Showing 4,341 - 4,360 results of 16,989 for search 'Defekt~', query time: 4.71s Refine Results
  1. 4341
  2. 4342
  3. 4343

    Sensitivity-enhancing feedback control–based damage detection in delaminated smart composite plates by Yan Guo, Yanan Jiang, Zhenghua Qian, Bin Huang

    Published 2019-07-01
    “…In this article, we present a sensitivity-enhancing feedback control–based damage detection method for piezoelectric actuator and sensor bonded composite laminates with delamination failures. …”
    Get full text
    Article
  4. 4344

    Prediction method of 0day attack path based on cyber defense knowledge graph by Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG

    Published 2022-02-01
    “…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
    Get full text
    Article
  5. 4345

    Daytime Equatorial Spread F‐Like Irregularities Detected by HF Doppler Receiver and Digisonde by B. Olugbon, E. O. Oyeyemi, A. Kascheyev, A. B. Rabiu, A. A. Obafaye, O. O. Odeyemi, A. O. Adewale

    Published 2021-04-01
    “…This study presents two rare daytime ESF‐like events which occurred over an interval ∼2 h and were detected by the HF Doppler receiver located in Lagos (LAG: geographic: 3.27°E, 6.48°N; dip latitude −1.72°) and the Lowell Digisonde at Ilorin (ILR; 4.68°E, 8.50°N; dip latitude −1.25°), managed by Lowell GIRO Data Center (LGDC). …”
    Get full text
    Article
  6. 4346
  7. 4347

    Research on Fast Pedestrian Detection Algorithm Based on Autoencoding Neural Network and AdaBoost by Hongzhi Zhou, Gan Yu

    Published 2021-01-01
    “…In order to solve the problem of low accuracy of pedestrian detection of real traffic cameras and high missed detection rate of small target pedestrians, this paper combines autoencoding neural network and AdaBoost to construct a fast pedestrian detection algorithm. …”
    Get full text
    Article
  8. 4348

    Detection of Water Contamination Events Using Fluorescence Spectroscopy and Alternating Trilinear Decomposition Algorithm by Jie Yu, Xiaoyan Zhang, Dibo Hou, Fang Chen, Tingting Mao, Pingjie Huang, Guangxin Zhang

    Published 2017-01-01
    “…The method based on conventional index and UV-vision has been widely applied in the field of water quality abnormality detection. This paper presents a qualitative analysis approach to detect the water contamination events with unknown pollutants. …”
    Get full text
    Article
  9. 4349

    Latex agglutination test for rapid detection of antibodies to infectious hematopoietic necrosis virus of salmon by M. L. Doronin, V. A. Pylnov, S. S. Rybakov

    Published 2018-04-01
    “…Latex-agglutination preparations were produced for detection of antibodies to infectious hematopoietic necrosis virus of salmon with analytical sensitivity of 0,9 цд/ті. …”
    Get full text
    Article
  10. 4350

    Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis by Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li

    Published 2013-01-01
    “…Consequently, neither intrusion detection systems (IDS) nor victim server can detect malicious packets. …”
    Get full text
    Article
  11. 4351

    Fault Detection of High-Speed Train Wheelset Bearing Based on Impulse-Envelope Manifold by Zhe Zhuang, Jianming Ding, Andy C. Tan, Ying Shi, Jianhui Lin

    Published 2017-01-01
    “…A novel fault detection method employing the impulse-envelope manifold is proposed in this paper which is based on the combination of convolution sparse representation (CSR) and Hilbert transform manifold learning. …”
    Get full text
    Article
  12. 4352
  13. 4353
  14. 4354

    Detection of Alzheimer Disease in Neuroimages Using Vision Transformers: Systematic Review and Meta-Analysis by Vivens Mubonanyikuzo, Hongjie Yan, Temitope Emmanuel Komolafe, Liang Zhou, Tao Wu, Nizhuan Wang

    Published 2025-02-01
    “…Vision transformers (ViTs) are emerging as promising deep learning models in medical imaging, with potential applications in the detection and diagnosis of AD. ObjectiveThis review systematically examines recent studies on the application of ViTs in detecting AD, evaluating the diagnostic accuracy and impact of network architecture on model performance. …”
    Get full text
    Article
  15. 4355
  16. 4356

    WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM by Sarbast H. Ali, Arman I. Mohammed, Sarwar MA. Mustafa, Sardar Omar Salih

    Published 2025-01-01
    “…Therefore, this paper proposes a hybrid model built on the base of Convolutional Neural Networks (CNN), Gated Recurrent Units (GRU) and an attention mechanism to detect vulnerabilities in application code. Particularly, the model can help detect attacks based on Structured Query Language Injection (SQLi), Cross-Site Scripting (XSS), and command injection. …”
    Get full text
    Article
  17. 4357

    A social enterprise model for TB detection and treatment through the private sector in Pakistan by S. M. A. Zaidi, W. Z. Jamal, U. Ibrahim, S. Khowaja, A. J. Khan, J. Creswell

    Published 2024-02-01
    “…OBJECTIVE: To evaluate the impact of a social enterprise model (SEM) intervention on TB case detection in Karachi, Pakistan, and to assess its financial sustainability. …”
    Get full text
    Article
  18. 4358

    Electrochemical Sensor Based on Co-MOF for the Detection of Dihydromyricetin in <i>Ampelopsis grossedentata</i> by Xiaojing Si, Yue Huang, Mei Han, Liqiang Luo

    Published 2025-01-01
    “…The results showed that, in comparison to the bare GCE, the electro-oxidation peak current of DMY was considerably increased by the Co-MOF/GCE. The detection limit was 0.07 μM, and the peak current demonstrated two linear relationships in the ranges of 0.2−20 μM and 20−100 μM, with the linear equations of Ip (μA) = 0.4729c (μM) + 1.0822 (R<sup>2</sup> = 0.9913) and Ip (μA) = 0.0939c (μM) + 8.4178 (R<sup>2</sup> = 0.9971), respectively. …”
    Get full text
    Article
  19. 4359

    A Multi-Index Generative Adversarial Network for Tool Wear Detection with Imbalanced Data by Guokai Zhang, Haoping Xiao, Jingwen Jiang, Qinyuan Liu, Yimo Liu, Liying Wang

    Published 2020-01-01
    “…In this paper, a novel multi-index generative adversarial network (MI-GAN) is proposed to detect the tool wear conditions subject to imbalanced signal data. …”
    Get full text
    Article
  20. 4360