Showing 341 - 360 results of 5,457 for search 'detection programs', query time: 0.13s Refine Results
  1. 341

    Clinical Validation of a Program for Diagnosing Vision-Threatening Diabetic Retinopathy Based on Automatic Segmentation Algorithms by G. M. Gabaraev, E. N. Ponomareva, I. A. Loskutov, E. A. Katalevskaya, M. R. Khabazova

    Published 2023-07-01
    “…In the process of analyzing fundus photographs with Retina AI algorithms, a high efficiency of automatic detection of vision-threatening retinopathy was revealed. …”
    Get full text
    Article
  2. 342

    Verification of the Reliability of an Automated Urine Test Strip Colorimetric Program Using Colorimetric Analysis: Survey Study by Keigo Inagaki, Daisuke Tsuriya, Takuya Hashimoto, Katsumasa Nakamura

    Published 2025-01-01
    “…If this program can be used at home to perform urinary microalbumin tests, the early detection and treatment of diabetic nephropathy may prevent the condition from becoming severe.…”
    Get full text
    Article
  3. 343
  4. 344

    Application of Genomic Selection in Beef Cattle Disease Prevention by Ramanathan Kasimanickam, Joao Carlos Pinheiro Ferreira, John Kastelic, Vanmathy Kasimanickam

    Published 2025-01-01
    “…These genomic insights allow for more accurate breeding programs aimed at enhancing disease resistance and overall herd resilience. …”
    Get full text
    Article
  5. 345

    Disruption of glutamine transport uncouples the NUPR1 stress-adaptation program and induces prostate cancer radiosensitivity by Uğur Kahya, Vasyl Lukiyanchuk, Ielizaveta Gorodetska, Matthias M. Weigel, Ayşe Sedef Köseer, Berke Alkan, Dragana Savic, Annett Linge, Steffen Löck, Mirko Peitzsch, Ira-Ida Skvortsova, Mechthild Krause, Anna Dubrovska

    Published 2025-07-01
    “…Analysis of the general oxidative stress level and mitochondrial superoxide detection were conducted using flow cytometry. γH2A.X foci analysis was used to assess the DNA double strand break. …”
    Get full text
    Article
  6. 346
  7. 347
  8. 348
  9. 349

    Cross-language refactoring detection method based on edit sequence by Tao LI, Dongwen ZHANG, Yang ZHANG, Kun ZHENG

    Published 2024-12-01
    “…The research results realize cross-language refactoring detection and effectively compensate for the defect of unreliable commit messages, which provides some reference for the detection of other programming languages and refactoring types.…”
    Get full text
    Article
  10. 350
  11. 351
  12. 352

    ECG Paper Digitization and R Peaks Detection Using FFT by Ibraheam Fathail, Vaishali D. Bhagile

    Published 2022-01-01
    “…One of the most essential tools for detecting heart problems is the electrocardiogram (ECG). …”
    Get full text
    Article
  13. 353

    On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code by Yury V. Kosolapov

    Published 2020-06-01
    “…An algorithm and a system for detecting abnormal code execution are proposed. The work carried out experiments in the case when P is the FireFox browser. …”
    Get full text
    Article
  14. 354
  15. 355
  16. 356

    Sysmon event logs for machine learning-based malware detection by Riki Mi’roj Achmad, Dyah Putri Nariswari, Baskoro Adi Pratomo, Hudan Studiawan

    Published 2025-12-01
    “…Malware poses a significant threat to modern computing environments, necessitating advanced detection techniques that can adapt to evolving attack methods. …”
    Get full text
    Article
  17. 357

    TEST DETERMINATION OF PROBABILITY OF AIRBORNE DETECTION OF GROUND SURFACE OBJECTS by S. V. Nikolaev

    Published 2017-11-01
    “…The relative discrepancy between the indicators obtained in the flight experiment and calculated by the developed program is less than 5%.The author proposes new private efficiency indicators for the visual detection task of typical ground objects. …”
    Get full text
    Article
  18. 358

    Burden of pulmonary tuberculosis and challenges related to tuberculosis detection in Ethiopia by Letebrhan Weldemhret

    Published 2023-05-01
    “…The need for rapid, accurate and affordable methods for TB management should be considered by policy makers to improve TB detection rate and reduction of TB related deaths in line with the stop TB strategy by 2030 in Ethiopia. …”
    Get full text
    Article
  19. 359

    Exploit detection based on illegal control flow transfers identification by Ming-hua WANG, Ling-yun YING, Deng-guo FENG

    Published 2014-09-01
    “…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
    Get full text
    Article
  20. 360