<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Detecting moving targets in dual-channel high resolution spaceborne SAR images with a compound detection scheme
2
Detecting moving targets in multiple-channel SAR via double thresholding
3
Detecting moving targets in SAR imagery by focusing
4
Detecting moving targets in SAR via keystoning and multiple phase center interferometry
5
Detecting moving text in video using temporal information
6
Detecting MPLS L3 VPN misconfiguration with the MINA algorithm
7
Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks
8
Detecting multi-channel wireless microphone user emulation attacks in white space with noise
9
Detecting multilingual text in natural scene
10
Detecting multi-mode MIMO signals: Algorithm and architecture design
11
Detecting multipath signals with the matched-lag filter
12
Detecting multiple aliases in social media
13
Detecting multiple copies in tampered images
14
Detecting multiple image motions by exploiting temporal coherence of apparent motion
15
Detecting multiple information sources in networks under the SIR model
16
Detecting multiple moving objects in crowded environments with coherent motion regions
17
Detecting multiple moving targets using deformable contours
18
Detecting multiple slow-moving targets in SAR images
19
Detecting multiple solutions in state estimation in the presence of current magnitude measurements
20
Detecting multiple symmetries with extended SIFT
21
Detecting multiple userids on Korean social media for mining TV audience response
22
Detecting Multipliers of Jihadism on Twitter
23
Detecting music in ambient audio by long-window autocorrelation
24
Detecting Musical Genre Borders for Multi-label Genre Classification
25
Detecting Musical Sounds in Broadcast Audio Based on Pitch Tuning Analysis
26
Detecting mustard gas using high Q-value SAW resonator gas sensors
27
Detecting Mutual Awareness Events
28
Detecting mutual consistency of shared objects
29
Detecting Mutual Consistency of Shared Objects
30
Detecting mutual functional gene clusters from multiple related diseases
31
Detecting mutually-salient landmark pairs with MRF regularization
32
Detecting myocardial infarction with a numerical expansion technique: effects of data pooling
33
Detecting Myocardial Infraction Using VCG Leads
34
Detecting myocardial ischemia with 2-D spectrum analysis of VCG signals
35
Detecting Natural ``Plateaus´´ in One-Dimensional Patterns
36
Detecting Naturalistic Expressions of Nonbasic Affect Using Physiological Signals
37
Detecting Navel Orange Canker with Hyperspectral Imaging
38
Detecting NBTI induced failures in SRAM core-cells
39
Detecting near collisions for satellites
40
Detecting near-duplicate document images using interest point matching
41
Detecting near-replicas on the Web by content and hyperlink analysis
42
Detecting Network Anomalies in Mixed-Attribute Data Sets
43
Detecting Network Anomalies Using Different Wavelet Basis Functions
44
Detecting network attacks using behavioural models
45
Detecting Network Attacks via Improved Iterative Scaling
46
Detecting network events via T-entropy
47
Detecting network intrusion using Probabilistic Neural Network
48
Detecting network intrusions via a statistical analysis of network packet characteristics
49
Detecting network intrusions via sampling: a game theoretic approach
50
Detecting network neutrality violations through packet loss statistics
51
Detecting Network-Wide and Router-Specific Misconfigurations Through Data Mining
52
Detecting network-wide traffic anomalies based on robust multivariate probabilistic calibration model
53
Detecting Network-Wide Traffic Anomalies Based on Spatial HMM
54
Detecting neural changes during stress and fatigue effectively: a comparison of spectral analysis and sample entropy
55
Detecting Neural Decision Patterns Using SVM-Based EEG Classification
56
Detecting neurohumoral influences on the heart by analysis of monophasic action potentials measured with fractally coated leads
57
Detecting neuropathy using measures of motor unit activation extracted from standard concentric needle electromyographic signals
58
Detecting New and Emerging Events from Textual Sources
59
Detecting new classes via infinite warped mixture models for hyperspectral image analysis
60
Detecting New Decentralized Botnet Based on Kalman Filter and Multi-chart CUSUM Amplification
61
Detecting new forms of network intrusion using genetic programming
62
Detecting New Ice In The Arctic From Infrared Multispectral Data Of AVHRR
63
Detecting New P2P Botnet with Multi-chart CUSUM
64
Detecting New Stable Objects In Surveillance Video
65
Detecting news reporting using audio/visual information
66
Detecting NO2 with APSFET, an adsorption porous silicon FET
67
Detecting Node Misbehavior in Ad hoc Networks
68
Detecting noise trading using fuzzy exception learning
69
Detecting Non-compliant Consumers in Spatio-Temporal Health Data: A Case Study from Medicare Australia
70
Detecting nondeterminacy in parallel programs
71
Detecting non-habitual life behaviour using probabilistic finite automata behaviour model
72
Detecting non-hydrogen containing species with field effect devices
73
Detecting nonlinear causal interactions between dynamical systems by non-uniform embedding of multiple time series
74
Detecting non-linear dynamics in financial time series
75
Detecting nonlinear mixtures in hyperspectral images
76
Detecting nonlinear patterns in physiological signals
77
Detecting Nonlinear Properties of Snoring Sounds for Sleep Apnea Diagnosis
78
Detecting nonlinearities in time series of machining processes
79
Detecting nonlinearity and phase synchronization with surrogate data
80
Detecting nonlinearity in multichannel epileptic EEG
81
Detecting nonlinearity in prediction residuals of snoring sounds
82
Detecting non-locality in macroscopic systems
83
Detecting non-magnetic conducting flat plates with pulsed Remote Eddy Current Field technique
84
Detecting Non-Technical Losses in Radial Distribution System Transformation Point through the Real Time State Estimation Method
85
Detecting non-transient anomalies in visual information using neural networks
86
Detecting novel business blogs
87
Detecting Novel Discrepancies in Communication Networks
88
Detecting novel multi-variable associations in big data based on MIC
89
Detecting novel scans through pattern anomaly detection
90
Detecting N-particle interference patterns with linear N-port analyzers
91
Detecting null alleles with vasarely charts
92
Detecting null pointer violations in Java programs
93
Detecting Number of Coherent Signals in Array Processing by Ljung-Box Statistic
94
Detecting Obfuscated Viruses Using Cosine Similarity Analysis
95
Detecting Object Boundaries Using Low-, Mid-, and High-level Information
96
Detecting object in the dynamic background from the noisy image in visual surveillance
97
Detecting Object Motion Using Passive RFID: A Trauma Resuscitation Case Study
98
Detecting object surfaces by using occlusion information from active binocular stereo
99
Detecting Objects for Indoor Monitoring and Surveillance for Mobile Robots
100
Detecting objects in complex urban area using depth information
101
Detecting objects in image collections using bipartite graph matching
102
Detecting objects in image sequences using rule-based control in an active contour model
103
Detecting objects in large image collections and videos by efficient subimage retrieval
104
Detecting Objects in Scene Point Cloud: A Combinational Approach
105
Detecting objects in video frames using optical flow techniques
106
Detecting objects of a category in range data by comparing to a single geometric prototype
107
Detecting Objects of Variable Shape Structure With Hidden State Shape Models
108
Detecting Objects Using Deformation Dictionaries
109
Detecting objects, shadows and ghosts in video streams by exploiting color and motion information
110
Detecting obstacle-free regions for visual robot navigation by inferring scene horizons
111
Detecting obstacles and drop-offs using stereo and motion cues for safe local motion
112
Detecting Obstructive Sleep Apnea events in a real-time mobile monitoring system through automatically extracted sets of rules
113
Detecting occluded people for robotic guidance
114
Detecting occlusion and camouflage during visual tracking
115
Detecting occlusion boundaries via saliency network
116
Detecting Occlusion for Hidden Markov Modeled Shapes
117
Detecting Occurrences of Refactoring with Heuristic Search
118
Detecting ocean surface winds using TRMM precipitation radar
119
Detecting of anti-radiation missile by applying changeable-sample ratios technology in the AEW system
120
Detecting of Coal Gas Weak Signals Using Lyapunov Exponent under Strong Noise Background
121
Detecting of contrast over-enhancement
122
Detecting of different pulse wave biosignals on large arteries
123
Detecting of Driver´s Drowsiness Using Multiwavelet Packet Energy Spectrum
124
Detecting of LFM synchronization signal for underwater acoustic communication with FPGA
125
Detecting of one´s eye from facial image by using genetic algorithm
126
Detecting of optimal Li-ion battery charging frequency by using AC impedance technique
127
Detecting of requirements inconsistency: an ontology-based approach
128
Detecting of signals of airborne electrical exploration of mineral products in the presence of colored noise
