Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
4501
A novel feature extraction method based on dynamic handwriting for Parkinson's disease detection.
Published 2025-01-01“…Given the easy accessibility of handwriting samples, many researchers have proposed handwriting-based detection methods for Parkinson's disease. Extracting more discriminative features from handwriting is an important step. …”
Get full text
Article -
4502
Sub-topic detection and tracking based on dependency connection weights for vector space model
Published 2013-08-01Subjects: “…topic detection and tracking…”
Get full text
Article -
4503
Reduced phase-state detection based on virtual modulation indexes for Multi-h CPM
Published 2019-09-01Subjects: Get full text
Article -
4504
Detecting Latent Topics and Trends in Global Publications on Brucellosis Disease Using Text Mining
Published 2022-01-01Get full text
Article -
4505
Unified Dynamic Dictionary and Projection Optimization With Full-Rank Representation for Hyperspectral Anomaly Detection
Published 2025-01-01Subjects: “…hyperspectral anomaly detection (HAD)…”
Get full text
Article -
4506
A Star‐Nose‐Inspired Bionic Soft Robot for Nonvisual Spatial Detection and Reconstruction
Published 2025-01-01Subjects: Get full text
Article -
4507
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Published 2024-01-01“…Existing deep learning-based detection methods have proven their effectiveness. …”
Get full text
Article -
4508
Defense against Feeding by Spring Aphid Parasitism in the Upper Leaf Parts of Host Plants
Published 2022-01-01Get full text
Article -
4509
Acoustic Signal Aided Detection Method of Spiral Bevel Gears Based on PSO-MCKD
Published 2024-01-01Subjects: Get full text
Article -
4510
-
4511
-
4512
-
4513
Fault Detection in an Electro-Hydrostatic Actuator Using Polyscale Complexity Measures and Bayesian Classification
Published 2024-01-01Subjects: Get full text
Article -
4514
Coproantigen detection and molecular identification of Cryptosporidium species among newborn and adult farm animals
Published 2025-01-01“…Therefore, this study aimed to evaluate an early diagnosis of cryptosporidiosis using the anti-Cryptosporidium parvum oocyst immunoglobulin IgG polyclonal antibodies (anti-C. parvum IgG PAbs)-based sandwich enzyme-linked immunosorbent assay (ELISA) for the detection of Cryptosporidium oocyst antigens in fecal samples of farm animals in Egypt. …”
Get full text
Article -
4515
Grassmannian Constellation Based on Antipodal Points and Orthogonal Design and Its Simplified Detecting Algorithm
Published 2017-01-01“…The antipodal constellation enables an intrinsic simplified ML detecting algorithm. The algebraic orthogonal USTM constellation is also an antipodal constellation which, apart from being adaptive to the antipodal simplified ML detector, also has another simplified ML detector based on its self-indexing features, and the latter is simpler because of getting rid of the matrix operation. …”
Get full text
Article -
4516
Inflammasomes, Autophagy, and Cell Death: The Trinity of Innate Host Defense against Intracellular Bacteria
Published 2019-01-01“…Inflammasome activation is an innate host defense mechanism initiated upon sensing pathogens or danger in the cytosol. …”
Get full text
Article -
4517
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
4518
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01Get full text
Article -
4519
Detecting Positive and Negative Changes From SAR Images by an Evolutionary Multi-Objective Approach
Published 2019-01-01Subjects: Get full text
Article -
4520
Designing of immunodiagnostic assay using polyclonal antibodies for detection of Enteropathogenic Escherichia coli strains.
Published 2024-01-01“…The assay exhibited 100% sensitivity and a 95.83% specificity for the detection of EPEC local isolates. Moreover, the assay also detected a low number of bacteria forming units (104X 104 CFU/ml) in spiked fecal samples. …”
Get full text
Article