Showing 3,701 - 3,720 results of 16,989 for search 'Defekt~', query time: 3.48s Refine Results
  1. 3701

    Is computerised tomography better than fibreoptic gastroscopy for early detection of gastric varices? by Burak Suvak, Murat Kekilli, Yavuz Beyazit, Sarper Okten, Alpaslan Tanoglu, Nurgul Sasmaz

    Published 2016-10-01
    “…This study demonstrated that CT is a sensitive method for early detection of GVs and has been used previously in the evaluation of GVs.…”
    Get full text
    Article
  2. 3702

    Semantic Detection of Vehicle Violation Video Based on Computer 3D Vision by Yue Dai

    Published 2022-01-01
    “…In order to study the semantic detection accuracy of 3D vehicle accident video, an accident detection method combining 2D image and 3D information was proposed. …”
    Get full text
    Article
  3. 3703

    Research on detection methods of related substances and degradation products of the antitumor drug selpercatinib by Jingjing Xiang, Liangliang Cai, Qin Wang, Yonghong Zhu, Yong Han

    Published 2025-01-01
    “…However, research on detecting these impurities is limited.MethodsThis study developed and systematically validated a High-Performance Liquid Chromatography (HPLC) method for identifying selpercatinib and its related impurities. …”
    Get full text
    Article
  4. 3704
  5. 3705

    Equatorial Plasma Bubble Detection Using Vertical TEC From Altimetry Satellite by Long Tang, Gefa Chen

    Published 2022-08-01
    “…Abstract In this study, we detect the equatorial plasma bubble (EPB) using vertical total electron content (vTEC) from altimetry satellite for the first time. …”
    Get full text
    Article
  6. 3706
  7. 3707
  8. 3708
  9. 3709

    Leveraging AI to automate detection and quantification of extrachromosomal DNA to decode drug responses by Kohen Goble, Aarav Mehta, Damien Guilbaud, Jacob Fessler, Jingting Chen, William Nenad, William Nenad, Christina G. Ford, Oliver Cope, Darby Cheng, William Dennis, Nithya Gurumurthy, Yue Wang, Kriti Shukla, Elizabeth Brunk, Elizabeth Brunk, Elizabeth Brunk, Elizabeth Brunk, Elizabeth Brunk

    Published 2025-02-01
    “…Extrachromosomal DNA (ecDNA), in contrast, represents a rapid, reversible, and predictable DNA alteration critical for cancer’s adaptive response.MethodsIn this study, we developed a novel post-processing pipeline for automated detection and quantification of ecDNA in metaphase Fluorescence in situ Hybridization (FISH) images, leveraging the Microscopy Image Analyzer (MIA) tool. …”
    Get full text
    Article
  10. 3710
  11. 3711
  12. 3712

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…One of the safety measures for networks is using the intrusion detection systems. However, these measures are costly, ineffective, unreliable and can-not detect new or unknown attacks. …”
    Get full text
    Article
  13. 3713
  14. 3714

    Fault Detection and Classification in Two -Interconnected AC Microgrid at by Modal and Superimposed Analysis by Saber Armaghani, Zahra Moravej

    Published 2024-12-01
    Subjects: “…internal/external fault detection and classification…”
    Get full text
    Article
  15. 3715
  16. 3716
  17. 3717
  18. 3718
  19. 3719

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  20. 3720