129
Detecting of small change of temperature using SAW resonators
130
Detecting of targeted malicious email
131
Detecting of the Cu2+ Ion in kiwifruit using QCM sensor based on phase measurement principle
132
Detecting of the series of local effects in fiber-optic communication line using polarization effects and correlation analysis
133
Detecting of unnormal conditions of polluted insulators based on analysis phase angle of leakage current
134
Detecting of water shortage information in crops with acoustic emission technology and automatic irrigation system
135
Detecting of zeros locations in a linear differential-difference equation
136
Detecting OFDM Signals in Alpha-Stable Noise
137
Detecting Offensive Language in Social Media to Protect Adolescent Online Safety
138
Detecting offensive routers: a straightforward approach
139
Detecting offensive user video blogs: An adaptive keyword spotting approach
140
Detecting oil dissolved gases using carbon nanotubes sensor
141
Detecting Ontology Mappings via Descriptive Statistical Methods
142
Detecting OOV Names in Arabic Handwritten Data
143
Detecting open phase conductors
144
Detecting operations that potentially violate well-formedness constraints for metadata repository systems
145
Detecting Opinion Leaders and Trends in Online Communities
146
Detecting Opinionated Claims in Online Discussions
147
Detecting Opportunistic Cheaters in Volunteer Computing
148
Detecting optic disk based on AdaBoost and active geometric shape model
149
Detecting optic disk based on structured learning
150
Detecting orbital angular momentum of light with an arc slit
151
Detecting orbits of high periods from numerical solutions of the Rossler system
152
Detecting Organic Matters in the Water in Urumqi City through Combined Method of Gas Chromatograph-Mass Spectrum
153
Detecting organic molecules using Au nanoparticle dimers with supramolecular interactions
154
Detecting orientation discontinuities in range images by use of directional derivatives
155
Detecting OSAHS from patterns seen on heart-rate tachograms
156
Detecting oscillating singularities in multifractal analysis: Application to hydrodynamic turbulence
157
Detecting oscillation with Unfalsified Adaptive Control and its application in managed pressure drilling for oil
158
Detecting oscillations in neural networks via frequency domain analysis
159
Detecting oscillatory behavior using Lyapunov functions
160
DETECTING OSTEOPOROSIS FROM DENTAL RADIOGRAPHS USING ACTIVE SHAPE MODELS
161
Detecting other robots from range data for robust self-localization of autonomous mobile robots
162
Detecting outbreaks by time series analysis
163
Detecting Outlier Measurements Based on Graph Rigidity for Wireless Sensor Network Localization
164
Detecting Outliers in Sensor Networks Using the Geometric Approach
165
Detecting outliers in sliding window over categorical data streams
166
Detecting outliers in spatial database
167
Detecting Outliers in the Estimator Bank-Based Direction Finding Techniques using the Likelihood Ratio Quality Assessment
168
Detecting overflow detection
169
Detecting Overlapping Communities from Local Spectral Subspaces
170
Detecting Overlapping Communities in Directed Networks Based on Link Similarity
171
Detecting overlapping communities in networks based on a simple node behavior model
172
Detecting overlapping communities of weighted networks by central figure algorithm
173
Detecting overlapping community structure of complex networks in nature and society
174
Detecting overlapping structures via network-based competitive learning
175
Detecting overlapping use cases
176
Detecting Over-represented Motifs in Alternatively Spliced Exons using Gibbs Sampling
177
Detecting oxide quality problems using JT testing
178
Detecting P2P botnet by analyzing macroscopic characteristics with fractal and information fusion
179
Detecting P2P botnets through network behavior analysis and machine learning
180
Detecting P2P Botnets Using a Multi-phased Flow Model
181
Detecting P2P traffic from the P2P flow graph
182
Detecting packed executables using steganalysis
183
Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey
184
Detecting packet modification attack by misbehaving router
185
Detecting packet-dropping faults in mobile ad-hoc networks
186
Detecting Paper Fibre Cross Sections in Microtomy Images
187
Detecting parabolas in ultrasound B-scan images with Genetic-Based Inverse Voting Hough Transform
188
Detecting parallel moving vehicles with monocular omnidirectional side cameras
189
Detecting parameteric curves using the straight line Hough transform
190
Detecting parameterized curve segments using MDL and the Hough transform
191
Detecting parameters of high frequency signals with frequency modulation stochastic resonance
192
Detecting Parkinson´s diseases via the characteristics of the intrinsic mode functions of filtered electromyograms
193
Detecting Parkinsons´ symptoms in uncontrolled home environments: A multiple instance learning approach
194
Detecting partial discharge of polluted insulators based on ultraviolet imaging
195
Detecting partially fallen-out magnetic slot wedges in AC machines based on electrical quantities only
196
Detecting partially occluded objects via segmentation and validation
197
Detecting partially occluded vehicles with geometric and likelihood reasoning
198
Detecting particles flowing through interdigitated 3D microelectrodes
199
Detecting passive eavesdroppers in the MIMO wiretap channel
200
Detecting Patch Submission and Acceptance in OSS Projects
201
Detecting path intersections in panoramic video
202
Detecting pathological speech using adaptive chaos exponent
203
Detecting pathological speech using contour modeling of harmonic-to-noise ratio
204
Detecting pathological speech using local and global characteristics of harmonic-to-noise ratio
205
Detecting Pathway Cross-Talks by Analyzing Conserved Functional Modules across Multiple Phenotype-Expressing Organisms
206
Detecting patient´s emergency - a minimum-computation procedure for pervasive cardiac monitoring
207
Detecting patterns and antipatterns in software using Prolog rules
208
Detecting Patterns for Assisted Living Using Sensor Networks: A Case Study
209
Detecting Patterns in Irregular Time Series with Fractal Dimension
210
Detecting Patterns in MPI Communication Traces
211
Detecting Patterns in Various Size and Angle Using FPGA
212
Detecting patterns of appliances from total load data using a dynamic programming approach
213
Detecting patterns of change using enhanced parallel coordinates visualization
214
Detecting pauses in continuous sign language
215
Detecting PCB component placement defects by genetic programming
216
Detecting Pedestrian Abnormal Behavior Based on Fuzzy Associative Memory
217
Detecting Pedestrian in Clutter Scene Using Shape and Motion
218
Detecting pedestrians and vehicles in traffic scene based on boosted HOG features and SVM
219
Detecting pedestrians at very small scales
220
Detecting Pedestrians Behavior in Building Based on Wi-Fi Signals
221
Detecting Pedestrians by Learning Shapelet Features
222
Detecting pedestrians from a video by stereo cameras
223
Detecting pedestrians using patterns of motion and appearance
224
Detecting pediatric obstructive sleep apnea using ECG
225
Detecting people carrying objects based on an optical flow motion model
226
Detecting People Carrying Objects Utilizing Lagrangian Dynamics
227
Detecting people in cluttered indoor scenes
228
Detecting People in Images: An Edge Density Approach
229
Detecting people in videos for their immersion in a virtual space
230
Detecting people using ring aperture microwave imaging
231
Detecting Performance Antipatterns before Migrating to the Cloud
232
Detecting performance interference in cloud-based web services
233
Detecting periodic behaviour in nonstationary signals
234
Detecting periodic structure
235
Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method
236
Detecting Periods of Eating During Free-Living by Tracking Wrist Motion
237
Detecting person presence in TV shows with linguistic and structural features
238
Detecting personnel in wooded areas using MIMO radar
239
Detecting persons on changing background
240
Detecting Perturbation in Co-Expression Modules Associated with Different Stages of HIV-1 Progression: A Multi-objective Evolutionary Approach
241
Detecting Phantom Nodes in Wireless Sensor Networks
242
Detecting Phase Coupling of Gastric Interdigestive Pressure Activity via Diagonal Slice Spectra
243
Detecting phase coupling of sleep EEG via bispectra
244
Detecting phases in parallel applications on shared memory architectures
245
Detecting Phenotype-Specific Interactions between Biological Processes from Microarray Data and Annotations
246
Detecting Phishing Emails Using Hybrid Features
247
Detecting phishing e-mails using text and data mining
248
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover´s Distance (EMD)
249
Detecting phishing web sites: A heuristic URL-based approach
250
Detecting photo manipulation on signs and billboards
251
Detecting photographic composites using shadows
252
Detecting photographic composites using two-view geometrical constraints
253
Detecting pitch of singing voice in polyphonic audio
254
Detecting pitching frames in baseball game video using Markov random walk
