Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Detection

Journals

  • IJIEC (777)
  • MSL (2643)
  • DSL (690)
  • CCL (528)
  • USCM (1092)
  • ESM (421)
  • AC (562)
  • JPM (293)
  • IJDS (952)
  • JFS (101)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(168)
Jordan(165)
Vietnam(151)
Customer satisfaction(120)
Performance(115)
Supply chain(112)
Service quality(98)
Competitive advantage(97)
Tehran Stock Exchange(94)
SMEs(89)
optimization(87)
Sustainability(86)
Artificial intelligence(85)
Financial performance(84)
Trust(83)
TOPSIS(83)
Job satisfaction(81)
Genetic Algorithm(78)
Factor analysis(78)
Social media(78)


» Show all keywords

Authors

Naser Azad(82)
Zeplin Jiwa Husada Tarigan(66)
Mohammad Reza Iravani(64)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(40)
Dmaithan Almajali(37)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Ahmad Makui(33)
Barween Al Kurdi(32)
Hassan Ghodrati(31)
Basrowi Basrowi(31)
Sautma Ronni Basana(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Haitham M. Alzoubi(28)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)


» Show all authors

Countries

Iran(2192)
Indonesia(1311)
Jordan(813)
India(793)
Vietnam(510)
Saudi Arabia(478)
Malaysia(444)
China(231)
United Arab Emirates(226)
Thailand(160)
United States(114)
Ukraine(110)
Turkey(110)
Egypt(106)
Peru(94)
Canada(93)
Morocco(86)
Pakistan(85)
United Kingdom(80)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Machine learning approaches for enhancing smart contracts security: A systematic literature review Pages 1349-1368 Right click to download the paper Download PDF

Authors: Areej AlShorman, Fatima Shannaq, Mohammad Shehab

DOI: 10.5267/j.ijdns.2024.4.007

Keywords: Ethereum, Smart Contracts, Machine Learning, Vulnerability, Attack, Detection

Abstract:
Smart contracts offer automation for various decentralized applications but suffer from vulnerabilities that cause financial losses. Detecting vulnerabilities is critical to safeguarding decentralized applications before deployment. Automatic detection is more efficient than manual auditing of large codebases. Machine learning (ML) has emerged as a suitable technique for vulnerability detection. However, a systematic literature review (SLR) of ML models is lacking, making it difficult to identify research gaps. No published systematic review exists for ML approaches to smart contract vulnerability detection. This research focuses on ML-driven detection mechanisms from various databases. 46 studies were selected and reviewed based on keywords. The contributions address three research questions: vulnerability identification, machine learning model approaches, and data sources. In addition to highlighting gaps that require further investigation, the drawbacks of machine learning are discussed. This study lays the groundwork for improving ML solutions by mapping technical challenges and future directions.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 1683 | Reviews: 0

 
2.

A train bearing fault detection and diagnosis using acoustic emission Pages 63-68 Right click to download the paper Download PDF

Authors: Tonphong Kaewkongka

DOI: 10.5267/j.esm.2015.12.003

Keywords: Acoustic emission, Bearing, Detection, Diagnosis, Train

Abstract:
This paper provides a method of acoustic emission (AE) technique to detect a train bearing fault of tapered bearing unit (TBU). An approach is to utilize acoustic emission signals which were captured from piezoelectric transducer and processed using Fourier transform. The transformed signals may contain unique characteristic features relating to the various types of bearing faults. The experiments on different operating conditions were investigated and they corresponded to (a) a normal bearing and (b) outer race defect bearing. The result is promising for faulty bearing identification and discrimination between different bearing conditions.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: ESM | Year: 2016 | Volume: 4 | Issue: 2 | Views: 2200 | Reviews: 0

 
3.

Leak detection and localization using acoustic emission technique Pages 17-24 Right click to download the paper Download PDF

Authors: Tonphong Kaewkongka

DOI: 10.5267/j.esm.2015.10.003

Keywords: Acoustic emission, Detection, Leak, Localization

Abstract:
This article provides a method of acoustic emission (AE) technique to detect leakage in pipeline and locate the position of the leakage. The AE sensor is made of piezoelectric effect transducer to pick up the acoustic emission signal which is generated from the turbulent flow at the leak position. The signal conditioning unit is used to enhanced and eliminate the background noise from the leak location sources. The main acoustic emission processing unit is used to acquire and process the extracted AE characteristic parameters from preprocessing waveform. The leak pipeline is simulated by drilling the hole and plugged with M8 screw at different locations. The results show that the proposed AE method can detect and locate simultaneous leak condition in pipeline with promising results.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: ESM | Year: 2016 | Volume: 4 | Issue: 1 | Views: 2370 | Reviews: 0

 

® 2010-2026 GrowingScience.Com