Showing 1,821 - 1,840 results of 25,128 for search 'detection (process OR programs)', query time: 0.28s Refine Results
  1. 1821

    Using A One-Class SVM To Optimize Transit Detection by Jakob Roche

    Published 2024-07-01
    “…As machine learning algorithms become increasingly accessible, a growing number of organizations and researchers are using these technologies to automate the process of exoplanet detection. These mainly utilize Convolutional Neural Networks (CNNs) to detect periodic dips in lightcurve data. …”
    Get full text
    Article
  2. 1822

    Community Detection in Social Network Based on Node Influence Expansion by YANG Hailu, ZHAO Xin, CHEN Chen, WANG Lili

    Published 2023-06-01
    “…Finally, to finish the process of community detection, dynamic programming is employed for seed expansion.The results of the experiments reveal that community detection based on node influence expansion can effectively discover the community structure with small granularity and has certain performance advantages in modularity, D-score, and other indicators.…”
    Get full text
    Article
  3. 1823

    Programming‐Assisted Imaging of Cellular Nitric Oxide Efflux Gradients and Directionality via Carbon Nanotube Sensors by Ivon Acosta Ramirez, Sruti Das Choudhury, Carley Conover, Omer Sadak, Nicole M. Iverson

    Published 2025-04-01
    “…Nitric oxide (NO), a gaseous signaling molecule, is critical in physiological and pathological processes. However, current NO sensing methods lack the spatiotemporal resolution necessary to study subcellular NO efflux. …”
    Get full text
    Article
  4. 1824

    GATA6 regulates WNT and BMP programs to pattern precardiac mesoderm during the earliest stages of human cardiogenesis by Joseph A Bisson, Miriam Gordillo, Ritu Kumar, Neranjan de Silva, Ellen Yang, Kelly M Banks, Zhong-Dong Shi, Kihyun Lee, Dapeng Yang, Wendy K Chung, Danwei Huangfu, Todd Evans

    Published 2025-03-01
    “…Profiling by RNA-seq and CUT&RUN identified genes of the WNT and BMP programs regulated by GATA6 during early mesoderm patterning. …”
    Get full text
    Article
  5. 1825

    ENHANCING NEONATAL HYPERBILIRUBINEMIA MANAGEMENT: A COMMUNITY SERVICE PROGRAM AT RSUD AJI BATARA DEWA SAKTI by Mahendra Tri Arif Sampurna, Hidayat Niko Azhari, Zida Husnina, Muhammad Rizky Widodo, Syah Reza Budi Azhari

    Published 2024-12-01
    “…This study highlighted the positive impact of this program on early detection and management practices.…”
    Get full text
    Article
  6. 1826

    Fault Detection Based on Kernel Global Local Preserving Projection by Wenbiao Wang, Qianqian Zhang, Youwei Hao

    Published 2025-03-01
    “…Experiments on the Tennessee Eastman process and industrial boilers demonstrate that the proposed method balances global and local data structures, reduces nonlinear influences, and improves the fault detection rate.…”
    Get full text
    Article
  7. 1827

    Paper-Based Aptasensor Assay for Detection of Food Adulterant Sildenafil by Murat Kavruk, Veli Cengiz Ozalp

    Published 2024-12-01
    “…This study introduces a lateral flow strip test using aptamers specific to sildenafil for detecting its illegal presence in food. The process involved using graphene oxide SELEX to identify high-affinity aptamers, which were then converted into molecular gate structures on mesoporous silica nanoparticles, creating a unique signaling system. …”
    Get full text
    Article
  8. 1828

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article
  9. 1829

    Research on 5G upstream bandwidth detection technology and application by Guobin XU, Zhewei FU, Ming LIU, Zhiji DENG, Cungang WANG, Guanghai ZHONG, Hui LI, Wei MENG, Yunjie WU

