Showing 1,541 - 1,560 results of 9,156 for search 'issues samples', query time: 0.10s Refine Results
  1. 1541
  2. 1542

    Bridging abstraction and action: Phenomenology and public health research and practice by Qin Xiang Ng

    Published 2025-06-01
    “…The studies addressed a range of public health issues, including barriers to postpartum diabetes screening, experiences of midwives during the pandemic, and strategies for chlamydia screening. …”
    Get full text
    Article
  3. 1543

    Harnessing self-supervised learning to boost malicious traffic detection with enhanced attention by SUN Jianwen, ZHANG Bin, LI Hongyu, CHANG Heyu

    Published 2025-04-01
    “…To address these issues, an end-to-end malicious traffic detection method named MTAttention was proposed. …”
    Get full text
    Article
  4. 1544

    The Accuracy of Diagnostic Tests for Lyme Disease in Humans, A Systematic Review and Meta-Analysis of North American Research. by Lisa A Waddell, Judy Greig, Mariola Mascarenhas, Shannon Harding, Robbin Lindsay, Nicholas Ogden

    Published 2016-01-01
    “…Direct detection methods, culture and PCR of tissue or blood samples were not as sensitive or timely compared to serological testing. …”
    Get full text
    Article
  5. 1545

    Recognizing and Describing the Factors Affecting the Design of the Innovation Ecosystem Model in the Field of Health with an Emphasis on the Role of E-Government by Zahra Mirjalili, Abbas Babaeinejad, Saeed Sayadi, Hamid Reza Mollaei

    Published 2024-01-01
    “…Background: Development of innovation issues in countries has led to the formation of new concepts in this field. …”
    Get full text
    Article
  6. 1546
  7. 1547

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  8. 1548

    Particulate-Bound Polycyclic Aromatic Hydrocarbons and Heavy Metals in Indoor Air Collected from Religious Places for Human Health Risk Assessment by Thitisuda Kanchana-at, Win Trivitayanurak, Sopannha Chy, Narisa Kengtrong Bordeerat

    Published 2025-06-01
    “…Particulate matter (PM) has been associated with various health issues. However, the most hazardous constituents of fine particles remain unclear, particularly in Asia where the chemical compositions are highly diverse and understudied. …”
    Get full text
    Article
  9. 1549

    ANALYSIS OF THE RESULTS OF INVESTIGATIONS AIMED AT REDUCING THE ROCK STRENGTH IN SERIAL EXPLOSIONS OF BOREHOLE EXPLOSIVE CHARGES by K. S. Malskiy, Yu. A. Borovkov

    Published 2020-07-01
    “…This article discusses issues involved with changes in the strength properties of rock mass during serial explosions of borehole explosive charges while performing mining operations in quarries. …”
    Get full text
    Article
  10. 1550

    Challenges of Disaster Assessment of Readiness and Training Guideline (DART) in Iran’s Primary Health Care by Hamzeh Zarei, Mohammad H. Yarmohammadian, Nikoo Yamani, Golrokh Atighechian, Fatemeh Rezaei

    Published 2025-03-01
    “…Results: In this study, four main categories were found in the educational criticism of the DART guideline: simplicity in design and development, lack of layout in pages and lack of user-friendly features (descriptions), sharp visual and content criticism for the minimum essential context of a guideline (interpretation), Little conformity of visual criteria and relative conformity of content criteria with global samples (evaluation).Finally, Thematic phase indicated that current guidelines do not meet the expectations of health care providers (HCPs), effective educational promotion of guidelines is needed, and adaptation to lifestyle and cultural customs and actual educational needs were also issues that could be considered. …”
    Get full text
    Article
  11. 1551
  12. 1552

    Impact of FortiPhi-S bacteriophage solution on the environmental microbiome in poultry litter systems from commercial operations by Irma Maria Janania Gamez, Mindy M. Brashears, Kendra Nightingale, Tyler P. Stephens, Carlos E. Martinez-Soto, Edith Chow