255
Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network
256
Detecting Places of Interest Using Social Media
257
Detecting plagiarism in cross-platform mobile applications: Case study: Game application similarity in Symbian platform and Android platform
258
Detecting plagiarism in images
259
Detecting plagiarisms in elementary programming courses
260
Detecting planar homographies in an image pair
261
Detecting planar surface using a light-field camera with application to distinguishing real scenes from printed photos
262
Detecting planning horizons for deterministic infinite horizon optimal control problems
263
Detecting planning horizons in deterministic infinite horizon optimal control
264
Detecting Point Pattern of Multiple Line Segments Using Hough Transformation
265
Detecting policy misconfigurations in temporal domain using object priority
266
Detecting Policy Violations through Traffic Analysis
267
Detecting politician speech in TV broadcast news shows
268
Detecting polygons of variable dimension in overhead images with particle filters
269
Detecting popular topics in micro-blogging based on a user interest-based model
270
Detecting Positively Selected Sites From Amino Acid Sequences: An Implicit Codon Model
271
Detecting positive-sequence component in active power filter under distorted grid voltage
272
Detecting possibility of complications of diseases using rough set based granulation
273
Detecting postural responses to sinusoidal sensory inputs: a statistical approach
274
Detecting Posture Mirroring in Social Interactions with Wearable Sensors
275
Detecting potential falling objects by inferring human action and natural disturbance
276
Detecting potential human activities using coherent change detection
277
Detecting power attacks on reconfigurable hardware
278
Detecting power imbalance in multi-cylinder inline diesel engine generator set
279
Detecting power lines using 330GHz FMCW sensor
280
Detecting Practical Speech Emotion in a Cognitive Task
281
Detecting Precedence-Related Advice Interference
282
Detecting Preceding Vehicles Using 4-Dimensional Mapping of Colors in Image
283
Detecting Predatory Behavior in Game Chats
284
Detecting predisposition to torsade de points using a PCA-based method
285
Detecting premature ventricular contractions in ECG signals with Gaussian processes
286
Detecting Preserved Eggshell Crack Using Machine Vision
287
Detecting price manipulation in the financial market
288
Detecting primary receivers for cognitive radio applications
289
Detecting Primary Signals for Efficient Utilization of Spectrum Using Q-Learning
290
Detecting Primary Transmitters via Cooperation and Memory in Cognitive Radio
291
Detecting Primary User Emulation Attack in Cognitive Radio Networks
292
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
293
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
294
Detecting privacy in attention aware system
295
Detecting privacy infractions in applications: A framework and methodology
296
Detecting Probabilistic Community with Topic Modeling on Sampling SubGraphs
297
Detecting Probability and Throughput of VSAT Systems Based on ACK-ALOHA-CDMA Channel
298
Detecting Probable Regions of Humans in Still Images Using Raw Edges
299
Detecting Problem Behavior in Children from Biological Signals: Validation through Chaos Analysis
300
Detecting problematic lookup functions in spreadsheets
301
Detecting processor hardware faults by means of automatically generated virtual duplex systems
302
Detecting Profile Injection Attacks in Collaborative Recommender Systems
303
Detecting Program Changes from Edit History of Source Code
304
Detecting program modules with low testability
305
Detecting prominent objects for image retrieval
306
Detecting properties of YBaCuO thin film bridges
307
Detecting Prostatic Adenocarcinoma From Digitized Histology Using a Multi-Scale Hierarchical Classification Approach
308
Detecting protected layer-3 rogue APs
309
Detecting protected links to keep reachability to server against failures
310
Detecting Protein Complexes Based on Uncertain Graph Model
311
Detecting Protein Complexes from Signed Protein-Protein Interaction Networks
312
Detecting protein complexes in PPI networks: The roles of interactions
313
Detecting protein complexes using gene expression biclusters
314
Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks
315
Detecting protocol switching covert channels
316
Detecting Pulse from Head Motions in Video
317
Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition
318
Detecting Puny Target in Infrared Images Based on Edge Characteristics
319
Detecting Push to Talk radios using two tone intermodulation distortion
320
Detecting QoS degradation in wireless networks to assist reliable media streaming
321
Detecting QRS Complexes of Two-Channel ECG Signals by Using Combined Wavelet Entropy
322
Detecting quadratic-type nonlinearities of random processes in the presence of additive noise
323
Detecting Quasars in Large-Scale Astronomical Surveys
324
Detecting questionable observers using face track clustering
325
Detecting queues at vending machines: A statistical layered approach
326
Detecting race conditions in asynchronous DMA operations with full system simulation
327
Detecting Race Conditions in One-Sided Communication of MPI Programs
328
Detecting Race Conditions in Web Services
329
Detecting Races with a Production Environment Logic Simulator
330
Detecting radio pulses from air showers
331
Detecting radioactive materials using high-power, terahertz gyrotrons
332
Detecting rain with QuikScat
333
Detecting randomly scanning worms based on heavy-tailed property
334
Detecting randomwalks hidden in noise: Phase transition on large graphs
335
Detecting range and coupling coefficient tradeoff with a multiple loops reader antenna for small size RFID LF tags
336
Detecting Rare Actions and Events from Surveillance Big Data with Bag of Dynamic Trajectories
337
Detecting rare events in video using semantic primitives with HMM
338
Detecting rare events using Kullback-Leibler divergence
339
Detecting rare events with lotto-type competitive learning
340
Detecting Rational Points on Hypersurfaces over Finite Fields
341
Detecting real life anger
342
Detecting Real-World Influence through Twitter
343
Detecting receiver attacks in VRTI-based device free localization
344
Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
345
Detecting recorded speech for polish language
346
Detecting recurrent phase behavior under real-system variability
347
Detecting Recurring and Novel Classes in Concept-Drifting Data Streams
348
Detecting recurring and similar software vulnerabilities
349
Detecting Recurring Themes in Personal Media Collections
350
Detecting red tides in the Eastern Seto Inland Sea with satellite ocean color imagery
351
Detecting Reduced Bone Mineral Density From Dental Radiographs Using Statistical Shape Models
352
Detecting redundant accesses to array data
353
Detecting Redundant Unit Tests for AspectJ Programs
354
Detecting re-entry of a moving object in an irregular space
355
Detecting reflection axes by energy minimisation
356
Detecting reflection posts - lane recognition on country roads
357
Detecting reflector attacks by sharing beliefs
358
Detecting regime changes with a mobile robot using multiple models
359
Detecting Region Transitions for Human-Augmented Mapping
360
Detecting regional lung properties using audio transfer functions of the respiratory system
361
Detecting region-of-interest (ROI) in digital mammogram by using morphological bandpass filter
362
Detecting regions of interest in dynamic scenes with camera motions
363
Detecting regions of interest in fMRI: an application on exploratory-based data analysis
364
Detecting registration failure
365
Detecting regular patterns using frequency domain self-filtering
366
Detecting regular plantation areas in satellite images
367
Detecting regularity in minefields and chaotic signals using the empty boxes test
368
Detecting regularity in point processes generated by humans
369
Detecting Regulator-Target Gene Pairs from Expression Profile of Microarray
370
Detecting Relationship of Learning City and Urban Competitiveness
371
Detecting relative motion in moving point patterns
372
Detecting relay attacks in RFID systems using physical layer characteristics
373
Detecting relevant acoustic events for piloting improvement of intelligibility
374
Detecting reliability attacks during split fabrication using test-only BEOL stack
375
Detecting remote homologues using scoring matrices calculated from the estimation of amino acid substitution rates of beta-barrel membrane proteins
376
Detecting Remote Protein Evolutionary and Structural Relationships via String Scoring Method
377
Detecting repeated motion patterns via Dynamic Programming using motion density
378
Detecting repeated patterns using Partly Locality Sensitive Hashing
379
Detecting Repeating Pattern in Fingerprint Feature Sequence
380
Detecting repetitive elements with accurate locations and shapes from urban façade
381
Detecting Replay Attacks in Audiovisual Identity Verification
382
Detecting replicated nodes in Wireless Sensor Networks using random walks and network division
383
Detecting repurposing and over-collection in multi-party privacy requirements specifications
384
