Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
3961
Detection and Elimination of a Potential Fire in Engine and Battery Compartments of Hybrid Electric Vehicles
Published 2012-01-01“…The research described in this paper applies FDNCT to build an architecture for an intelligent system to detect and to eliminate potential fires in the engine and battery compartments of a hybrid electric vehicle. …”
Get full text
Article -
3962
Development of Diagnostic Biomarkers for Detecting Diabetic Retinopathy at Early Stages Using Quantitative Proteomics
Published 2016-01-01“…Although further validation with a larger sample size is needed, the 4-protein marker panel (APO4, C7, CLU, and ITIH2) could represent a useful multibiomarker model for detecting the early stages of DR.…”
Get full text
Article -
3963
Detection of other pathologies when utilising computer-assisted digital solutions for TB screening
Published 2024-12-01“…BACKGROUND: Computer-aided detection (CAD) tools for TB detection have the potential to enable screening programmes and reduce the diagnostic gap in settings where access to radiologists is limited. …”
Get full text
Article -
3964
Prenatal Detection of Silver–Russell Syndrome: A First Trimester Suspicion and Diagnostic Approach
Published 2025-01-01Get full text
Article -
3965
-
3966
Detection of Cryptosporidium spp. and Giardia spp. from Water Samples in Mosul City, Iraq
Published 2024-10-01“…Results: The results showed that 43.3% of the samples examined were infected with protozoan parasites, and the detected parasites were found in different ratios across the various regions. …”
Get full text
Article -
3967
The Application of PSO in Structural Damage Detection: An Analysis of the Previously Released Publications (2005–2020)
Published 2022-09-01Subjects: Get full text
Article -
3968
MGScoliosis: Multi-grained scoliosis detection with joint ordinal regression from natural image
Published 2025-01-01Subjects: Get full text
Article -
3969
Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks
Published 2018-01-01“…With respect to this, meteorological variables, polluting gases and the oxygen level are measured in real time to estimate the existence of forest fire risks in the short-term and to detect the recent occurrence of fire outbreaks over different forest areas. …”
Get full text
Article -
3970
Association of Intensive Endoscopic Burden with Esophageal Cancer Detection: A Nationwide Cohort Study
Published 2025-01-01Subjects: “…esophageal neoplasms; upper endoscopy; detection rate; endoscopic burden…”
Get full text
Article -
3971
A Quantitative Method for Detecting Ara h 2 by Generation and Utilization of Monoclonal Antibodies
Published 2018-01-01“…The aim of this study was to develop a quantitative method for detecting peanut allergen using monoclonal antibodies against Ara h 2. …”
Get full text
Article -
3972
The Detection Rate of Associated Mg ii Absorption Lines in Quasars Depends on Their Radio Emission
Published 2025-01-01Get full text
Article -
3973
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Published 2015-01-01“…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
Get full text
Article -
3974
Adaptive modification of antiviral defense systems in microbial community under Cr-induced stress
Published 2025-01-01Subjects: “…Antiviral defense system…”
Get full text
Article -
3975
Gå direkte till fängelset utan att passera "gå". Välfärdsproblem bland fångar.
Published 2000-12-01Get full text
Article -
3976
Turbo detection-decoding method for bit-interleavered random layered space-time codes
Published 2006-01-01Subjects: Get full text
Article -
3977
Robust skin-integrated conductive biogel for high-fidelity detection under mechanical stress
Published 2025-01-01Get full text
Article -
3978
Detecting Genetic Associations between ATG5 and Lupus Nephritis by trans-eQTL
Published 2015-01-01Get full text
Article -
3979
Simultaneous Electrochemical Detection of Pb and Cd by Carbon Paste Electrodes Modified by Activated Clay
Published 2022-01-01“…The detection was effective by square wave voltammetry with a more intense current density with respect to lead.…”
Get full text
Article -
3980
STGLR: A Spacecraft Anomaly Detection Method Based on Spatio-Temporal Graph Learning
Published 2025-01-01Subjects: “…anomaly detection…”
Get full text
Article