    Published 2025-08-01
    “…Nonetheless, this increase also gives way for an uprise in different types of issues such as food safety, human and animal health. …”
    Get full text
    Article
  13. 1553

    THERMOPHYSICAL BASES OF PRODUCTION OF EFFECTIVE EQUIPMENT FOR GENERAL CRYOTHERAPEUTIC EXPOSURE by A. Yu. Baranov, A. V. Vasilenok, E. V. Sokolova, O. A. Shestakova

    Published 2019-05-01
    “…Uncertainty in the fundamental issues of the production and operation of cryotherapy equipment has caused a gradual degradation of the WBC method in countries that have long determined the development of this section of cryomedical technology.Method. …”
    Get full text
    Article
  14. 1554

    InvMOE: MOEs Based Invariant Representation Learning for Fault Detection in Converter Stations by Hao Sun, Shaosen Li, Hao Li, Jianxiang Huang, Zhuqiao Qiao, Jialei Wang, Xincui Tian

    Published 2025-04-01
    “…Experimental results on real-world datasets demonstrate that InvMOE achieves superior generalization performance and significantly improves detection accuracy for tasks with limited samples, such as valve cooling water leakage. This work provides a robust and scalable approach for enhancing fault detection in converter stations.…”
    Get full text
    Article
  15. 1555

    Improved Algorithm for Vehicle Bottom Safety Detection Based on YOLOv8n: PSP-YOLO by Di Zhao, Yulin Cheng, Sizhe Mao

    Published 2024-12-01
    “…The safety inspection system for the underside of vehicles demands both high detection speed and accuracy, necessitating a model with small parameters and high network efficiency. To address these issues and improve the real-time performance of under-vehicle safety inspection, the YOLOv8n object-detection algorithm was enhanced, resulting in the PSP-YOLO algorithm. …”
    Get full text
    Article
  16. 1556

    Self-Supervised Feature Disentanglement for Deepfake Detection by Bo Yan, Pan Liu, Yumin Yang, Yanming Guo

    Published 2025-06-01
    “…The core method comprises three key components: self-supervised sample construction and training samples for feature disentanglement, which are generated via an image self-mixing mechanism; feature disentanglement network, where the input image is decomposed into two parts—content features irrelevant to forgery and discriminative forgery-related features; and conditional decoder verification, where both types of features are used to reconstruct the image, with forgery-related features serving as conditional vectors to guide the reconstruction process. …”
    Get full text
    Article
  17. 1557

    Evaluation of Child Health Promotion Researches in Roi Kaen Sarasin Area 7 for Being Smart, Good and Happy Children by Juthamas Wannasin, Anchalee Aeamsee, Yuwana Khaipan, Saichol Thornmart

    Published 2024-12-01
    “…Evaluation Phase: Evaluating the product through interviews with purposefully selected samples. Data was collected using validated questionnaires. …”
    Get full text
    Article
  18. 1558

    A Multi-Source Domain Adaptation Method for Bearing Fault Diagnosis with Dynamically Similarity Guidance on Incomplete Data by Juan Tian, Shun Zhang, Gang Xie, Hui Shi

    Published 2025-01-01
    “…Finally, matched source and target domain samples are mapped to the same feature space for fault diagnosis. …”
    Get full text
    Article
  19. 1559

    On the trophic role of pelagic fishes and fishery landings shifts in the South Brazil Bight by Julia Petroski Olher, Maria A. Gasalla

    Published 2024-04-01
    “…Here, we investigated the diet and trophic role of 12 pelagic fish species by revisiting samples obtained by the ECOSAR II Program (FURG/IO/IBAMA) between 23°S and 28°40'S, an area also known as South Brazil Bight. …”
    Get full text
    Article
  20. 1560

    Primary Pyogenic Abscess in an Immunocompetent Child: An Indian Perspective by Swapnil Keny, Harsh Parekh, Janki Chaudhary, Nikhil Gokhale, Nihar Modi

    Published 2025-02-01
    “…She underwent open drainage through a retroperitoneal approach, and samples were sent for bacteriological analysis. The wound was irrigated and closed over a drain. …”
    Get full text
    Article