-
21
DETECTION, IDENTIFICATION, AND ANTIBIOTIC RESISTANCE PATTERNS OF FOODBORNE BACTERIAL AND FUNGAL PATHOGENS
Published 2024-11-01Get full text
Article -
22
Construction and application of march tests for pattern sensitive memory faults detection
Published 2021-03-01“…The mathematical models of their faults and the methods used for testing the most complex cases by classical march tests are investigated. Passive pattern sensitive faults (PNPSFk) are allocated, in which arbitrary k from N memory cells participate, where k << N, and N is the memory capacity in bits. …”
Get full text
Article -
23
Length of Polarization-Correlation Based on Speckle Pattern for Optical Coherent Detection
Published 2024-01-01“…A length of polarization-correlation (LPC) based on speckle pattern of the non-uniform spatial polarization distribution is proposed and measured by using the classical measurement method of the Stokes polarization parameters for optical coherent detection. …”
Get full text
Article -
24
Multiscale mobility patterns and the restriction of human movement
Published 2023-10-01“…Furthermore, the flow communities in the fine-scale partition not only match well the UK travel to work areas but also capture mobility patterns beyond commuting to work. We also examine the evolution of mobility under lockdown and show that mobility first reverted towards fine-scale flow communities already found in the pre-lockdown data, and then expanded back towards coarser flow communities as restrictions were lifted. …”
Get full text
Article -
25
Accuracy of self-reported foot strike pattern detection among endurance runners
Published 2024-12-01“…Accurate foot strike pattern detection may help prevent running related injury (RRI) and facilitate gait modifications and shoe transitions. …”
Get full text
Article -
26
Effects of search intent on eye-movement patterns in a change detection task
Published 2015-08-01“…The goal of the present study was to examine whether intention type affects eye movement patterns in a change detection task In addition, we assessed whether the eye movement index could be used to identify human implicit intent. …”
Get full text
Article -
27
Detection and Tracking of MAVs Using a Rosette Scanning Pattern LiDAR
Published 2025-01-01“…In this study, we tackle this challenge, by using non-repetitive rosette scanning pattern LiDARs, particularly focusing on increasing the detection distance by leveraging the characteristics of the sensor. …”
Get full text
Article -
28
Traffic Pattern Analysis at Urban Intersections through Vehicle Detection in Aerial Imagery
Published 2025-07-01“…This approach allows us to infer vehicle density, identify queuing patterns, and analyze traffic light cycles. Such analysis can assess the robustness of signal timing under different traffic flows and the factors that influence intersection performance. …”
Get full text
Article -
29
Detection of Victimization Patterns and Risk of Gender Violence Through Machine Learning Algorithms
Published 2025-02-01Get full text
Article -
30
Temporal Patterns of Holter-Detected Arrhythmias in Hypertrophic Cardiomyopathy Patients Treated with Mavacamten
Published 2025-04-01“…This study assesses the temporal patterns of Holter-detected arrhythmias in HCM patients treated with mavacamten. …”
Get full text
Article -
31
Detection of anomalous spatio-temporal patterns of app traffic in response to catastrophic events
Published 2025-05-01“…We detect a similar pattern in the city of Lyon in response to the bombing. …”
Get full text
Article -
32
Generate vector graphics of fine-grained pattern based on the Xception edge detection
Published 2025-01-01Get full text
Article -
33
Extracellular bioelectrical lexicon: detecting rhythmic patterns within dermal fibroblast populations
Published 2025-08-01Get full text
Article -
34
Generate vector graphics of fine-grained pattern based on the Xception edge detection.
Published 2025-01-01“…We firstly adopt appropriate pre-processing methods, improved adaptive median filtering(IAMF) and non-local mean for the two different types of Qiang embroidery patterns to reduce image noise. Then, the Xception algorithm based on convolutional neural networks(CNNs) is used for edge detection and extraction to generate vector graphics of the patterns. …”
Get full text
Article -
35
Diffusion Pattern and Hotspot Detection of Dengue in Belo Horizonte, Minas Gerais, Brazil
Published 2012-01-01Get full text
Article -
36
Influence of differential source patterns in the detection of signals of disproportionate reporting for PARP inhibitors
Published 2024-12-01Subjects: Get full text
Article -
37
Optimization of Complex Cancer Morphology Detection Using the SIVQ Pattern Recognition Algorithm
Published 2012-01-01“…Especially important is the determination of relative contributions of each key SIVQ matching parameter with respect to the algorithm’s overall detection performance. Herein, by combinatorial testing of SIVQ ring size, sub-ring number, and inter-ring wobble parameters, in the setting of a morphologically complex bladder cancer use case, we ascertain the relative contributions of each of these parameters towards overall detection optimization using urothelial carcinoma as a use case, providing an exemplar by which this algorithm and future histology-oriented pattern matching tools may be validated and subsequently, implemented broadly in other appropriate microscopic classification settings.…”
Get full text
Article -
38
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
Get full text
Article -
39
Repeated Web Page Visits and the Scanpath Theory: A Recurrent Pattern Detection Approach
Published 2010-10-01“…With a recurrent temporal pattern detection technique, we examine additional aspects and expose scanpaths. …”
Get full text
Article -
40
Detecting Fraudulent Transactions for Different Patterns in Financial Networks Using Layer Weigthed GCN
Published 2025-04-01“…The proposed approach integrates adaptive layer weighting, enabling the model to dynamically adjust the contribution of different GNN layers to better capture intricate transaction patterns. Additionally, the flexible architecture of LayerWeighted-GCN enhances its ability to model complex financial relationships, improving fraud detection accuracy and robustness. …”
Get full text
Article