Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
4341
THERMAL IMAGES PRE-PROCESSING FOR EARLY DETECTION OF BREAST CANCER: A PROGRESSIVE REVIEW
Published 2024-03-01Get full text
Article -
4342
Južnoafričko oklopno vozilo - topovnjača na točkovima 'ROOIKAT', International defense review, 1989
Published 1990-07-01Get full text
Article -
4343
Sensitivity-enhancing feedback control–based damage detection in delaminated smart composite plates
Published 2019-07-01“…In this article, we present a sensitivity-enhancing feedback control–based damage detection method for piezoelectric actuator and sensor bonded composite laminates with delamination failures. …”
Get full text
Article -
4344
Prediction method of 0day attack path based on cyber defense knowledge graph
Published 2022-02-01“…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
Get full text
Article -
4345
Daytime Equatorial Spread F‐Like Irregularities Detected by HF Doppler Receiver and Digisonde
Published 2021-04-01“…This study presents two rare daytime ESF‐like events which occurred over an interval ∼2 h and were detected by the HF Doppler receiver located in Lagos (LAG: geographic: 3.27°E, 6.48°N; dip latitude −1.72°) and the Lowell Digisonde at Ilorin (ILR; 4.68°E, 8.50°N; dip latitude −1.25°), managed by Lowell GIRO Data Center (LGDC). …”
Get full text
Article -
4346
Voice pathology detection using machine learning algorithms based on different voice databases
Published 2025-03-01Subjects: Get full text
Article -
4347
Research on Fast Pedestrian Detection Algorithm Based on Autoencoding Neural Network and AdaBoost
Published 2021-01-01“…In order to solve the problem of low accuracy of pedestrian detection of real traffic cameras and high missed detection rate of small target pedestrians, this paper combines autoencoding neural network and AdaBoost to construct a fast pedestrian detection algorithm. …”
Get full text
Article -
4348
Detection of Water Contamination Events Using Fluorescence Spectroscopy and Alternating Trilinear Decomposition Algorithm
Published 2017-01-01“…The method based on conventional index and UV-vision has been widely applied in the field of water quality abnormality detection. This paper presents a qualitative analysis approach to detect the water contamination events with unknown pollutants. …”
Get full text
Article -
4349
Latex agglutination test for rapid detection of antibodies to infectious hematopoietic necrosis virus of salmon
Published 2018-04-01“…Latex-agglutination preparations were produced for detection of antibodies to infectious hematopoietic necrosis virus of salmon with analytical sensitivity of 0,9 цд/ті. …”
Get full text
Article -
4350
Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis
Published 2013-01-01“…Consequently, neither intrusion detection systems (IDS) nor victim server can detect malicious packets. …”
Get full text
Article -
4351
Fault Detection of High-Speed Train Wheelset Bearing Based on Impulse-Envelope Manifold
Published 2017-01-01“…A novel fault detection method employing the impulse-envelope manifold is proposed in this paper which is based on the combination of convolution sparse representation (CSR) and Hilbert transform manifold learning. …”
Get full text
Article -
4352
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01Subjects: Get full text
Article -
4353
The critical role of primary care clinicians in the early detection of ocular surface squamous neoplasia
Published 2025-02-01Get full text
Article -
4354
Detection of Alzheimer Disease in Neuroimages Using Vision Transformers: Systematic Review and Meta-Analysis
Published 2025-02-01“…Vision transformers (ViTs) are emerging as promising deep learning models in medical imaging, with potential applications in the detection and diagnosis of AD. ObjectiveThis review systematically examines recent studies on the application of ViTs in detecting AD, evaluating the diagnostic accuracy and impact of network architecture on model performance. …”
Get full text
Article -
4355
Indonesian Sign Language Image Detection Using Convolutional Neural Network (CNN) Method
Published 2023-05-01Get full text
Article -
4356
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01“…Therefore, this paper proposes a hybrid model built on the base of Convolutional Neural Networks (CNN), Gated Recurrent Units (GRU) and an attention mechanism to detect vulnerabilities in application code. Particularly, the model can help detect attacks based on Structured Query Language Injection (SQLi), Cross-Site Scripting (XSS), and command injection. …”
Get full text
Article -
4357
A social enterprise model for TB detection and treatment through the private sector in Pakistan
Published 2024-02-01“…OBJECTIVE: To evaluate the impact of a social enterprise model (SEM) intervention on TB case detection in Karachi, Pakistan, and to assess its financial sustainability. …”
Get full text
Article -
4358
Electrochemical Sensor Based on Co-MOF for the Detection of Dihydromyricetin in <i>Ampelopsis grossedentata</i>
Published 2025-01-01“…The results showed that, in comparison to the bare GCE, the electro-oxidation peak current of DMY was considerably increased by the Co-MOF/GCE. The detection limit was 0.07 μM, and the peak current demonstrated two linear relationships in the ranges of 0.2−20 μM and 20−100 μM, with the linear equations of Ip (μA) = 0.4729c (μM) + 1.0822 (R<sup>2</sup> = 0.9913) and Ip (μA) = 0.0939c (μM) + 8.4178 (R<sup>2</sup> = 0.9971), respectively. …”
Get full text
Article -
4359
A Multi-Index Generative Adversarial Network for Tool Wear Detection with Imbalanced Data
Published 2020-01-01“…In this paper, a novel multi-index generative adversarial network (MI-GAN) is proposed to detect the tool wear conditions subject to imbalanced signal data. …”
Get full text
Article -
4360
A FSTCN-Based Leak Detection Method for Large-Scale Pipeline Transportation Systems
Published 2025-01-01Subjects: Get full text
Article