Showing 41 - 60 results of 22,805 for search 'methods of identification', query time: 0.20s Refine Results
  1. 41

    STRUCTURAL DAMAGE IDENTIFICATION BY SINGULAR VALUE TRUNCATION METHOD by YANG QiuWei, LU Chen, LI CuiHong

    Published 2019-01-01
    “…The singular value truncation method is studied in this work for structural damage identification. …”
    Get full text
    Article
  2. 42
  3. 43

    ELISA method in identification of the blood in the stains on the material evidences by V. L. Sidorov, O. D. Yagmurov

    Published 2013-09-01
    “…The method of definition of IgG by means of ELISA is compared with other modern techniques applied in Russia. …”
    Get full text
    Article
  4. 44

    Robust identification method of website fingerprinting against disturbance by ZHANG Jingxi, LI Tengyao, TU Yukuan, LUO Xiangyang

    Published 2024-12-01
    “…However, many defense mechanisms emerged to disturb the distinctive traffic patterns, which results in website fingerprint identification failure. The existing website fingerprint identification method with the best robustness named RF can maintain good performance against various defense methods, but it is difficult to resist the targeted defense method RF Countermeasure. …”
    Get full text
    Article
  5. 45
  6. 46

    CSI-based underground personnel behavior identification method by Lei ZHANG, Yue ZHANG, Mingxue LI, Xinguo SHI, Bo ZHAI, Weilong WANG

    Published 2020-12-01
    “…To solve the problem of personnel behavior identification under the condition of dust environment and shielding and to promote the coal mine safety production,a personnel identification method based on the Wi-Fi channel state information (CSI) was proposed.The system used Hampel filter and median filter to process the raw CSI data,and utilized the phase information through a linear correction method.The recognition process was divided into the offline stage and online stage.In the offline stage,different activities data was collected to establish the recognition model.While in the online stage,current actions were recognized according to the recognition model.8 different human activities were set in the experiments and the result indicated that the recognition accuracy of this system could reach 95%.…”
    Get full text
    Article
  7. 47

    Pollution source identification methods and remediation technologies of groundwater: A review by Ya-ci Liu, Yu-hong Fei, Ya-song Li, Xi-lin Bao, Peng-wei Zhang

    Published 2024-01-01
    “…Among these identification methods, only the numerical modeling can recognize various information on pollution sources, while other methods can only identify a certain aspect of pollution sources. …”
    Get full text
    Article
  8. 48
  9. 49

    Comparison of traditional and modern methods for identification of economically important wireworm species (Coleoptera: Elateridae) by Eva PRAPROTNIK, Jaka RAZINGER, Stanislav TRDAN

    Published 2021-03-01
    “…Mitochondrial gene for cytochrome oxidase I is most commonly used for molecular identification of wireworms. In this study we list molecular, morphological and behavioural methods for wireworm identification and also highlight the advantages and disadvantages of these methods. …”
    Get full text
    Article
  10. 50
  11. 51

    Comparison of different methods for identification of pathogenic bacteria from rice by XIE Guan-lin

    Published 2000-07-01
    “…Biolog and FAMEs were more believable and rapid methods. However, they need some complemental method for identification of some pathogenic bacteria due to their limited databases. …”
    Get full text
    Article
  12. 52
  13. 53
  14. 54

    Computational methods for protein identification from mass spectrometry data. by Leo McHugh, Jonathan W Arthur

    Published 2008-02-01
    “…Here, we undertake a systematic review of the currently available methods and algorithms for interpreting, managing, and analyzing biological data associated with protein identification. …”
    Get full text
    Article
  15. 55

    Analysis of selected methods of person identification based on biometric data by Marcin Rudzki, Paweł Powroźnik

    Published 2025-06-01
    “… The article explores the challenge of identifying individuals using biometric data through advanced deep learning methods. The research employs three ground-breaking convolutional neural network architectures: ResNet50, EfficientNetB0, and VGG16. …”
    Get full text
    Article
  16. 56
  17. 57
  18. 58

    System Identification Methods for Dynamic Testing of Fluid-Film Bearings by Jerzy T. Sawicki, Maurice L. Adams, Russell J. Capaldi

    Published 1996-01-01
    “…This paper describes system identification and data reduction methods used for extracting rotordynamic coefficients of fluid-film journal bearings. …”
    Get full text
    Article
  19. 59

    Algorithms and Methods for Individual Source Camera Identification: A Survey by Jaroslaw Bernacki, Rafal Scherer

    Published 2025-05-01
    “…Moreover, we also discuss the issue of camera identification using videos and provide a brief description of popular image datasets that might be used for source camera identification method benchmarking.…”
    Get full text
    Article
  20. 60

    Seismic fault identification method based on CBAM-TransUNet by Xin WANG, Wei ZHANG, Tongjun CHEN, Ao ZHANG, Dang ZHAO

    Published 2025-02-01
    “…Transformer has the advantage of extracting global information, and introduces the TransUNet network which is a fusion of CNN and Transformer to construct a CBAM- based seismic fault identification method. TransUNet seismic fault identification method to identify 2D seismic fault images. …”
    Get full text
    Article