Showing 1,041 - 1,060 results of 16,989 for search 'Defekt~', query time: 4.44s Refine Results
  1. 1041

    Biomarker panel for early detection of uterine cancer by Nemali Deepthi Deepthi Priya, NANDA KUMAR K V, DEVARAJAPPAGARI BINDU, KASIREDDY LIKHITHA, MEKALA SIVA CHARANI

    Published 2024-10-01
    “…We analyze the current state of biomarker utilization for early detection, including their sensitivity and specificity, paving the way for timely interventions. …”
    Get full text
    Article
  2. 1042
  3. 1043
  4. 1044
  5. 1045

    Object Detection by Neural Network for Smart Home by Ibrahim Mekawy

    Published 2022-12-01
    Subjects: “…object detection model…”
    Get full text
    Article
  6. 1046

    An Analysis of the Cluster-Detecting Property of the BCM Neuron by Lawrence Udeigwe

    Published 2024-01-01
    “…We show that an artificial BCM neuron has the ability to detect clusters in a dataset. By exploring the qualitative behaviors of an underlying system of differential equations, we present a rigorous mathematical analysis of this cluster-detecting property. …”
    Get full text
    Article
  7. 1047
  8. 1048

    Multisegment Mapping Network for Massive MIMO Detection by Yongzhi Yu, Jianming Wang, Limin Guo

    Published 2021-01-01
    “…Because of the large number of massive MIMO antennas, the computational complexity of detection has increased significantly, which poses a significant challenge to traditional detection algorithms. …”
    Get full text
    Article
  9. 1049

    Vibrio parahaemolyticus: spread, detection and identification techniques by G. S. Skitovich, N. B. Shadrova, O. V. Pruntova

    Published 2018-04-01
    “…The paper presents V. parahaemolyticus biological properties, pathogenesis peculiarities, their spread and detection techniques.…”
    Get full text
    Article
  10. 1050

    DNS abnormal behavior detection based on IPFIX by Yun-long MA, Cai-ping JIANG, Qian-li ZHANG, Ji-long WANG

    Published 2014-10-01
    “…An algorithm based on IPFIX network flow data is proposed.By using proposed algorithm,suspicious and abnormal DNS will be detected accurately,and DNS traffic amplification attack will be distinguished rapidly.This algorithm has been applied in the Tsinghua University campus network.In our practice,DNS abnormal behaviors have been detected and alarm information has been sent to administrators.Thus,abnormal attack behaviors are restrained in time,and the monitoring and warning for abnormal traffic are all realized.…”
    Get full text
    Article
  11. 1051
  12. 1052

    Detecting and Predicting Models for QoS Optimization in SDN by Getahun Wassie, Jianguo Ding, Yihenew Wondie

    Published 2024-01-01
    “…Hence, elephant flow detection and early prediction techniques optimize QoS. …”
    Get full text
    Article
  13. 1053

    Remote-sensing detectability of airborne Arctic dust by N. T. O'Neill, K. Ranjbar, L. Ivănescu, Y. Blanchard, S. A. Sayedain, Y. AboEl-Fetouh

    Published 2025-01-01
    “…A variety of illustrations are given with a particular emphasis on questionable claims of using brightness temperature differences (BTDs) as a signature indicator of Arctic dust transported from mid-latitude deserts or generated by local Arctic sources. While there is little dispute about the presence of both Asian and local dust across the Arctic, the direct RS detectability of airborne dust, as ascribed to satellite (MODIS and AVHRR) measurements of significantly negative brightness temperature differences at 11 and 12 <span class="inline-formula">µ</span>m (BTD<span class="inline-formula"><sub>11–12</sub>)</span>, has been misrepresented in certain cases. …”
    Get full text
    Article
  14. 1054
  15. 1055
  16. 1056
  17. 1057

    Research on DoS detection and reaction of SIP application by ZENG Shui-fei1, HE Guang-yu2, WEN Ying-you2, WANG Ren-bo1

    Published 2010-01-01
    “…To resolve the SIP DoS hidden trouble in the ALL-IP fusion network,a novel detection and reaction method was proposed.First,the characteristic of SIP DoS behavior was analyzed deeply to enhance the pertinency of detection.Afterwards,the method used the improved SIP transaction-finite automation(IST-FA) to detect the DoS attacks.Finally,the method took the reaction based on the puzzle challenge mechanism.Simulation and analysis show that the efficiency and performance of the method can satisfy the requirement of SIP DoS prevention.…”
    Get full text
    Article
  18. 1058
  19. 1059
  20. 1060

    Detection of infectious laryngotracheitis virus in a peacock by A. A. Kozlov, N. S. Mudrak, I. A. Chvala

    Published 2018-04-01
    “…The paper presents data on laboratory tests for infectious laryngotracheitis virus detection in peacock biomaterial and its identification. …”
    Get full text
    Article