![](images/graphics/blank.gif)
Detection theory
-
This book is a systemic summary of the research of Guo-Fang Pang’s team on the theory and applied practice of detection technology of pesticide residues over the past 20 years. The innovative research achievements at an internationally advanced level in this field are fully demonstrated in this work. In addition, the progress of food safety detection technology has been promoted.
658p
vimeyers
29-05-2024
2
2
Download
-
Cheating detection is an important issue in standardized testing, especially in large-scale settings. Statistical approaches are often computationally intensive and require specialised software to conduct. We present a two-stage approach that quickly filters suspected groups using statistical testing on an IRT-based answer-copying index.
16p
viarnault
25-04-2024
1
1
Download
-
This development enables consumers to continue to afford sustainable food in the future. Due to the complexity and non-transparency of value chains (especially in the organic food market) as well as the insufficient labelling of organic food, there is a lack of information in the organic food market. This often results in market failure.
12p
longtimenosee07
29-03-2024
7
1
Download
-
Ebook "Practical gas chromatography: A comprehensive reference" continues to be one of the most widely used analytical techniques, since its applications today expand into fields such as biomarker research or metabolomics. This new practical textbook enables the reader to make full use of gas chromatography. Essential fundamentals and their implications for the practical work at the instrument are provided, as well as details on the instrumentation such as inlet systems, columns and detectors.
904p
tudohanhtau1006
29-03-2024
8
1
Download
-
This study tends to examining how a new analytical tool, can be useful to detect the fraudulent activities in Supply Chain Management. This study aims to analyze and provide empirical evidence regarding the perception of the Indonesian government's internal auditors' responsibility in detecting corruption. The theory of triangle model of responsibility [29] is used as a reference for analyzing research results. The 2x2 between experimental subjects design was conducted to investigate the research questions.
9p
longtimenosee04
06-03-2024
0
0
Download
-
Ebook Configuring Juniper Networks NetScreen & SSG Firewalls: Part 2 includes content: Chapter 8: address translation, chapter 9: transparent mode, chapter 10: attack detection and defense, chapter 11: VPN theory and usage, chapter 12: high availability, chapter 13: troubleshooting the juniper firewall, chapter 14: virtual systems.
356p
longtimenosee03
22-02-2024
7
2
Download
-
Ebook Configuring NetScreen Firewalls: Part 2 includes content: Chapter 9 transparent mode, chapter 10 attack detection and defense, chapter 11 VPN theory and usage, chapter 12 virtual systems, chapter 13 high availability, chapter 14 troubleshooting the netscreen firewall, chapter 15 enterprise netscreen management, appendix A ScreenOS 510 enhancements and new features.
352p
longtimenosee03
22-02-2024
4
1
Download
-
Part 2 book "Twin-control - A digital twin approach to improve machine tools lifecycle" includes content: Non-intrusive load monitoring on component level of a machine tool using a kalman filter based disaggregation approach; utilizing PLC data for workpiece flaw detection in machine tools; simulation of machining operations based on the VMT concept; cyber physical system to improve machining process performance; fleet wide proactive maintenance of machine tools; visualization of simulated and measured process data from theory to practice... and other contents.
298p
muasambanhan06
01-02-2024
4
3
Download
-
Ebook How to cheat at managing information security: Part 2 includes contents: Chapter 7 infrastructure security; chapter 8 firewalls; chapter 9 intrusion detection systems: theory; chapter 10 intrusion detection systems: in practice; chapter 11 intrusion prevention and protection; chapter 12 network penetration testing; chapter 13 application security flaws and application testing.
204p
haojiubujain010
14-12-2023
6
3
Download
-
A recent theory supports that high-grade serous epithelial ovarian cancer derives from the fimbrial end of the fallopian tube and during the last decade, a few studies have examined the fallopian tube cytology.
8p
vischultz
20-10-2023
5
1
Download
-
Part 1 of ebook "Basic radar analysis" provides readers with contents including: radar basics; radar range equation; radar cross section; noise; radar losses; detection theory; matched filter; detection probability improvement techniques; ambiguity function; waveform coding;...
300p
tieulangtran
28-09-2023
3
2
Download
-
Part 2 book "Advances in poultry genetics and genomics" includes content: Genetics and genomics of immunity and disease traits in poultry species, genetics and genomics of skeletal traits in poultry species, theory of genome-wide association for QTL detection, genomic selection using Bayesian methods, genomic selection in poultry breeding using single-step genomic best linear unbiased prediction,.... and other contents.
292p
oursky04
14-09-2023
6
4
Download
-
The Dempster-Shafer (DS) theory of evidence is frequently used to combine multiple supervised machine learning models into a robust fusion-based model. However, using the DS theory to create a fusion model from multiple one-class classifications (OCCs) for network anomaly detection is a challenging task.
16p
vimulcahy
18-09-2023
5
4
Download
-
Part 2 book Industrial engineering - Concepts, methodologies, tools and applications" includes content: Dynamics in knowledge, application of dynamic analysis in a centralised supply chain, design of manufacturing cells based on graph theory, engineering design as research, advanced technologies for transient faults detection and compensation.
660p
oursky01
24-07-2023
7
4
Download
-
Part 1 of ebook "Excursions in harmonic analysis - Volume 3: The February fourier talks at the Norbert Wiener center" provide readers with content including: special topics in harmonic analysis; the algebra of elimination; Hodge-de Rham theory of K-forms on carpet type fractals; applications and algorithms in the physical sciences; biosequence time–frequency processing - pathogen detection and identification; wavelet–shearlet edge detection and thresholding methods in 3D;...
168p
dieptieuung
19-07-2023
2
2
Download
-
This paper aims at modifying a learning algorithm, developed from Recurrent Perceptron Learning Algorithm (RPLA) and a Pattern Recognition Algorithm for High-Order Cellular Neural Networks (HOCNN). Our research methods are developing theory of learning for high-order cellular neural networks and experiment with modified algorithms.
9p
viwolverine
07-07-2023
4
3
Download
-
The aim of this project was to select highly sensitive and specific aptamer capable of detecting Fusarium graminearum (Fg) and F. pseudograminearum (Fp) species. The aptamer-based testing allows early detection of fungal infection in the field. Fungi are known to change their activity and may often undergo genetic changes. The classic "gene for gene" theory explains the relationship between host plant cultivars and fungal pathogenic races.
131p
runthenight04
02-02-2023
2
1
Download
-
We present MUSTACHE, a new method for multi-scale detection of chromatin loops from Hi-C and Micro-C contact maps. MUSTACHE employs scale-space theory, a technical advance in computer vision, to detect blob-shaped objects in contact maps.
17p
viarchimedes
26-01-2022
12
0
Download
-
Colorectal cancer (CRC) is the second leading cause of cancer deaths in the USA. Although a number of CRC screening tests have been established as being effective for CRC prevention and early detection, rates of CRC screening test completion in the US population remain suboptimal, especially among the uninsured, recent immigrants and Hispanics.
13p
vielonmusk
21-01-2022
10
1
Download
-
The study concluded that the idea of fraud within the rules of administrative law is surrounded by provisions that are separate from the provisions of fraud in civil and criminal law, and that the administrative decision that based on fraud is a decision that is independent of the null decision, and it also constitutes a separate administrative theory in France's administrative law.
7p
mudbound
06-12-2021
14
2
Download