Detecting requirements interactions: a three-level framework
385
Detecting research fronts using different types of weighted citation networks
386
Detecting Research Fronts Using Neural Network Model for Weighted Citation Network Analysis
387
Detecting residential regions in satellite images using local features and graph matching
388
Detecting resistive shorts for CMOS domino circuits
389
Detecting resistive-opens in RRAM using Programmable DfT scheme
390
Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients
391
Detecting resource leaks through dynamical mining of resource usage patterns
392
Detecting response of somatosensory evoked potentials from averages with small number of epochs using Self-Organizing Map
393
Detecting response of square and circular Si/AlN/Al membranes transducers by Laser Vibrometry Doppler and Impedancemeter
394
Detecting responses of masson pine to acid rain based on different soil conditions
395
Detecting retail events using moving edges
396
Detecting retroviruses using reading frame information and side effect machines
397
Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems
398
Detecting Revelation of Private Information on Online Social Networks
399
Detecting review spam: Challenges and opportunities
400
Detecting RFI using microwave radiometers
401
Detecting ripple patterns in mission videos
402
Detecting risk-markers in children in a preschool classroom
403
Detecting road junctions by artificial neural networks
404
Detecting Road Traffic Events by Coupling Multiple Timeseries With a Nonparametric Bayesian Method
405
Detecting road user actions in traffic intersections using RGB and thermal video
406
Detecting Robbery and Violent Scenarios
407
Detecting Robot System for Mine Disasters
408
Detecting robot-directed speech by situated understanding in object manipulation tasks
409
Detecting Robots Path Planning Based on Improved Genetic Algorithm
410
Detecting Rogue Access Points using Kismet
411
Detecting ROIs in the thermal image of electrical installations
412
Detecting Romanized Thai tokens in social media texts
413
Detecting Roots of Nonlinear Equations through a Novel Differential Evolution Algorithm
414
Detecting rotational symmetries
415
Detecting rotational symmetries using normalized convolution
416
Detecting Rotational Symmetry Under Affine Projection
417
Detecting Rotor Faults in Low Power Permanent Magnet Synchronous Machines
418
Detecting rotor faults in permanent magnet synchronous machines
419
Detecting Route Attraction Attacks in Wireless Networks
420
Detecting router cache snooping in Named Data Networking
421
Detecting rumor patterns in streaming social media
422
Detecting Runtime Environment Interference with Parallel Application Behavior
423
Detecting salient changes in genomic signals
424
Detecting salient contours using orientation energy distribution
425
Detecting salient curvature features using the local control of the feature support
426
Detecting salient fragments for video human action detection and recognition using an associative memory
427
Detecting salient motion by accumulating directionally-consistent flow
428
Detecting salient motion by accumulating directionally-consistent flow
429
Detecting salient regions in static images
430
Detecting scale-space consistent corners based on corner attributes
431
Detecting scareware by mining variable length instruction sequences
432
Detecting scene changes and activities in video databases
433
Detecting scene changes using synthetic aperture Radar interferometry
434
Detecting Screen Shot Images within Large-Scale Video Archive
435
Detecting seasonal change of deciduous trees using ALOS PALSAR and airborne lidar
436
Detecting seasonal changes at Nordic latitudes using ERS-1 SAR images
437
Detecting seasonal marine microbial communities with symmetrical non-negative matrix factorization
438
Detecting security anomalies from internet traffic using the MA-RMSE algorithms
439
Detecting Security Attacks in Trusted Virtual Domains
440
Detecting security threats in the network core using Data Mining techniques
441
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies
442
Detecting Security Threats Using Mobile Devices
443
Detecting security vulnerabilities in remote TCP/IP networks: an approach using security scanners
444
Detecting Security Vulnerabilities with Software Architecture Analysis Tools
445
Detecting SEEs in Microprocessors Through a Non-Intrusive Hybrid Technique
446
Detecting Seismic Anomalies in Outgoing Long-Wave Radiation Data
447
Detecting seismic IR anomalies in bi-angular advanced along-track scanning radiometer data
448
Detecting Seizure Onset in the Ambulatory Setting: Demonstrating Feasibility
449
Detecting Selective Dropping Attacks in BGP
450
Detecting selective forwarding attacks in wireless sensor networks
451
Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines
452
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge
453
Detecting selective forwarding attacks in WSNs using watermark
454
Detecting Self-Collisions Using a Hybrid Bounding Volume Algorithm
455
Detecting self-conflicts for business action rules
456
Detecting self-harming activities with wearable devices
457
Detecting Selfish Behavior in a Cooperative Commons
458
Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring
459
Detecting selfish configurations in 802.11 WLANs
460
Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks
461
Detecting selfish nodes and motivating cooperation in Mobile Ad-hoc Networks
462
Detecting Self-Regulated Learning in Online Communities by Means of Interaction Analysis
463
Detecting self-stimulatory behaviours for autism diagnosis
464
Detecting semantic changes in Makefile build code
465
Detecting semantic concepts in consumer videos using audio
466
Detecting semantic concepts using context and audiovisual features
467
Detecting semantic events in soccer games: towards a complete solution
468
Detecting Semantic Group Activities Using Relational Clustering
469
Detecting Semantic Mapping of Ontologies with Inference of Description Logic
470
Detecting semantic violations in generalised classification structures
471
Detecting sensor and insulin infusion set anomalies in an artificial pancreas
472
Detecting sensorimotor rhythms from the EEG signals using the independent component analysis and the coefficient of determination
473
Detecting Sentiment in Nepali texts: A bootstrap approach for Sentiment Analysis of texts in the Nepali language
474
Detecting sequence and structure homology via an integrative kernel: A case-study in recognizing enzymes
475
Detecting sequences and cycles of Web pages
476
Detecting service interference with rule-based system and extended adjacency matrix
477
Detecting settlement expansion using hyper-temporal SAR time-series
478
Detecting SEU-caused routing errors in SRAM-based FPGAs
479
Detecting shadows in a segmented Land Use Land Cover image with LIDAR data
480
Detecting shadows in image sequences
481
Detecting shadows of moving vehicles based on HMM
482
Detecting Shape Similarities in 3D Pottery Repositories
483
Detecting Shared Congested Router for Mobile Communication Using Multiple-Interface Devices
484
Detecting shared congestion of flows via end-to-end measurement
485
Detecting shared congestion paths based on PCA
486
Detecting shielded sources using 3-D CdZnTe detectors
487
Detecting shoplifting from customer behavior data by extended XCS-SL: Towards feature extraction on class-imbalanced sequence data
488
Detecting shopper groups in video sequences
489
Detecting shot transitions based on video content
490
Detecting siberian silk moth damage in central siberia using multi-temporal MODIS data
491
Detecting Signal Structure from Randomly-Sampled Data
492
Detecting signal-overshoots for reliability analysis in high-speed system-on-chips
493
Detecting significant bacteriuria through urine smear image analysis for urinary tract infection
494
Detecting Significant Events in Personal Image Collections
495
Detecting Significantly Expressed Genes from Their Time-Course Expression Profiles and Its Validation
496
Detecting similar applications with collaborative tagging
497
Detecting Similar Files Based on Hash and Statistical Analysis for Digital Forensic Investigation
498
Detecting similar HTML documents using a fuzzy set information retrieval approach
499
Detecting similar software applications
500
Detecting similarities and differences in images using the PFF and LGG approaches
501
Detecting Similarities between Families of Bio-sequences using the Steady-State of a PCA-Neural Network
502
Detecting Similarity of Transferring Datasets Based on Features of Classification Rules
503
Detecting simple motion using cellular neural networks
504
Detecting simulated sprained ankle plantar pressure pattern using artificial neural network
505
Detecting Single and Multiple Faults Using Intelligent DSP and Agents
506
Detecting single muscle fiber activity using a concentric needle electrode: a simulation study
507
Detecting single photons using superconducting nanowires
508
Detecting Single Quantum Dot Motion With Nanometer Resolution for Applications in Cell Biology
509
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
510
Detecting Sinkhole attacks in wireless sensor networks
511
Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS)
512
Detecting skewed symmetries
513
