Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
1861
Implementing E-MOTIVE for detection and treatment of postpartum haemorrhage in South Africa
Published 2023-12-01“…The E-MOTIVE approach comprises objective blood loss measurement monitored every 15 minutes during the first hour after delivery to detect PPH early and trigger a bundle of first-line treatments, including massaging the uterus, oxytocin infusion, tranexamic acid infusion, intravenous crystalloid fluids, examination for the cause, emptying the bladder and, if necessary, escalation of care. …”
Get full text
Article -
1862
Possible Eggsac Defense Behaviors in the Spider Uloborus Glomosus (Araneae: Uloboridae)
Published 1989-01-01Get full text
Article -
1863
Cytokine Detection and Modulation in Acute Graft vs. Host Disease in Mice
Published 1994-01-01“…The expression of mRNA for cytokines as detected by reverse transcription PCR was studied in spleen cells. …”
Get full text
Article -
1864
Saliva: An Overlooked yet Critical Diagnostic Tool in Detection of Nipah Virus
Published 2024-04-01Get full text
Article -
1865
Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand
Published 2025-01-01Subjects: Get full text
Article -
1866
Development of DOAS System for Hazardous Methane Detection in the Near-Infrared Region
Published 2025-01-01Subjects: “…Methane detection…”
Get full text
Article -
1867
Subjective Logic-Based Anomaly Detection Framework in Wireless Sensor Networks
Published 2012-01-01“…In existing anomaly detection approaches, sensor node often turns to neighbors to further determine whether the data is normal while the node itself cannot decide. …”
Get full text
Article -
1868
DeepRetention: A Deep Learning Approach for Intron Retention Detection
Published 2023-06-01“…We hypothesize that incorporating the distribution pattern of intronic reads will improve the accuracy of IR detection. Here we present DeepRetention, a novel approach for IR detection by modeling the pattern of sequencing depth of introns. …”
Get full text
Article -
1869
Detecting Community Structures in Networks by Label Propagation with Prediction of Percolation Transition
Published 2014-01-01“…Though label propagation algorithm (LPA) is one of the fastest algorithms for community detection in complex networks, the problem of trivial solutions frequently occurring in the algorithm affects its performance. …”
Get full text
Article -
1870
Exact Receptance Function of Cracked Beams and Its Application for Crack Detection
Published 2019-01-01“…This might be useful for the detection of cracks. In this paper, the derivation of exact receptance of the beam with general boundary conditions is presented, and the numerical simulations are provided.…”
Get full text
Article -
1871
Linear SVM-Based Android Malware Detection for Reliable IoT Services
Published 2014-01-01“…In this paper, we apply a linear support vector machine (SVM) to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. …”
Get full text
Article -
1872
Luminescence and a new approach for detecting heat treatment of geuda sapphire
Published 2025-01-01“…The present study offers new aspects that support the detection of heat treatment of sapphire. Natural geuda sapphire exhibits orange to red luminescence under longwave ultraviolet (LWUV; 365 nm) light, while heated geuda sapphire shows blue luminescence under shortwave ultraviolet (SWUV; 225 nm) light. …”
Get full text
Article -
1873
A novel feature selection technique: Detection and classification of Android malware
Published 2025-03-01“…In light of this, the objective of this research is to uncover a few features that can significantly enhance the detection of Android malware through utilization of feature engineering. …”
Get full text
Article -
1874
The Assessment of Cholinesterase from the Liver of Puntius Javanicus as Detection of Metal Ions
Published 2014-01-01“…The results showed that P. javanicus ChE has the potential to be used as a biosensor for the detection of metal ions.…”
Get full text
Article -
1875
An intelligent spam detection framework using fusion of spammer behavior and linguistic.
Published 2025-01-01“…The diverse types of fake text generation practices by spammer make spam detection challenging. Existing works use manually designed discrete textual or behavior features, which cannot capture complex global semantics of text and reviews. …”
Get full text
Article -
1876
Cells Grouping Detection and Confusing Labels Correction on Cervical Pathology Images
Published 2024-12-01Subjects: Get full text
Article -
1877
Damage Detection on Sudden Stiffness Reduction Based on Discrete Wavelet Transform
Published 2014-01-01“…To this end, the damage detection on sudden stiffness reduction of building structures has been actively investigated in this study. …”
Get full text
Article -
1878
Adenoma Detection Rates Decline with Increasing Procedural Hours in an Endoscopist’s Workload
Published 2015-01-01“…BACKGROUND: Operator fatigue may negatively influence adenoma detection (AD) during screening colonoscopy.…”
Get full text
Article -
1879
On Fault Detection in Linear Discrete-Time, Periodic, and Sampled-Data Systems
Published 2008-01-01“…This paper gives a review of some standard fault-detection (FD) problem formulations in discrete linear time-invariant systems and the available solutions. …”
Get full text
Article -
1880
Cognitive Phenotypes, Brain Morphometry and the Detection of Cognitive Decline in Preclinical AD
Published 2009-01-01Get full text
Article