    Published 2021-12-01
    “…A scheme of 5G upstream bandwidth detection technology and application was proposed, which could effectively solve the problem of 5G network fluctuation in video monitoring data transmission process.It will help the deployment of 5G video monitoring application.By obtaining the radio resource information of 5G NR, the terminal can count the transmission resource and estimate the change trend of uplink bandwidth.Combined with the intelligent coding technology and bit-stream adaptive technology of streaming media application, the scheme ensures no stuck and continuous picture at the cost of losing a little video definition, and ensures the overall experience of customers.The scheme can be widely used in the scene of heavy 5G public service, large network fluctuation and wide network coverage, such as campus video surveillance.…”
    Get full text
    Article
  10. 1830
  11. 1831

    Sysmon event logs for machine learning-based malware detection by Riki Mi’roj Achmad, Dyah Putri Nariswari, Baskoro Adi Pratomo, Hudan Studiawan

    Published 2025-12-01
    “…This study focuses on dynamic malware analysis using machine learning models to process detailed data from Sysmon Event Logs, a crucial sources of system information that record both running program activities. …”
    Get full text
    Article
  12. 1832

    Local Outlier Detection Method Based on Improved K-means by Yu ZHOU, Hao XIA, Xuezhen YUE, Peichong WANG

    Published 2024-07-01
    “…This property makes it suitable for outlier detection, as outliers significantly affect the clustering process. …”
    Get full text
    Article
  13. 1833
  14. 1834

    Blotch Detection in Archive Films Based on Visual Saliency Map by Yildiz Aydin, Bekir Dizdaroğlu

    Published 2020-01-01
    “…After the visual saliency maps of the given frames are obtained, blotch regions are estimated by considered spatiotemporal patches—without the requirement for motion estimation—around the saliency pixels, which are subjected to a prethresholding process. Experimental results show that the proposed block-based blotch detection method provides a significant advantage with reducing false alarm rates over HOG feature (Yous and Serir, 2017), LBP feature (Yous and Serir, 2017), and regions-matching (Yous and Serir, 2016) methods presented in recent years.…”
    Get full text
    Article
  15. 1835

    Multimodal Rumor Detection by Online Balance Multimodal Representation Learning by Jianing Ren, Tingting Zhong

    Published 2025-01-01
    “…To overcome this limitation in multimodal rumor detection, we employ a training strategy that dynamically scales the logits of each modality. …”
    Get full text
    Article
  16. 1836

    The advances of DNA methylation in the liquid biopsy for the detection of lung cancer by Yuxuan Chen, Shuang Peng, Cailian Wang

    Published 2025-07-01
    “…This review aims to present an overview of the process of DNA methylation, identify potential methylation gene targets, and explore the application of liquid biopsy in the detection of lung cancer.…”
    Get full text
    Article
  17. 1837

    Self-collision Detection and Motion Planning of Hydraulic Quadruped Robot by SHAO Junpeng, CHI Hanwei, SUN Guitao

    Published 2020-10-01
    “…Aiming at the selfcollision problem in the motion of fourlegged robots, the distance function method is adopted, the feature points are selected for the legs, and the distance between the feature points is detected to plan the trajectory of the foot In the research process, the threedimensional model of the quadruped robot was established, and four selfcollision position detection models were given The analysis of the leg motion space was performed Two feature points were selected on each leg, and the feature points were used to solve the feature points Control the distance between the legs to control the legs Through simulation analysis and experiment, the distance function method can be used to control the minimum distance between the two ends at 3472mm, effectively avoiding the collision problem between the legs during the running of the robot…”
    Get full text
    Article
  18. 1838

    Some conceptual aspect of overcoming anti-detection and investigation of crimes by G.V. Burganova, R.R. Rahmatullin

    Published 2019-02-01
    “…This vector of development of forensic science is relevant due to practical necessity, the actual state of affairs, as well as the essence of law, which obliges to respond to all the processes occurring in public life.…”
    Get full text
    Article
  19. 1839

    Design of a low offset operational amplifier for current detection by Li Xin, Yu Chen, Yang Senlin

    Published 2025-05-01
    “…Aiming at the requirement of current detection for operational amplifier performance, a new low offset operational amplifier circuit is proposed. …”
    Get full text
    Article
  20. 1840