Showing 4,001 - 4,020 results of 16,989 for search 'Defekt~', query time: 3.74s Refine Results
  1. 4001
  2. 4002

    Loop quantum effects on direct detection prediction in two-scalar dark matter scenario by Karim Ghorbani, Parsa Ghorbani

    Published 2025-01-01
    “…Therefore, loop effects move the regions which were below the neutrino floor at tree level, up to the regions which are detectable by future DD experiments.…”
    Get full text
    Article
  3. 4003
  4. 4004
  5. 4005
  6. 4006

    AI-optimized electrochemical aptasensors for stable, reproducible detection of neurodegenerative diseases, cancer, and coronavirus by Amira Elsir Tayfour Ahmed, Th.S. Dhahi, Tahani A. Attia, Fawzia Awad Elhassan Ali, Mohamed Elshaikh Elobaid, Tijjani Adam, Subash C.B. Gopinath

    Published 2025-01-01
    “…Leveraging data-driven AI techniques, these sensors provide a non-invasive, cost-effective alternative to traditional methods, with applications in detecting molecular biomarkers for neurodegenerative diseases, cancer, and coronavirus. …”
    Get full text
    Article
  7. 4007
  8. 4008
  9. 4009
  10. 4010

    Metagenomic dna isolation from sheep feces and pcr detection of several rumen bacteria by Arif Yavuz, Dilek Özgün Ekiz, İlhami Kenger, Uğur Çömlekcioğlu

    “…<b>Aim:</b> The aim of this study was to isolate metagenomic DNA from fresh and dry sheep feces and to detect several rumen bacteria using the specific primers.…”
    Get full text
    Article
  11. 4011

    A New Early Rumor Detection Model Based on BiGRU Neural Network by Xiangning Chen, Caiyun Wang, Dong Li, Xuemei Sun

    Published 2021-01-01
    “…In this paper, a new early rumor detection model is proposed. The aim of this model is to increase the efficiency and the accuracy of rumor detection simultaneously. …”
    Get full text
    Article
  12. 4012
  13. 4013

    Detection and Quantization of Bearing Fault in Direct Drive Wind Turbine via Comparative Analysis by Wei Teng, Rui Jiang, Xian Ding, Yibing Liu, Zhiyong Ma

    Published 2016-01-01
    “…This paper presents the application of multiscale enveloping spectrogram (MuSEnS) and cepstrum to detect and quantize bearing fault in DDWT. MuSEnS can manifest fault modulation information adaptively based on the capacity of complex wavelet transform, which enables the weak bearing fault in DDWT to be detected. …”
    Get full text
    Article
  14. 4014

    Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding by Jen-Yeu Chen, Yi-Ying Tseng

    Published 2012-12-01
    “…In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
    Get full text
    Article
  15. 4015
  16. 4016

    Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection by S Mekid, D Wu, R Hussain, K Youcef-Toumi

    Published 2017-11-01
    “…A systematic real-time methodology is adopted for leak detection in underground buried pipes. The wireless communication system is used to analyze the system performance based on the received power by monopole antenna deployed at the receiving side. …”
    Get full text
    Article
  17. 4017

    Pre-transfusion detection and transfusion therapy of a patient with autoanti-B and cold agglutinin by YANG Linyu, CHEN LI, LI Zhongjun

    Published 2025-01-01
    “…ABO blood group antigen was detected by tube method and microcolumn gel method. …”
    Get full text
    Article
  18. 4018
  19. 4019

    Sucker rod straightness measurement method based on probability statistics of edge point detection by Li Zhu, Yihua Kang

    Published 2025-01-01
    “…., have extremely low measurement efficiency and cannot achieve online real-time high-precision detection. Our research group has proposed a machine vision online detection based on 10 industrial camera arrays, which can obtain the surface profile straight line of the sucker rod by collecting the edge profile image of the sucker rod and performing morphological transformation. …”
    Get full text
    Article
  20. 4020

    Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments by Doaa Mohsin Abd Ali Afraji, Jaime Lloret, Lourdes Peñalver

    Published 2025-12-01
    “…It also reveals that present detection performance is constrained and frequently obstructed by the poor quality of the datasets. …”
    Get full text
    Article