Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   4  
      Molecular BiologyToxicityDetectionBiosynthesis
    • by 
    •   6  
      Image ProcessingMachine LearningRecognitionDetection
    • by 
    •   20  
      Computer ScienceSecuritySpaceSafety
This article focuses on providing remedial solutions for COVID disease through the data collection process. Recently, In India, sudden human losses are happening due to the spread of infectious viruses. All people are not able to... more
    • by  and +1
    •   10  
      Computer ScienceWireless Sensor NetworksThe InternetSensors
development of an efficient real the areas where security is the main concern. The proposed system presents a platform for r detection and subsequent generation of an alarm condition as soon as the human head is detected. The prototype... more
    • by  and +1
    •   12  
      Inquiry Based LearningAgent Based SimulationFraud Detection And PreventionMotion Capture (Animation)
Abstract—The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of... more
    • by 
    •   20  
      EngineeringElectrical EngineeringMechanical EngineeringCivil Engineering
    • by 
    •   9  
      PhotogrammetryDisaster ManagementEarthquakeGeometry
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible... more
    • by 
    •   9  
      SecurityPeer-to-PeerP2p(peer-2-Peer) NetworksPhysical Therapy
A significant perspective related with vehicles is their speed. A faster vehicle encourages us to arrive at our destination in lesser time, sparing our valuable time. In any case, tragically, we have been seeing the ascent in vehicular... more
    • by 
    •   5  
      Image ProcessingRecognitionVehicle dynamic controlDetection
Abstract: Data mining is the process that attempts to discover patterns in large data sets. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting... more
    • by 
    •   2  
      DetectionTerrorist
    • by  and +1
    •   5  
      SensorPredictionDiagnosisDetection
Imaging in poor weather is often severely degraded by scattering due to suspended particles in the atmosphere such as haze and fog. Vehicles which are travelling in hill stations or in the early morning during winter season will face... more
    • by 
    •   5  
      WSN (Wireless sensor network)DetectionFog ComputingVehicle-to-vehicle communication (V2V)
In In spite of the tremendous growth of technologies in computer networking and information technology, still we lack in preventing our resources from theft/attacks. This problem is very big as far as industry / companies are concerned.... more
    • by 
    •   14  
      Computer ScienceArchitectureRiskIDPs
The paper is devoted to reviewing the existing means of detecting the transportation of dangerous materials and illicit objects. We analyse the currently available systems, the physical background of the corresponding techniques, and... more
    • by 
    •   6  
      Integrated Library SystemsDetectionIllicit DrugsExplosoves
Android is now the world's (or one of the world's) most popular operating system. More and more malware assaults are taking place in Android applications. Many security detection techniques based on Android Apps are now available. The... more
    • by 
    •   5  
      OPERATING SYSTEMAndroidMalwareViruses
    • by 
    •   5  
      Computer ScienceBiomedical EngineeringImage ProcessingSegmentation
    • by 
    •   5  
      Military ScienceForensic ScienceMilitaryDetection
    • by 
    •   5  
      Breast CancerEmerging TechnologiesCancer ScreeningDetection
Cloud computing is envisioned as the next generation architecture for IT Enterprises, and has proliferated itself due to the advantages it provides.Cloud computing provides solutions for carrying out efficient, scalable and low cost... more
    • by 
    •   7  
      SecurityTaxonomyDefenceDetection
Six preprocessing algorithms for the detection of firearm gunshots are statistically evaluated, using the receiver operating characteristic method as a previous feasibility metric for their implementation on a low-power VLSI circuit.... more
    • by  and +1
    •   6  
      Vlsi DesignNeuromorphic VLSiVLSI and Circuit DesignDetection
In 1889, The British Medical Journal published a piece titled, “Detective Medicine,” which describes feats of medical detection performed by physicians attending malingering prisoners. Though simulating illness had a long history, the... more
    • by 
    •   8  
      History of MedicineFin de Siecle Literature & CultureHealth PolicySurveillance
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack,... more
    • by 
    •   5  
      PreventionDetectionIntroductionSecurity Threats
    • by 
    •   10  
      Mechanical EngineeringComputer ScienceBiomedical EngineeringImage Processing
Lies and deceptions are prevalent in our daily lives, yet most people merely guess when attempting to distinguish between lies and truths. In the current research, we examined the validity of the saying that " it takes a thief to know a... more
