-
2901
Two Types of Distributed CFAR Detection Based on Weighting Functions in Fusion Center for Weibull Clutter
Published 2013-01-01“…In the two types of distributed detectors, it was assumed that the clutter parameters at the local sensors are unknown and each local detector performs CFAR processing based on ML and OS CFAR processors before transmitting data to the fusion center. …”
Get full text
Article -
2902
-
2903
DESIGN OF DETECTION DEVICE FOR CU CONTAMINATED WATER USING RED DIODA LASER AND PHOTODIODA SENSOR
Published 2018-01-01“…This research was conducted in five phases: characterization of photodiode sensor, making data acquisition system, processing and analyzing of training sample data, making of the detection system, and implementation of detection system on test samples. …”
Get full text
Article -
2904
Multitemporal Analysis Using Remote Sensing and GIS to Monitor Wetlands Changes and Degradation in the Central Andes of Ecuador (Period 1986–2022)
Published 2025-04-01“…Image analysis and processing was performed, and the resulting maps were evaluated in a GIS environment to determine the land cover change and growth rate of hydrophilic opportunistic vegetation (HOV) according to hillside orientation. …”
Get full text
Article -
2905
-
2906
Modeling damage complexity-dependent non-homologous end-joining repair pathway.
Published 2014-01-01“…Under an appropriate set of parameters obtained by minimization technique, we can simulate the kinetics of foci track formation in fluorescently tagged mammalian cells, Ku80-EGFP and DNA-PKcs-YFP for simple and complex DSB repair, respectively, in good agreement with the published experimental data, supporting the notion that simple DSB undergo fast repair in a Ku-dependent, DNA-PKcs-independent manner, while complex DSB repair requires additional DNA-PKcs for end processing, resulting in its slow repair, additionally resulting in slower release rate of Ku and the joining rate of complex DNA ends. …”
Get full text
Article -
2907
kQUIC: A Kernel-Based Quick UDP Internet Connections (QUIC) Transport for IoT
Published 2025-01-01“…According to our empirical analyses, as the packet loss rate increases from 0% to 2.5%, the data copying overhead between the kernel and userspace increases by 26% with QUIC, whereas TCP experiences no additional overhead. …”
Get full text
Article -
2908
Comparison of Different Controller Architectures for Autonomous Driving and Recommendations for Robust and Safe Implementations
Published 2025-01-01“…Performance analysis of transformer-based models demonstrates exceptional accuracy, with ViT-SAC achieving 100% success rate in low-density traffic scenarios and DRLNDT reaching 99.9% success rate in navigation tasks. …”
Get full text
Article -
2909
THE ROLE OF BIOGENIC MATTER IN INCREASING THE PRODUCTIVITY OF CORN AND SORGO IN THE TERSKO-SULAK SUBPROVINCE CONDITIONS OF IRRIGATION
Published 2017-07-01“…Sampling of the soil and plants was carried out according to standard methods; statistical processing of yield data was carried out by the method of variance analysis using a standard method and computer program, thus based on the data obtained, the economic efficiency of the main spring corn crops for corn and grain sorghum was determined.Results. …”
Get full text
Article -
2910
Epidemiological Aspects of Overweight and Obesity among the Adult Population of the Voronezh Region
Published 2019-03-01“…Ideal weight was calculated by Brock's field formula (1891), the upper limit of normal body weight was considered ideal weight plus 15% ideal weight. Statistical data processing was performed using Microsoft Excel 2007.Results. …”
Get full text
Article -
2911
Anomaly detection in encrypted network traffic using self-supervised learning
Published 2025-07-01“…On CIC-Darknet2020, ISCX VPN (nonVPN), and UNSW-NB15 datasets, ET-SSL achieves 96.8 percent accuracy, 92.7 percent true positive rate (TPR), 1.2 percent false positive rate (FPR), and can do real time anomaly detection with 15 ms to 25 ms latency and speeds up to 10 Gbps processing which makes it suitable for high speed and resource constrained environments. …”
Get full text
Article -
2912
A method to map real-time gamma-ray radiation in urban areas near the soil surface
Published 2025-06-01“…A detailed method was developed considering 1) RadiaCode test in the field, 2) study site selection, 3) transect design to map count and dose rate, 4) RadiaCode map settings preparation, 5) fieldwork and data preparation, 6) data download and processing, and 7) statistical and spatial analysis. …”
Get full text
Article -
2913
Numerical treatment for Darcy–Forchheimer flow of propylene glycol with carbon nanotubes under the impacts of MHD and activation energy
Published 2024-12-01“…This model has significant applications in thermal systems such as in heat exchangers, chemical processing, and medical cooling devices. The data-set of the proposed model has been generated with variation of various parameters such as, curvature parameter, inertia coefficient, Hartmann number, porosity parameter, Eckert number, Prandtl number, radiation parameter, activation energy variable, Schmidt number and reaction rate parameter for different scenarios. …”
Get full text
Article -
2914
A mental state aware brain computer interface for adaptive control of electric powered wheelchair
Published 2025-03-01“…Filtration and pre-processing of the data set are achieved using the frequency-based distribution of EEG signals. …”
Get full text
Article -
2915
Fuzzy-Based Sensor Fusion for Cognitive Load Assessment in Inclusive Manufacturing Strategies
Published 2025-05-01“…A multi-layer fuzzy logic framework was developed, integrating physiological, environmental, and task-related data. Physiological signals, including heart rate, heart rate variability, electrodermal activity, and eye-tracking data, were collected using wearable sensors. …”
Get full text
Article -
2916
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
2917
Possibilities of lipid clinics in identifying patients with familial hypercholesterolemia
Published 2023-03-01“…To assess the detection rate of familial hypercholesterolemia among outpatients visiting a lipidologist.Material and methods. …”
Get full text
Article -
2918
Convergence or Divergence? A Cluster Analysis of Energy Poverty Patterns Across the European Union Amidst Policy Shifts and Crises
Published 2025-06-01“…Utilizing Eurostat EU-SILC data, the study analyzes trends in four key indicators: the inability to keep homes adequately warm, arrears on utility bills, housing cost overburden rate, and the at-risk-of-poverty rate. …”
Get full text
Article -
2919
Integration of resting state functional MRI into clinical practice - A large single institution experience.
Published 2018-01-01“…Resting state fMRI (rs-fMRI), however, enables functional localization without patient participation and can evaluate numerous functional domains with a single imaging session. To date, post-processing of this resting state data has been resource intensive, which limits its widespread application for routine clinical use. …”
Get full text
Article -
2920
A comparative analysis of drug-induced kidney injury adverse reactions between cyclosporine and tacrolimus based on the FAERS database
Published 2025-05-01“…Results After data processing, we identified a total of 3,449 cyclosporine-related kidney injury reports and 5,538 tacrolimus-related kidney injury reports. …”
Get full text
Article