Detecting skin burns induced by surface electrodes
514
Detecting Skin Defect of Fruits Using Optimal Gabor Wavelet Filter
515
Detecting Skype flows in Web traffic
516
Detecting sleep disorders based on EEG signals by using discrete wavelet transform
517
Detecting small amplitude signal and transit times in high noise: Application to hydraulic fracture monitoring
518
Detecting small blood vessels in color flow imaging: a statistical approach
519
Detecting small defects in conductive thin metallic layers using injected AC current and GMR magnetic sensor
520
Detecting Small Fluid Leaks in Pipe-Type Cable Installations
521
Detecting Small Liver Tumors With ^{111} In-Pentetreotide SPECT—A Collimator Study Based on Monte Carlo Simulations
522
Detecting small moving objects using temporal hypothesis testing
523
Detecting small seabed targets using a high frequency multibeam sonar: geometric models and test results
524
Detecting Small Slow-moving Sonar Targets Using Bottom Reverberation Coherence
525
Detecting Small Target of Ship at Sea by Infrared Image
526
Detecting small targets using windowed time-reversal MUSIC imaging: A phantom study
527
Detecting Small Variations in Shape
528
Detecting small, moving objects in image sequences using sequential hypothesis testing
529
Detecting Smart Plug Configuration Changes in Smart Homes
530
Detecting smart, self-propagating Internet worms
531
Detecting Sneak Paths in Transistor Networks
532
Detecting snoring to inform night-time smartphone duty-cycle scheduling
533
Detecting SNP Combinations Discriminating Human Populations From HapMap Data
534
Detecting SNPs-disease associations using Bayesian networks
535
Detecting Social Bookmark Spams Using Multiple User Accounts
536
Detecting social cliques for automated privacy control in online social networks
537
Detecting social context: A method for social event classification using naturalistic multimodal data
538
Detecting Social Groups in Crowded Surveillance Videos Using Visual Attention
539
Detecting social network profile cloning
540
Detecting Social Positions Using Simulation
541
Detecting social signals of flu symptoms
542
Detecting Social Situations from Interaction Geometry
543
Detecting soft errors by a purely software approach: method, tools and experimental results
544
Detecting software aging in a cloud computing framework by comparing development versions
545
Detecting Software Aging in safety-critical infrastuctures
546
Detecting software aging of web servers with real-valued negative selection algorithm
547
Detecting Software Faults in Distrubted Systems
548
Detecting Software Keyloggers with Dendritic Cell Algorithm
549
Detecting software modularity violations
550
Detecting Software Theft in Embedded Systems: A Side-Channel Approach
551
Detecting Software Theft via System Call Based Birthmarks
552
Detecting software vulnerabilities in android using static analysis
553
Detecting soil organic carbon by CASI hyperspectral images
554
Detecting soil parameters from a small tracked vehicle
555
Detecting solar-induced chlorophyll fluorescence from field radiance spectra based on the Fraunhofer line principle
556
Detecting Solid-State Disk Geometry for Write Pattern Optimization
557
Detecting SOQL-injection vulnerabilities in SalesForce applications
558
Detecting sound objects in audio recordings
559
Detecting source code similarity using low-level languages
560
Detecting space weather events with subionospheric VLF observations: Producing quiet day curves from AARDDVARK data
561
Detecting Space-Time Alternating Biological Signals Close to the Bifurcation Point
562
Detecting Spam and Promoting Campaigns in the Twitter Social Network
563
Detecting spam comments with malicious users´ behavioral characteristics
564
Detecting Spam in Chinese Microblogs - A Study on Sina Weibo
565
Detecting spam reviewers by combing reviewer feature and relationship
566
Detecting spam webpages through topic and semantics analysis
567
Detecting Spam Zombies by Monitoring Outgoing Messages
568
Detecting Spam Zombies by Monitoring Outgoing Messages
569
Detecting Spammers and Content Promoters in Online Video Social Networks
570
Detecting Spammers on Twitter Based on Content and Social Interaction
571
Detecting spamming activities by network monitoring with Bloom filters
572
Detecting spamming stores by analyzing their suspicious behaviors
573
Detecting spatial and temporal patterns of aboveground production in a tallgrass prairie using remotely sensed data
574
Detecting spatial outliers with multiple attributes
575
Detecting Spatial Variations of Erythrocytes by Ultrasound Backscattering Statistical Parameters Under Pulsatile Flow
576
Detecting Spatiotemporal Changes of Corn Developmental Stages in the U.S. Corn Belt Using MODIS WDRVI Data
577
Detecting spatio-temporal outliers in climate dataset: a method study
578
Detecting spatio-temporal outliers with kernels and statistical testing
579
Detecting spatio-temporal topological relationships between boundary lines of parcel
580
Detecting special nuclear materials inside cargo containers using photofission
581
Detecting spectral changes in the frequency domain
582
Detecting spectrum misuse in wireless networks
583
Detecting Specular Propagation Paths in the Presence of Distributed Scattering in Angle and Delay Domains
584
Detecting Specular Reflections Using Lambertian Constraints
585
Detecting Specular Surfaces on Natural Images
586
Detecting speed fluctuations in D.C. electric motors using a radio frequency antenna technique
587
Detecting Speed Fluctuations in D.C. Electric Motors Using a Radio Frequency Antenna Technique
588
Detecting SPIT Calls by Checking Human Communication Patterns
589
Detecting spliced face in a group photo using PCA
590
Detecting splicing in digital audios using local noise level estimation
591
Detecting spongiosis in stained histopathological specimen using multispectral imaging and machine learning
592
Detecting spontaneous brain activity in functional magnetic resonance imaging using finite rate of innovation
593
Detecting spoofed packets
594
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
595
Detecting Spoofing Attacks in Mobile Wireless Environments
596
Detecting spread spectrum watermarks using natural scene statistics
597
Detecting spurious counterexamples efficiently in abstract model checking
598
Detecting spurious features using parity space
599
Detecting spurious reflections in integrated photonic devices
600
Detecting SQL injection attacks using SNORT IDS
601
Detecting SQL Injection Vulnerabilities in Web Services
602
Detecting SQL Vulnerability Attack Based on the Dynamic and Static Analysis Technology
603
Detecting stability faults in sub-threshold SRAMs
604
Detecting stairs and pedestrian crosswalks for the blind by RGBD camera
605
Detecting state coding conflicts in STG unfoldings using SAT
606
Detecting state coding conflicts in STGs using integer programming
607
Detecting static occlusion edges using foreground patterns
608
Detecting stationary phase points in the time-frequency plane
609
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
610
Detecting Statistically Significant Differences in Quantitative MRI Experiments, Applied to Diffusion Tensor Imaging
611
Detecting stealth software with Strider GhostBuster
612
Detecting stealthy false data injection using machine learning in smart grid
613
Detecting stealthy P2P botnets using statistical traffic fingerprints
614
Detecting Stealthy Spreaders Using Online Outdegree Histograms
615
Detecting Stellar Streams in the Halos of Galaxies with Voronoi Tessellations
616
Detecting step edges in noisy SAR images: a new linear operator
617
Detecting Stepping-Stone Connection Using Association Rule Mining
618
Detecting Stepping-Stone Intruders with Long Connection Chains
619
Detecting Stepping-Stone with Chaff Perturbations
620
Detecting stepping-stones under the influence of packet jittering
621
Detecting Step-Stone with Network Traffic Mining Approach
622
Detecting stimulus driven changes in functional brain connectivity
623
Detecting stochastic nuclear quadrupole resonance signals in the presence of strong radio frequency interference
624
Detecting stochastic temporal network motifs for human communication patterns analysis
625
Detecting stock market manipulation using supervised learning algorithms
626
Detecting stony areas based on ground surface curvature distribution
627
Detecting storm-generated suspended materials in Lake Michigan using ADCP echo intensities
628
Detecting straight edges in millimeter-wave images
629
Detecting Stream Events in Distributed Streams
630
Detecting stress and fatigue cracks
631
Detecting stress during real-world driving tasks using physiological sensors
632
Detecting Strong Berge Pareto equilibrium in a non-cooperative game using an evolutionary approach
633
Detecting Structural Alterations in the Brain using a Cellular Neural Network based Classification of Magnetic Resonance Images
634
Detecting structural ambiguities and transitions during a guided tour
635
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
636
Detecting structural changes in object oriented software systems
637
Detecting structural errors in BPMN process models
638
Detecting structure in parity binary sequences
639
Detecting structured light patterns in colour images using a support vector machine