    • by  and +1
    •   6  
      InfidelityDetectionCheatingLying
Robust and validated analytical methods are needed for the implementation of GM-food and feed legislation. The validation, based on the characterisation of a method for its sensitivity, accuracy and precision, is performed in-house or in... more
    • by 
    •   7  
      Supply ChainValidationDetectionGMO
TOR - The Onion Router is open source software for enabling anonymity of user. It is designed to make it possible for users to surf the Internet keeping their identity safe, so their activities and location cannot be discovered by... more
    • by  and +1
    •   6  
      Information SecurityComputer NetworksComputer SecurityDetection
    • by 
    •   6  
      Food TraceabilityDetectionGMOTraceability
    • by 
    •   4  
      Small Pelagic FishDetectionHydroacousticSchooling
Celem artykułu jest weryfikacja przestrzegania zasad prowadzenia oględzin w sprawach zabójstw na podstawie analizy wyników badań własnych 90 spraw sądowych i prokuratorskich z lat 2000–2010. Wyboru analizowanych spraw dokonano metodą... more
    • by 
    •   12  
      Crime SceneDetectionEfficiencyEfektywność
    • by 
    •   6  
      Food TraceabilityDetectionGMOTraceability
    • by 
    •   11  
      GeographyClimate ChangeChinaClimate
Medical imaging is placing a major role in diagnosing the diseases and in image guided surgery. There are various imaging modalities for different applications giving the anatomical and physiological conditions of the patient. Magnetic... more
    • by 
    •   6  
      Digital Image ProcessingSegmentationDetectionMagnetic resonance image
    • by 
    •   12  
      BiochemistryBioinformaticsGeneticsMicrobiology
    • by 
    •   9  
      Image ProcessingComputer EngineeringVideoSurveillance
Huanglongbing (HLB) es considerada mundialmente como la enfermedad más amenazadora para la citricultura, y ha impactado principalmente en Asia, Sudáfrica y Brasil. A la fecha, no se cuenta con un tratamiento efectivo para la detección de... more
    • by 
    •   3  
      DetectionDetecciónHLB
“RADAR” system, from the English Acronym “ Radio Detention and Ranging” . Better known as “ Radio Detection and Location” RDL. It is a system for detecting and positioning objects through shipping and reflection of electromagnetic waves... more
    • by 
    •   6  
      RadarDetectionUAV systemsSAR
Object detection has an increasing amount of attention in recent years due to its wide range of applications and recent technological breakthroughs. Deep learning is the state-of-art method to perform object detection. This task is under... more
    • by  and +2
    •   16  
      Fire and Emergency ServicesFraud Detection And PreventionStructures and Fire EngineeringDamage detection
    • by 
    •   2  
      DetectionGMO
COVID-19 salgını tüm dünyada hızla yayılarak küresel bir pandemi haline gelmiştir. Bu salgın, günlük yaşamda hem halk sağlığı hem de küresel ekonomi üzerinde yıkıcı bir etkiye sahip olmuştur. Bu salgının daha fazla yayılmasını önlemek ve... more
    • by 
    •   5  
      Deep LearningDetectionDerin ÖğrenmeCovid-19
Recently the possibility of an earthquake has become one of the most important subjects in lots of countries especially in Turkey. For that reason, the possibility of an earthquake gains ground due to its devastating physical and... more
    • by 
    •   9  
      PhotogrammetryDisaster ManagementEarthquakeGeometry
    • by 
    •   9  
      Analytical ChemistryAccreditation and Quality AssuranceSupply ChainValidation
    • by 
    •   7  
      Image ProcessingMachine LearningHuman FactorsSecurity
    • by 
    •   7  
      BusinessSASPreventionFraud
Security is the one of most important feature of banking sector. E-commerce safety is the one of the uppermost visible security that controls the end user during their day to day life and payment interaction with their business. Sharing... more
    • by 
    •   7  
      SecurityCryptographyPreventionPhishing
Breast cancer is an invasive disease in women which needs early detection. Different approaches have been done to detect cancer using different types of antenna-like circular patch antenna, microstrip antenna, t-shaped slotted antenna and... more
    • by 
    •   4  
      Electronics & Telecommunication EngineeringBreast CancerDetectionPATCH ANTENNA
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible... more
    • by 
    •   6  
      SecurityPhysical TherapyWireless Sensor Networks (WSN)Detection
    • by 
    •   4  
      Image ProcessingRecognitionDetectionShape
2016 to 2020. Only 72.21% of cases were detected before one incubation period of the selected diseases. Early detection was acceptable for Lassa virus fever and measles. Also, early notification was insufficient. Only 66.22% of cases were... more
    • by 
    • Detection
    • by 
    •   6  
      Information SecurityMachine LearningComputer NetworksComputer Security