Suggested Topics within your search.
Suggested Topics within your search.
- Automobiles 1
- Communication in rehabilitation 1
- Crimes against 1
- FICTION / Psychological 1
- FICTION / Thrillers 1
- Fathers and daughters 1
- Fault location (Engineering) 1
- Fiction 1
- Government policy 1
- Hastings, Stanley (Fictitious character) 1
- History 1
- Language 1
- Law 1
- Maintenance and repair 1
- Medical rehabilitation 1
- Moral and ethical aspects 1
- Motion picture industry 1
- Murder 1
- Mystery and detective stories 1
- Police 1
- Prevention 1
- Private investigators 1
- Psychological aspects 1
- Psychologists 1
- Psychology 1
- Rehabilitation 1
- Social aspects 1
- Technological innovations 1
- Telecommunication in medicine 1
- Telemedicine 1
-
1721
Dental Management of a Child with Incidentally Detected Hemophilia: Report of a Clinical Case
Published 2017-01-01Get full text
Article -
1722
AquaYOLO: Enhancing YOLOv8 for Accurate Underwater Object Detection for Sonar Images
Published 2025-01-01Subjects: “…underwater object detection…”
Get full text
Article -
1723
Molecular Detection of Virulence Factors in Salmonella serovars Isolated from Poultry and Human Samples
Published 2023-01-01“…In summary, the presence of virulence genes in different strains of Salmonella isolated from broilers and humans could be described as bacteria with potential pathogenicity due to the type and number of virulence genes detected. These findings are beneficial for the pathogenic monitoring of Salmonella in Colombia.…”
Get full text
Article -
1724
A Fuzzy-Decision Based Approach for Composite Event Detection in Wireless Sensor Networks
Published 2014-01-01“…The event detection is one of the fundamental researches in wireless sensor networks (WSNs). …”
Get full text
Article -
1725
Detecting respiratory diseases using machine learning-based pattern recognition on spirometry data
Published 2025-02-01Get full text
Article -
1726
The use of drones and Artificial Intelligence for dugong sighting detection in a limited resource scenario
Published 2025-01-01“…This study aims to recount our experience conducting a combination of drone and AI-assisted detection (WISDAM) in a scenario with limited resources to detect dugongs. …”
Get full text
Article -
1727
Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm
Published 2014-01-01“…Islanding detection is essential for secure and reliable operation of microgrids. …”
Get full text
Article -
1728
The Role of Rotational Thromboelastometry in Early Detection of the Hemostatic Derangements in Neonates with Systemic Candida Infection
Published 2024-12-01“…The results of this study highlight the need for monitoring of hemostatic status of this vulnerable group of patients and indicate that ROTEM analysis may have a role in the early detection of the hemostatic derangements associated with SCI in neonates, in order to ensure timely diagnosis and targeted therapeutic intervention.…”
Get full text
Article -
1729
Salt and Pepper Noise Removal with Noise Detection and a Patch-Based Sparse Representation
Published 2014-01-01“…A denoising method by detecting noise candidates and enforcing image sparsity with a patch-based sparse representation is proposed. …”
Get full text
Article -
1730
Early disease detection expert system development: primary machining software applications and dependences
Published 2018-09-01“…The interconnections map of the patienthood diagnostics was retrieved, which enables to detect the dependences between the liver disease markers for the early disease detection expert system development.…”
Get full text
Article -
1731
Frequency and Distribution of Parasites Detected in Children Between 2017-2022 (6-year Period)
Published 2024-12-01“…The intestinal parasite detected at the highest rate was Entamoeba histolytica (67%). …”
Get full text
Article -
1732
Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS
Published 2023-01-01“…The attack magnitude injected by the adversary is stealthier and it cannot be detected using conventional bad data detection techniques. …”
Get full text
Article -
1733
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: Get full text
Article -
1734
GATFELPA integrates graph attention networks and enhanced label propagation for robust community detection
Published 2025-01-01Subjects: “…Community detection…”
Get full text
Article -
1735
Enhancing Agricultural Disease Detection: A Multi‐Model Deep Learning Novel Approach
Published 2025-01-01“…The findings indicate that the proposed multi‐model approach allows a scalable, non‐invasive, and contactless machine vision solution for the early detection of diseases in plant leaves, achieving an efficiency of 99% via multimodal classification techniques that incorporate statistical variables including mean, median, mode, skewness, and kurtosis.…”
Get full text
Article -
1736
A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning
Published 2017-01-01“…The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR), accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD) to construct our detection system. …”
Get full text
Article -
1737
Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach
Published 2025-01-01“…The proposed approach is observed to outperform contemporary neural network models in detecting irregular driving patterns of ACC vehicles.…”
Get full text
Article -
1738
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
1739
Tree-Based Algorithms and Incremental Feature Optimization for Fault Detection and Diagnosis in Photovoltaic Systems
Published 2025-01-01Subjects: “…fault detection…”
Get full text
Article -
1740