Search alternatives:
method » methods (Expand Search)
Showing 21 - 40 results of 22,805 for search 'method of identification', query time: 0.19s Refine Results
  1. 21
  2. 22
  3. 23

    METHODOLOGICAL AND METHODICAL BASIS OF THE NETWORK APPROACH TO THE STUDY OF SOCIAL IDENTIFICATION by P. P. Deriugin, I. A. Baruzdin, S. V. Kurapov

    Published 2017-10-01
    “…The heuristic network method to study identification revealed the benefits of its axiological direction. …”
    Get full text
    Article
  4. 24

    Isolation and identification of tomato bacterial spot pathogen in Ningxia and screening of identification methods for disease resistance by LI Xiaohong, WANG Xiaomin, DENG Wenxia, WANG Kaibin, GUO Meng, CHENG Guoxin

    Published 2023-06-01
    “…Under the treatment combination of inoculating seedlings at the four-leaf stage, the bacterial suspension concentration of 1.00×10<sup>7</sup> CFU/mL, with stem inoculation method and 96 h moisture, the disease index was 72.22%, which was significantly higher than that in other treatments, and thus it was considered to be the best indoor resistance identification method at the seedling stage for tomato bacterial spot disease. …”
    Get full text
    Article
  5. 25
  6. 26

    An Improved VM Obstacle Identification Method for Reflection Road by Guoxin Jiang, Yi Xu, Xiaoqing Sang, Xiaotong Gong, Shanshang Gao, Ruoyu Zhu, Liming Wang, Yuqiong Wang

    Published 2022-01-01
    “…An obstacle detection method based on VM (VIDAR and machine learning joint detection model) is proposed to improve the monocular vision system's identification accuracy. …”
    Get full text
    Article
  7. 27

    Traditional and molecular methods for the identification of whitefly (Aleyrodidae) species by Maja DOBRAJC, Sebastjan RADIŠEK, Jernej JAKŠE, Stanislav TRDAN

    Published 2020-12-01
    “…The most common modern techniques for whiteflies determination are computer programs for photography analysis, molecular methods with DNA isolation and sequencing.…”
    Get full text
    Article
  8. 28

    Toward an Onboard Anomaly Detection and Identification Method for Satellites by Shun Katsube, Hironori Sahara

    Published 2025-01-01
    “…In addition, operators cannot directly repair or inspect satellites, making stable operations reliant on the early detection and identification of anomalies. However, conventional data-driven satellite monitoring methods often lack explainability and feasibility for onboard implementation. …”
    Get full text
    Article
  9. 29

    Fractionation as the main method for smoked tobacco products identification by S. V. Kalashnikov

    Published 2023-07-01
    “…A «Method  for determining the fractional composition of non-smoking tobacco products for oral consumption by the  method of sieve analysis» was developed (Certificate No. 022-01.00281-2013-2022). …”
    Get full text
    Article
  10. 30

    STRUCTURAL DAMAGE IDENTIFICATION BY SINGULAR VALUE TRUNCATION METHOD by YANG QiuWei, LU Chen, LI CuiHong

    Published 2019-01-01
    “…The singular value truncation method is studied in this work for structural damage identification. …”
    Get full text
    Article
  11. 31
  12. 32

    ELISA method in identification of the blood in the stains on the material evidences by V. L. Sidorov, O. D. Yagmurov

    Published 2013-09-01
    “…The method of definition of IgG by means of ELISA is compared with other modern techniques applied in Russia. …”
    Get full text
    Article
  13. 33

    THE RISKS IN THE GOLD MINING INDUSTRY: CLASSIFICATION, METHODS OF IDENTIFICATION by V. M. Zaernyuk, N. O. Snitko

    Published 2016-08-01
    “…The paper substantiates the necessity of using not only the economical and statistical methods of the risk evaluation, but also heuristic and simulation methods for the proper characteristic of the gold production and economic processes. …”
    Get full text
    Article
  14. 34

    Robust identification method of website fingerprinting against disturbance by ZHANG Jingxi, LI Tengyao, TU Yukuan, LUO Xiangyang

    Published 2024-12-01
    “…However, many defense mechanisms emerged to disturb the distinctive traffic patterns, which results in website fingerprint identification failure. The existing website fingerprint identification method with the best robustness named RF can maintain good performance against various defense methods, but it is difficult to resist the targeted defense method RF Countermeasure. …”
    Get full text
    Article
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39

    CSI-based underground personnel behavior identification method by Lei ZHANG, Yue ZHANG, Mingxue LI, Xinguo SHI, Bo ZHAI, Weilong WANG

    Published 2020-12-01
    “…To solve the problem of personnel behavior identification under the condition of dust environment and shielding and to promote the coal mine safety production,a personnel identification method based on the Wi-Fi channel state information (CSI) was proposed.The system used Hampel filter and median filter to process the raw CSI data,and utilized the phase information through a linear correction method.The recognition process was divided into the offline stage and online stage.In the offline stage,different activities data was collected to establish the recognition model.While in the online stage,current actions were recognized according to the recognition model.8 different human activities were set in the experiments and the result indicated that the recognition accuracy of this system could reach 95%.…”
    Get full text
    Article
  20. 40

    Microplastics: Features of appearance, identification methods (subject review) by D. M. Myalenko

    Published 2024-10-01
    “…Each of the methods has its advantages and disadvantages, mainly related to sample preparation to improve the accuracy of identification. …”
    Get full text
    Article