640
Detecting stuck-open faults with stuck-at test sets
641
Detecting stumbles with a single accelerometer
642
Detecting Subdimensional Motifs: An Efficient Algorithm for Generalized Multivariate Pattern Discovery
643
Detecting subjective contours with the hierarchical Hough transform
644
Detecting submerged aquatic vegetation with 8-band WorldView-2 satellite images
645
Detecting sub-MeV neutrons in solid plastic scintillator with gamma-ray discrimination
646
Detecting subpixel targets in Hyperspectral images via knowledgeaided adaptive filtering
647
Detecting Subsidence in Coastal Areas by Ultrashort-Baseline TCPInSAR on the Time Series of High-Resolution TerraSAR-X Images
648
Detecting subsidence-induced faulting in Mexican urban areas by means of Persistent Scatterer Interferometry and subsidence horizontal gradient mapping
649
Detecting substitution attacks against non-colluding relays
650
Detecting subsurface contamination using ground penetrating radar and amplitude variation with offset analysis
651
Detecting Subsystems of a Complex System
652
Detecting subtle system changes using digital signatures
653
Detecting sudden bladder pressure increases from the pelvic nerve afferent activity
654
Detecting sudden concept drift with knowledge of human behavior
655
Detecting Suicidal Ideation in Chinese Microblogs with Psychological Lexicons
656
Detecting support-reducing bound sets using two-cofactor symmetries
657
Detecting surface features during locomotion using optic flow
658
Detecting Surface Kuroshio Front in the Luzon Strait From Multichannel Satellite Data Using Neural Networks
659
Detecting Surgical Tools by Modelling Local Appearance and Global Shape
660
Detecting suspended video streams through variance-time analysis
661
Detecting suspicious background changes in video surveillance of busy scenes
662
Detecting Suspicious Behavior in Surveillance Images
663
Detecting suspicious behavior using a graph-based approach
664
Detecting Suspicious Motion with Nonimaging Sensors
665
Detecting Suspicious Relational Database Queries
666
Detecting sustainable programming languages through forking on open source projects for survivability
667
Detecting Sustained Attention during Cognitive Work Using Heart Rate Variability
668
Detecting sweethearting in retail surveillance videos
669
Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks
670
Detecting sybil attacks inwireless and sensor networks using cluster analysis
671
Detecting Sybil nodes in wireless networks with physical layer network coding
672
Detecting Sybils in Peer-to-Peer Overlays Using Neural Networks and CAPTCHAs
673
Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis Methods
674
Detecting Symbian OS malware through static function call analysis
675
Detecting symbols on road surface for mapping and localization using OCR
676
Detecting symmetric variables in Boolean functions using generalized Reed-Muller forms
677
Detecting symmetry in grey level images: the global optimization approach
678
Detecting Symmetry in Scalar Fields Using Augmented Extremum Graphs
679
Detecting symptoms of diseases in poultry through audio signal processing
680
Detecting SYN Flooding Agents under Any Type of IP Spoofing
681
Detecting SYN flooding attacks
682
Detecting synchronization and interrelations in multivariate time series
683
Detecting synchrophasors computed over fault/switching transients
684
Detecting synthetic speech using long term magnitude and phase information
685
Detecting system and power-spectral analysis of pulse signals of human body
686
Detecting system for register precision of rotary-screen printing machine
687
Detecting System of Ink Cells in Gravure Cylinder via Neural Network
688
Detecting system use cases and validations from documents
689
Detecting tactics patterns for archiving tennis video clips
690
Detecting Tag Spam in Social Tagging Systems with Collaborative Knowledge
691
Detecting tampered cheque images in cheque truncation system using difference expansion based watermarking
692
Detecting tampered image blocks using error correcting code
693
Detecting tangled logic structures in VLSI netlists
694
Detecting target motion by frequency-plane smoothing
695
Detecting Targeted Malicious Email
696
Detecting targets of alignment moves in multiparty discussions
697
Detecting targets of variable acceleration with High Frequency Surface Wave Radar
698
Detecting Task-Based Query Sessions Using Collaborative Knowledge
699
Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance
700
Detecting TCP SYN Flood Attack Based on Anomaly Detection
701
Detecting TCP-based DDoS attacks by linear regression analysis
702
Detecting team behavior using focus of attention
703
Detecting technological originality through cross-domain knowledge in company
704
Detecting Technology of Electromagnetic Relay Parameters Based on SCM
705
Detecting temporal changes in customer behavior
706
Detecting temporal changes in satellite imagery using ANN
707
Detecting temporal community from dynamic heterogeneous networks
708
Detecting temporal logic predicates on the happened-before model
709
Detecting temporal patterns of technical phrases by using importance indices in a research documents
710
Detecting temporal patterns using Reconstructed Phase Space and Support Vector Machine in the dynamic data system
711
Detecting temporal protein complexes based on Neighbor Closeness and time course protein interaction networks
712
Detecting temporally redundant association rules
713
Detecting terahertz signatures using Guided Under-determined Source Signal Separation
714
Detecting termination in pervasive sensor networks
715
Detecting termination in static and dynamic systems
716
Detecting termination of distributed computations by external agents
717
Detecting Terrorism Evidence in Text Documents
718
Detecting Text Areas and Decorative Elements in Ancient Manuscripts
719
Detecting text based image with optical character recognition for English translation and speech using Android
720
Detecting text in floor maps using Histogram of Oriented Gradients
721
Detecting text in natural scenes with stroke width transform
722
Detecting Text in Videos Using Fuzzy Clustering Ensembles
723
Detecting Text Lines in Handwritten Documents
724
Detecting Text Similarity over Chinese Research Papers Using MapReduce
725
Detecting texts of arbitrary orientations in natural images
726
Detecting texture paths and patterns in aerial images
727
Detecting the 14N NQR Signal Using a High-Tc SQUID
728
Detecting the Adjacency Effect in Hyperspectral Imagery With Spectral Unmixing Techniques
729
Detecting the anti-islanding protection based on combined changes of active and reactive output powers of distributed generations
730
Detecting the attention state of an operator in continuous attention task using EEG-based brain-computer interface
731
Detecting The Audible Alarm Of Residential Smoke Detectors And Its Applications
732
Detecting the audible alarm of residual smoke detectors and its applications
733
Detecting the blockage of the sensing lines of a differential-pressure flow sensor in a dynamic process using wavelet transform techniques
734
Detecting the Blockage of the Sensing-lines of a Differential-Pressure Flow Sensor in a Dynamic Process Using Wavelet Transform Techniques
735
Detecting the Capacity of Distribution Transformer Based on an On-Line Method
736
Detecting the Changes ofWeb Students´ Learning Interest
737
Detecting the content related parts of Web pages
738
Detecting the core network of microblog using snowball sampling
739
Detecting the Corners of Light Shape of Automotive Low-beam Headlamp by Inverse Hough Transform
740
Detecting the correct rotational direction of a centrifugal device with a variable speed drive
741
Detecting the DDoS attacks based on SYN proxy and Hop-Count Filter
742
Detecting the defective nodes in wireless sensor networks
743
Detecting the Defective Nodes in Wireless Sensor Networks Using the Nonlinear Consensus of Median
744
Detecting the Determinism of EEG Time Series Using a Nonlinear Forecasting Method
745
Detecting the direction of motion in a binary sensor network
746
Detecting the DOS Attacks in AOMDV Using AOMDV-IDS Routing
747
Detecting the early evidence of real monetary converges for ASEAN5+3 after Asian financial crisis
748
Detecting the end of spellings using statistics on recognized letter sequences for spelled names recognition
749
Detecting the enemy: Penetrating darkness and cloud cover, radar was the no. 1 method for pinpointing the adversary in the air or at sea
750
Detecting the environmental impact of nanoparticles using plant-based biosensors
751
Detecting the EoR with LOFAR: Steps along the road
752
Detecting the excessive activation of the ciliaris muscle on thermal images
753
Detecting the first races in parallel programs with ordered synchronization
754
Detecting the Flames on the Real Time Status through Flame Detector
755
Detecting the functional similarities between tools using a hierarchical representation of outcomes
756
Detecting the functionality of executive motor task and motor imagery through electroencephalography (EEG)
757
Detecting the gaze direction for a man machine interface
758
Detecting the greedy spectrum occupancy threat in cognitive radio networks
759
Detecting the interface state of organic thin-film transistors through hysteresis characteristics
