Suggested Topics within your search.
Suggested Topics within your search.
-
441
Experimental Estimation of Journal Bearing Stiffness for Damage Detection in Large Hydrogenerators
Published 2017-01-01Get full text
Article -
442
Detection of Cervical Uterine Cancer: cytology after 25 years old?
Published 2018-12-01“…This article is aimed at reflecting about the incidence of this disease at early ages; however the program for its detection includes performing cytology starting at 25 year old. …”
Get full text
Article -
443
Fault Detection in Photovoltaic Systems Using a Machine Learning Approach
Published 2025-01-01Get full text
Article -
444
Evaluation of Scintillation Counter Detector Using Gamma Radiation for Gold Detection
Published 2024-12-01“… The aim of this work is to evaluate the efficiency of a new gamma spectrometer technology using a scintillation counter detector. This technique can detect the backscattered gamma radiation emitted from the samples. …”
Get full text
Article -
445
Acoustic Detection and Quantification of Fish in Lancang Waters of Seribu Islands, Indonesia
Published 2024-06-01Get full text
Article -
446
Research on Android malware detection method based on multimodal feature fusion
Published 2025-01-01“…Existing Android malware detection methods mainly use single-modal data to characterize program features, but fail to fully mine and fuse different feature information, resulting in unsatisfactory detection results. …”
Get full text
Article -
447
Parametric Design of Steel Ball Automatic Detection System Based on VB
Published 2020-10-01“…Firstly, establishing the template model library of steel ball automatic detection system, and the library is divided into general parts model library and key parts design library through analyzing the function structure, using SolidWorks part design table function realizes parametric design of key components; Calling the model library to complete the establishment of detection system virtual assembly model, and using SolidWorks macro function to make the driver program of key parts and assembly model,Finally, the simulation technology is used to simulate the process of steel ball, and the correctness of the theoretical analysis results is verified Finally, the parametric design method of automatic detection system of steel ball is put forward…”
Get full text
Article -
448
Detection of chikungunya virus in Aedes aegypti in Ciudad Juárez, Chihuahua, Mexico
Published 2025-04-01“…Background & objectives: Chikungunya fever is caused by an arbovirus transmitted primarily by Aedes aegypti mosquito, which is prevalent in Mexico along with other pathogens carried by this vector. This study aimed to detect the presence of the chikungunya virus (CHIKV) in Ae. aegypti in a vulnerable area of Ciudad Juárez, Chihuahua. …”
Get full text
Article -
449
A Smart Device Enabled System for Autonomous Fall Detection and Alert
Published 2016-02-01“…The stream data via Bluetooth is then sent to a smart phone, which runs a program based on the k NN algorithm and sliding window to analyze the stream data and detect falls in the background. …”
Get full text
Article -
450
A Hardware-Aware Failure-Detection Method for GPU Control-Logic
Published 2025-01-01“…This paper assumes three types of control-logic failures for a general GPU architecture and proposes efficient failure detection methods for each type. For instance, the proposed method efficiently detects GPU-specific control-logic failures caused by program counter faults with a detection rate of 99.5% and can be implemented with a runtime overhead of 5.3% and a memory-resource overhead of 4.2% for a matrix multiplication application. …”
Get full text
Article -
451
Webshell malicious traffic detection method based on multi-feature fusion
Published 2021-12-01“…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
Get full text
Article -
452
“Poetics of Drunkenness” in Popular Literature (on Example of Ironic Detective by Darya Dontsova)
Published 2018-11-01“…The features of verbalization of Bacchic stereotypes of the modern man on the example of the ironic detective by Daria Dontsova are considered. It is noted that the image of a drinking person is associated with certain stereotypes of appearance. …”
Get full text
Article -
453
Application of deep learning for rice leaf disease detection in the Mekong Delta
Published 2024-10-01“…This paper utilizes an image dataset of three common rice leaf diseases—leaf smut, brown spot, and bacterial leaf blight—and applies deep learning networks (MobileNet and ResNet) to evaluate and select the best model. A diagnostic program is then developed to detect these diseases. …”
Get full text
Article -
454
Application of deep learning for rice leaf disease detection in the Mekong Delta
Published 2024-10-01“…This paper utilizes an image dataset of three common rice leaf diseases—leaf smut, brown spot, and bacterial leaf blight—and applies deep learning networks (MobileNet and ResNet) to evaluate and select the best model. A diagnostic program is then developed to detect these diseases. …”
Get full text
Article -
455
REPrise: de novo interspersed repeat detection using inexact seeding
Published 2025-04-01“…However, existing tools do not yet have sufficient repeat detection performance. Results In this study, we developed REPrise, a de novo interspersed repeat detection software program based on a seed-and-extension method. …”
Get full text
Article -
456
The Detection of Spatially Resolved Protostellar Outflows and Episodic Jets in the Outer Galaxy
Published 2025-01-01Get full text
Article -
457
Beyond Detection: A Framework for Transforming Accessibility Evaluations into Implementable Fixes
Published 2025-07-01Get full text
Article -
458
Early Detection of Apoptosis Using a Fluorescent Conjugate of Annexin V
Published 1997-09-01“…However, detection of apoptosis at early stages, before gross morphological changes, is critical for understanding the pathways of programmed cell death. …”
Get full text
Article -
459
Short-Term Results of Early Detection of Critical Congenital Heart Disease
Published 2025-06-01“…Objectives: The purpose of this study was to evaluate the short-term outcomes of an early CCHD-detection program at the National Maternal Perinatal Institute in Lima, Peru. …”
Get full text
Article -
460
Detecting and understanding potential stigma among medical cannabis users in Germany
Published 2025-03-01Get full text
Article