Showing 1,721 - 1,740 results of 17,765 for search '"detective"', query time: 0.08s Refine Results
  1. 1721
  2. 1722
  3. 1723

    Molecular Detection of Virulence Factors in Salmonella serovars Isolated from Poultry and Human Samples by Kelly Johanna Lozano-Villegas, María Paula Herrera-Sánchez, Mónica Alexandra Beltrán-Martínez, Stefany Cárdenas-Moscoso, Iang Schroniltgen Rondón-Barragán

    Published 2023-01-01
    “…In summary, the presence of virulence genes in different strains of Salmonella isolated from broilers and humans could be described as bacteria with potential pathogenicity due to the type and number of virulence genes detected. These findings are beneficial for the pathogenic monitoring of Salmonella in Colombia.…”
    Get full text
    Article
  4. 1724

    A Fuzzy-Decision Based Approach for Composite Event Detection in Wireless Sensor Networks by Shukui Zhang, Hao Chen, Qiaoming Zhu, Juncheng Jia

    Published 2014-01-01
    “…The event detection is one of the fundamental researches in wireless sensor networks (WSNs). …”
    Get full text
    Article
  5. 1725
  6. 1726

    The use of drones and Artificial Intelligence for dugong sighting detection in a limited resource scenario by Ario Digdo Akbar, Astari Elisabeth, Riskyta Arinda Bella, Cahyono Topan

    Published 2025-01-01
    “…This study aims to recount our experience conducting a combination of drone and AI-assisted detection (WISDAM) in a scenario with limited resources to detect dugongs. …”
    Get full text
    Article
  7. 1727

    Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm by Bin Li, Jingpeng Wang, Hailong Bao, Huiying Zhang

    Published 2014-01-01
    “…Islanding detection is essential for secure and reliable operation of microgrids. …”
    Get full text
    Article
  8. 1728

    The Role of Rotational Thromboelastometry in Early Detection of the Hemostatic Derangements in Neonates with Systemic Candida Infection by Rozeta Sokou, Alexia Eleftheria Palioura, Aikaterini Konstantinidi, Alexandra Lianou, Maria Lampridou, Martha Theodoraki, Daniele Piovani, Stefanos Bonovas, Konstantina A. Tsante, Petros Ioannou, Nicoletta Iacovidou, Andreas G. Tsantes

    Published 2024-12-01
    “…The results of this study highlight the need for monitoring of hemostatic status of this vulnerable group of patients and indicate that ROTEM analysis may have a role in the early detection of the hemostatic derangements associated with SCI in neonates, in order to ensure timely diagnosis and targeted therapeutic intervention.…”
    Get full text
    Article
  9. 1729

    Salt and Pepper Noise Removal with Noise Detection and a Patch-Based Sparse Representation by Di Guo, Xiaobo Qu, Xiaofeng Du, Keshou Wu, Xuhui Chen

    Published 2014-01-01
    “…A denoising method by detecting noise candidates and enforcing image sparsity with a patch-based sparse representation is proposed. …”
    Get full text
    Article
  10. 1730

    Early disease detection expert system development: primary machining software applications and dependences by A. S. Serobabov, E. V. Chebanenko, L. A. Denisova, T. S. Krolevets

    Published 2018-09-01
    “…The interconnections map of the patienthood diagnostics was retrieved, which enables to detect the dependences between the liver disease markers for the early disease detection expert system development.…”
    Get full text
    Article
  11. 1731

    Frequency and Distribution of Parasites Detected in Children Between 2017-2022 (6-year Period) by Yelda Sorguç

    Published 2024-12-01
    “…The intestinal parasite detected at the highest rate was Entamoeba histolytica (67%). …”
    Get full text
    Article
  12. 1732

    Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS by G. Y. Sree Varshini, S. Latha

    Published 2023-01-01
    “…The attack magnitude injected by the adversary is stealthier and it cannot be detected using conventional bad data detection techniques. …”
    Get full text
    Article
  13. 1733
  14. 1734
  15. 1735

    Enhancing Agricultural Disease Detection: A Multi‐Model Deep Learning Novel Approach by Muhammad Khalid Hamid, Said Khalid Shah, Ghassan Husnain, Yazeed Yasin Ghadi, Shahab Ahmad Al Maaytah, Ayman Qahmash

    Published 2025-01-01
    “…The findings indicate that the proposed multi‐model approach allows a scalable, non‐invasive, and contactless machine vision solution for the early detection of diseases in plant leaves, achieving an efficiency of 99% via multimodal classification techniques that incorporate statistical variables including mean, median, mode, skewness, and kurtosis.…”
    Get full text
    Article
  16. 1736

    A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning by Bin Jia, Xiaohong Huang, Rujun Liu, Yan Ma

    Published 2017-01-01
    “…The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR), accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD) to construct our detection system. …”
    Get full text
    Article
  17. 1737

    Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach by Tianyi Li, Mingfeng Shang, Shian Wang, Raphael Stern

    Published 2025-01-01
    “…The proposed approach is observed to outperform contemporary neural network models in detecting irregular driving patterns of ACC vehicles.…”
    Get full text
    Article
  18. 1738

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  19. 1739
  20. 1740