760
Detecting the Key Links by Community Detecting Algorithms
761
Detecting the kuroshio axes south of Japan by using altimeter and drifter data
762
Detecting the longest periodic timescale in normal vowels
763
Detecting the long-tail of Points of Interest in tagged photo collections
764
Detecting the macroeconomic factors in Chinese stock market returns: A generalized dynamic factor model approach
765
Detecting the magnetic field direction by a cantilever operating in different vibration modes
766
Detecting the man-made target based on enhanced fractal feature using PRIA
767
Detecting the MB1 with Higher-Order Statistics
768
Detecting the motion of a microresonator via mode-mode interaction
769
Detecting the motional state of single atoms in a high-finesse optical cavity by heterodyne spectroscopy
770
Detecting the motor unit action potential from surface EMG signals based on wavelet transform
771
Detecting the needs for happiness and meaning in life from google books
772
Detecting the network attack vectors on SCADA systems
773
Detecting the normal quantum/Compound Quantum channel with von Neumann measurement
774
Detecting the Number of Clusters during Expectation-Maximization Clustering Using Information Criterion
775
Detecting the Number of Clusters in n-Way Probabilistic Clustering
776
Detecting the Number of EMI Sources Based on Higher Order Statistics
777
Detecting the number of fingers raised and performing real time applications
778
Detecting the number of signals in wireless DS-CDMA networks
779
Detecting the number of signals using antenna array: a single threshold solution
780
Detecting the Number of Sources Using Modified EGM
781
Detecting the number of sources using modified EIT
782
Detecting the number of targets in spatially colored noise using sampled aperture radars
783
Detecting the Number of Transmit Antennas with Unauthorized or Cognitive Receivers in MIMO Systems
784
Detecting the occurrence of ground ULF electromagnetic signal prior to earthquake events
785
Detecting the Onset of Dementia Using Context-Oriented Architecture
786
Detecting the onset of epileptic seizures
787
Detecting the onset of hyper-reflexive bladder contractions from pudendal nerve electrical activity
788
Detecting the onset of hyper-reflexive bladder contractions from the electrical activity of the pudendal nerve
789
Detecting the onset of myocardial contraction for establishing inverse electro-mechanical coupling in XMR guided RF ablation
790
Detecting the Onset of Urinary Bladder Contractions Using an Implantable Pressure Sensor
791
Detecting the operation chain in digital images by type and order fingerprint
792
Detecting the optic cup excavation in retinal fundus images by automatic detection of vessel kinking
793
Detecting the Optic Disc Boundary in Digital Fundus Images Using Morphological, Edge Detection, and Feature Extraction Techniques
794
Detecting the optic disc in retinal images by means of a geometrical model of vessel network
795
Detecting the Optical Signature of Malignancy with Second Harmonic Imaging
796
Detecting the optimal active contour in the computed tomography image by using entropy to choose coefficients in energy equation
797
Detecting the Orientation of N-gonal Cropped Sub-images and Its Application
798
Detecting the peak of the cosmological 21 cm signal
799
Detecting the Phenology and Discriminating Mediterranean Natural Habitats With Multispectral Sensors—An Analysis Based on Multiseasonal Field Spectra
800
Detecting the pigment network in dermoscopy images: A directional approach
801
Detecting the presence of a proximate cellular user through distributed femtocell sensing
802
Detecting the presence of an inhomogeneous region in a homogeneous background: taking advantages of the underlying geometry via manifolds
803
Detecting the presence of large biomass particles in pneumatic conveying pipelines using an acoustic sensor
804
Detecting the presence of psk signals using composite hypothesis testing
805
Detecting the Presence of Speech Using ADPCM Coding
806
Detecting the Presence of Stationary Objects from Sparse Stereo Disparity Space
807
Detecting the Presence of Target Multiplicity
808
Detecting the risk factors of coronary heart disease by use of neural networks
809
Detecting the rotor position by employing pulse injection technique and digital pulse position modulation decoder in switched reluctance motor
810
Detecting the Rotor Position by Employing Pulse Injection Technique And Digital Pulse Width Modulation Decoder in Switched Reluctance Motor
811
Detecting the run time attacks in the cloud with an evidence collection based approach
812
Detecting the saboteur static electricity in gasoline fires
813
Detecting the Same Text in Different Languages
814
Detecting the Same Text in Different Languages
815
Detecting the spam review using tri-training
816
Detecting the split within heart sounds using a switched-capacitor filter
817
Detecting the Staff-Lines of Musical Score with Hough Transform and Mathematical Morphology
818
Detecting the stages of hyperplasia formation in the breast ducts using ultrasound B-scan images
819
Detecting the strong scatterers of target with ISAR
820
Detecting The Sufficient Display Resolution For Image Browsing
821
Detecting the surface defects on hot rolled steel sheets using texture analysis
822
Detecting the survival of E. coli Bacteria in Different Types of Water Using Microwave Technique
823
Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks
824
Detecting the Sybil Attack in Mobile Ad hoc Networks
825
Detecting the temporal extent of the impulse response function from intra-partum cardiotocography for normal and hypoxic fetuses
826
Detecting the Theft of Natural Language Text Using Birthmark
827
Detecting the topographic, chemical and magnetic contrast at surfaces with nanometer spatial resolution
828
Detecting the topographic, chemical, and magnetic contrast at surfaces with nm spatial resolution
829
Detecting the underwater acoustic transient signal based on the technology of waveform section
830
Detecting the unintended in BGP policies
831
Detecting the unwanted
832
Detecting the use of intentionally transmitting personal electronic devices onboard commercial aircraft
833
Detecting the valley of international academic collaboration in renewable energy
834
Detecting the vulnerability of software with cyclic behavior using Sulley
835
Detecting the wall-motion of the fetal heart within ultrasound images
836
Detecting the zero-crossing message to achieve low bit transmission over H-bridge inverter
837
Detecting Thread-Safety Violations in Hybrid OpenMP/MPI Programs
838
Detecting threatening insiders with lightweight media forensics
839
Detecting Threats in Star Graphs
840
Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words
841
Detecting three types of contaminated soil with Ground penetrating radar
842
Detecting thresholds and interactions among displacement, acceleration, and velocity, for young adults on a horizontally translated platform
843
Detecting thresholds by means of jump-phenomena
844
Detecting THz in the telecom range: All resonant THz up-conversion in a whispering gallery mode resonator
845
Detecting THz signatures of liquids with chirp induced stimulated Raman scattering
846
Detecting Time Series Periodicity Using Complex Networks
847
Detecting timed-out client requests for avoiding livelock and improving Web server performance
848
Detecting time-related changes in Wireless Sensor Networks using symbol compression and Probabilistic Suffix Trees
849
Detecting tone errors in continuous Mandarin speech
850
Detecting tool breakage using accelerometer in ball-nose end milling
851
Detecting tool wear by noise
852
Detecting Topics from Twitter Posts During TV Program Viewing
853
Detecting topology variations in dynamical networks
854
Detecting trace amount of water in crude oil with capacitance sensors
855
Detecting trace-level concentrations of volatile organic compounds with metal oxide gas sensors
856
Detecting track-loss for the Probabilistic Data Association Filter in the absence of truth data
857
Detecting trajectories of change in marine ecosystems: Biotic indicators for observing systems
858
Detecting transformer winding faults using non-linear models of transformers
859
Detecting Transient Bottlenecks in n-Tier Applications through Fine-Grained Analysis
860
Detecting transient signals with incomplete observations
861
Detecting transients of unknown length
862
Detecting Tree Distributed Predicates
863
Detecting tremors in microelectrode recordings without using a spike detector
864
Detecting trend in randomly switched measurements
865
Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing
866
Detecting Triangle Inequality Violations for Internet Coordinate Systems
867
Detecting Trojan horses based on system behavior using machine learning method
868
Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad {I}_{\\rm DDQ} s
869
Detecting Tropical Cyclone Genesis From Remotely Sensed Infrared Image Data
870
Detecting tropical cyclone water vapor transportation with the TRMM and advanced microwave sounding unit (AMSU)
871
Detecting truncation point in steady-state simulation using chaos theory
872
Detecting trunk motion changes due to pregnancy using pattern recognition techniques
873
