection: An Explainable Approach." In 2024 International Conference on Machine Learning and Applications (ICMLA). IEEE, 2024. https://doi.org/10.1109/icmla61862.2024.00146.
Full textKanna, R. Kishore, R. Anitha, K. Sundaramoorthy, Ayodeji Olalekan Salau, Nirdesh Sikarwar, and Tuhina Panda. "Computational Approach for Cardiac Defect Detection using CNN Approach." In 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON). IEEE, 2024. https://doi.org/10.1109/nigercon62786.2024.10927174.
Full textKöhler, Jelena, Aurélien Benoit-Lévy, Pablo Correa, et al. "Next-Generation Triggering: A Novel Event-Level Approach." In 10th International Workshop on Acoustic and Radio EeV Neutrino Detection Activities. Sissa Medialab, 2024. http://dx.doi.org/10.22323/1.470.0061.
Full textBlum, Ashlae. "A Temporal Approach to Unsupervised Anomaly Detection." In A Temporal Approach to Unsupervised Anomaly Detection. US DOE, 2021. http://dx.doi.org/10.2172/1825324.
Full textSimango, Doubt, Tawanda Mushiri, Abid Yahya, and Jacqueline Kiwa. "An automated wound detection system." In ADVANCES IN INTELLIGENT APPLICATIONS AND INNOVATIVE APPROACH. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0126327.
Full textUsenov, Iskander, Tatiana Sakharova, Alexander Novikov, Andrey Bogomolov, Alexey Bocharnikov, and Viacheslav Artyushenko. "Fiber sensors with multispectral approach for biomedical and industrial applications." In Optical Sensing and Detection VII, edited by Francis Berghmans and Ioanna Zergioti. SPIE, 2022. http://dx.doi.org/10.1117/12.2624472.
Full textMcCartney, C. T. "New vehicle security assessment - a practical insurance approach." In European Convention on Security and Detection. IEE, 1995. http://dx.doi.org/10.1049/cp:19950505.
Full textAyyavu, Udhaya Kumar, Sathish Kumar Shanmugam, Aarul Venkatesan, Gokul Alagarasan, Hariharan Selvakumar, and Karthick Palanisamy. "Underground cable fault detection using Raspberry Pi." In ADVANCES IN INTELLIGENT APPLICATIONS AND INNOVATIVE APPROACH. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0141635.
Full textAlminshid, Khalid, and Mohd Nizam Omar. "Detecting backdoor using stepping stone detection approach." In 2013 Second International Conference on Informatics & Applications (ICIA 2013). IEEE, 2013. http://dx.doi.org/10.1109/icoia.2013.6650235.
Full textReports on the topic "Detection approach"
Michels, James H. A Parametric Detection Approach Using Multichannel Processes. Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada219328.
Full textTaylor, John Aaron. An axial approach to detection in capillary electrophoresis. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/10116795.
Full textDevaney, A. J., R. Raghavan, H. Lev-Ari, E. Manolakos, and M. Kokar. Automatic Target Detection And Recognition: A Wavelet Based Approach. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada329696.
Full textDixit, Arati M., Harpreet Singh, and Thomas Meitzler. Soft Computing Approach to Crack Detection and FPGA Implementation. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada570058.
Full textGupta, Vijay. Control of Sensors for Sequential Detection: A Stochastic Approach. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592031.
Full textRichardson, Thomas J., and Sanjoy K. Mitter. Scaling Results for the Variational Approach to Edge Detection. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada459531.
Full textPanta, Manisha, Md Tamjidul Hoque, Kendall Niles, Joe Tom, Mahdi Abdelguerfi, and Maik Flanagin. Deep learning approach for accurate segmentation of sand boils in levee systems. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/49460.
Full textBaltzell, Kimberly. Exploring Early Detection Methods: Using the Intraductal Approach to Predict Breast Cancer. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada442994.
Full textCandy, J. V. CHIRP-Like Signals: Estimation, Detection and Processing A Sequential Model-Based Approach. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1297653.
Full textBaltzell, Kimberly, and Marylin Dodd. Exploring Early Detection Methods: Using the Intraductal Approach to Predict Breast Cancer. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada457467.
Full text