Detecting Trustworthy Real-Time Communications Using a Web-of-Trust
874
Detecting tuberculosis in radiographs using combined lung masks
875
Detecting tubular structures via direct vector field singularity characterization
876
Detecting tunneled video streams using traffic analysis
877
Detecting turbulent flow in Korotkoff sounds using nonlinear methods
878
Detecting turn insulation failures in motor coils using ground current signals
879
Detecting Turn Shorts in Rotor Windings: A New Test Using Magnetic Flux Monitoring
880
Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents
881
Detecting T-wave Using Separated Beats by Adaptive Threshold
882
Detecting type errors and secure coding in C/C++ applications
883
Detecting Types of Variables for Generalization in Constraint Acquisition
884
Detecting ultrasonic signals in a turbulent atmosphere: performance of different codes
885
Detecting Unauthorized Modification of HTTP Communication with Steganography
886
Detecting unauthorized software execution in SDR using power fingerprinting
887
Detecting Uncommon Trajectories
888
Detecting underground objects by exploiting resonant scatterers with antiresonant antennas
889
Detecting undetectable controller faults using power analysis
890
Detecting unexpected fall using array antenna
891
Detecting unexpected moving obstacles that appear in the path of a navigating robot
892
Detecting Unexplained Human Behaviors in Social Networks
893
Detecting Unfocused Raindrops: In-Vehicle Multipurpose Cameras
894
Detecting unfolding crises with Visual Analytics and Conceptual Maps Emerging phenomena and big data
895
Detecting unintentional information leakage in social media news comments
896
Detecting unique column combinations on dynamic data
897
Detecting unique faults in multi-port SRAMs
898
Detecting unit for X-ray nondestructive testing systems
899
Detecting Unknown Insider Threat Scenarios
900
Detecting Unknown Malicious Executables Using Portable Executable Headers
901
Detecting unknown vulnerabilities using Honeynet
902
Detecting unsafe BGP policies in a flexible world
903
Detecting Unsafe Driving Patterns using Discriminative Learning
904
Detecting unsafe error recovery schedules
905
Detecting Unsatisfiability of Nonlinear Constraints Using DISCOVERER
906
Detecting Unstable Conjunctive Locality-Aware Predicates in Large-Scale Systems
907
Detecting Unstable Fixed Points Using Kalman Filters With Constraints
908
Detecting unstable periodic orbits in switched arrival systems
909
Detecting untestable hardware Trojan with non-intrusive concurrent on line testing
910
Detecting Unusual Activities at Vehicular Intersections
911
Detecting unusual activity in video
912
Detecting unusual customer consumption profiles in power distribution systems — APSPDCL
913
Detecting unusual inactivity by introducing activity histogram comparisons
914
Detecting Unusual Pattern with Labeled Data in Two-Stage
915
Detecting unusual pedestrian behavior toward own vehicle for vehicle-to-pedestrian collision avoidance
916
Detecting up-calls of Right Whales
917
Detecting upper outliers in small gamma samples: A comparison of techniques
918
Detecting urban green space from landsat7 ETM+ data by using an unmixing algorithm of support vector machine
919
Detecting urban traffic congestion with single vehicle
920
Detecting Urban Vegetation from Different Images Using an Object-Based Approach in Bartin, Turkey
921
Detecting urban vegetation from IKONOS data using an object-oriented approach
922
Detecting Urban Vegetation Using a Object-oriented Method with QuickBird Imagery
923
Detecting Usability Problems and Offering Lines of Solutions: An Instrument´ Proposal for Measuring Usability in Online Services
924
Detecting user dissatisfaction from passive monitoring
925
Detecting user dissatisfaction in ambient intelligence environments
926
Detecting users´ behaviors based on nonintrusive load monitoring technologies
927
Detecting User-Visible Failures in Web-Sites by Using End-to-End Fine-Grained Monitoring: An Experimental Study
928
Detecting UWB Radar signals with UWB communication interference
929
Detecting UWB signals using cyclic features
930
Detecting vanishing points by segment clustering on the projective plane for single-view photogrammetry
931
Detecting vapor traces of explosives using a self-assembled mono layer on a surface-modified MEMS capacitor and CMOS electronics
932
Detecting variable source areas from temporal radar imagery using advanced image enhancement techniques
933
Detecting various SQL Injection vulnerabilities using String Matching and LCS method
934
Detecting vegetation change during the period 1998-2002 in NW China using SPOT-VGT NDVI time series data
935
Detecting vehicle target in SAR image with high moment
936
Detecting ventricular arrhythmias by NEWFM
937
Detecting ventricular fibrillation
938
Detecting ventricular fibrillation by fast algorithm of dynamic sample entropy
939
Detecting Ventricular Fibrillation by Time-Delay Methods
940
Detecting ventricular late potentials using the continuous wavelet transform
941
Detecting ventricular tachycardia and fibrillation by complexity measure
942
Detecting Vicious Users in Recommendation Systems
943
Detecting Video Texts Using Spatial-Temporal Wavelet Transform
944
Detecting violent content in Hollywood movies by mid-level audio representations
945
Detecting Virulent Cells of Cryptococcus Neoformans Yeast: Clustering Experiments
946
Detecting virus mutations via dynamic matching
947
Detecting visual differences in reconstructed images using a region-based test for outliers
948
Detecting visual saliency using image signature
949
Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach
950
Detecting vocalizations of individual monkeys in social groups
951
Detecting voids in glass-bead devices with partial discharges induced by external fields
952
Detecting VoIP calls hidden in web traffic
953
Detecting VoIP Floods Using the Hellinger Distance
954
Detecting VoIP-specific Denial-of-Service using change-point method
955
Detecting Volatile Organic Compounds in the ppb Range With Gas Sensitive Platinum Gate SiC-Field Effect Transistors
956
Detecting Volatile Organic Compounds in the ppb range with platinum-gate SiC-Field Effect Transistors
957
Detecting Volatility Shift in Data Streams
958
Detecting Voltage Glitch Attacks on Secure Devices
959
Detecting volumetric changes in fMRI connectivity networks in schizophrenia patients
960
Detecting vortical phenomena in vector data by medium-scale correlation
961
Detecting Vorticity in Optical Flow of Fluids
962
Detecting V-Storms using Meteosat Second Generation SEVIRI image and its applications: A case study over Western Turkey
963
Detecting vulnerabilities in C programs using trace-based testing
964
Detecting vulnerabilities in secure communication using RCEE
965
Detecting Vulnerabilities in Service Oriented Architectures
966
Detecting walking activity in cardiac rehabilitation by using accelerometer
967
Detecting Walking Gait Impairment with an Ear-worn Sensor
968
Detecting walking pedestrians from leg motion in driving video
969
Detecting wandering behavior based on GPS traces for elders with dementia
970
Detecting wash trade in the financial market
971
Detecting weak modes in rectangular quartz plates by measuring surface charges
972
Detecting weak sinusoidal signal by LMP test
973
Detecting weak targets in a speckled distributed scene by SAR reconfiguration
974
Detecting Weather Conflicts with Next Generation SOA
975
Detecting Weather Radar Clutter by Information Fusion With Satellite Images and Numerical Weather Prediction Model Output
976
Detecting web application attacks with use of Gene Expression Programming
977
Detecting Web Content Function Using Generalized Hidden Markov Model
978
Detecting Web Robots Using Resource Request Patterns
979
Detecting Web-Based Attacks by Machine Learning
980
Detecting Well-Harmonized Homeostasis in Heart Rate Fluctuations
981
Detecting wheels of vehicle in stereo images
982
Detecting when UNNEST after a sequence of NESTs and UNNESTs can always be reversed with a single NEST
983
Detecting Wide Lines Using Isotropic Nonlinear Filtering
984
Detecting wild elephants via WSN for early warning system
985
Detecting Wind Power Ramp with Random Vector Functional Link (RVFL) Network
986
Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model
987
Detecting wires in the canopy of grapevines using neural networks: A robust and heuristic free approach
988
Detecting with PMUs the onset of voltage instability caused by a large disturbance
989
Detecting Word Substitutions in Text
990
Detecting Workload Hotspots and Dynamic Provisioning of Virtual Machines in Clouds
991
Detecting worm attacks in cloud computing environment: Proof of concept
992
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]
993
Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis
994
Detecting wormhole attacks in wireless networks
995
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
996
Detecting wormhole attacks in wireless networks using local neighborhood information
997
Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis
998
Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission
999
Detecting Worms Using Data Mining Techniques: Learning in the Presence of Class Noise
1000
Detecting worms via mining dynamic program execution
بازگشت