intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Detection theory

Xem 1-20 trên 77 kết quả Detection theory
  • This book is a systemic summary of the research of Guo-Fang Pang’s team on the theory and applied practice of detection technology of pesticide residues over the past 20 years. The innovative research achievements at an internationally advanced level in this field are fully demonstrated in this work. In addition, the progress of food safety detection technology has been promoted.

    pdf658p vimeyers 29-05-2024 2 2   Download

  • Cheating detection is an important issue in standardized testing, especially in large-scale settings. Statistical approaches are often computationally intensive and require specialised software to conduct. We present a two-stage approach that quickly filters suspected groups using statistical testing on an IRT-based answer-copying index.

    pdf16p viarnault 25-04-2024 1 1   Download

  • This development enables consumers to continue to afford sustainable food in the future. Due to the complexity and non-transparency of value chains (especially in the organic food market) as well as the insufficient labelling of organic food, there is a lack of information in the organic food market. This often results in market failure.

    pdf12p longtimenosee07 29-03-2024 7 1   Download

  • Ebook "Practical gas chromatography: A comprehensive reference" continues to be one of the most widely used analytical techniques, since its applications today expand into fields such as biomarker research or metabolomics. This new practical textbook enables the reader to make full use of gas chromatography. Essential fundamentals and their implications for the practical work at the instrument are provided, as well as details on the instrumentation such as inlet systems, columns and detectors.

    pdf904p tudohanhtau1006 29-03-2024 8 1   Download

  • This study tends to examining how a new analytical tool, can be useful to detect the fraudulent activities in Supply Chain Management. This study aims to analyze and provide empirical evidence regarding the perception of the Indonesian government's internal auditors' responsibility in detecting corruption. The theory of triangle model of responsibility [29] is used as a reference for analyzing research results. The 2x2 between experimental subjects design was conducted to investigate the research questions.

    pdf9p longtimenosee04 06-03-2024 0 0   Download

  • Ebook Configuring Juniper Networks NetScreen & SSG Firewalls: Part 2 includes content: Chapter 8: address translation, chapter 9: transparent mode, chapter 10: attack detection and defense, chapter 11: VPN theory and usage, chapter 12: high availability, chapter 13: troubleshooting the juniper firewall, chapter 14: virtual systems.

    pdf356p longtimenosee03 22-02-2024 7 2   Download

  • Ebook Configuring NetScreen Firewalls: Part 2 includes content: Chapter 9 transparent mode, chapter 10 attack detection and defense, chapter 11 VPN theory and usage, chapter 12 virtual systems, chapter 13 high availability, chapter 14 troubleshooting the netscreen firewall, chapter 15 enterprise netscreen management, appendix A ScreenOS 510 enhancements and new features.

    pdf352p longtimenosee03 22-02-2024 4 1   Download

  • Part 2 book "Twin-control - A digital twin approach to improve machine tools lifecycle" includes content: Non-intrusive load monitoring on component level of a machine tool using a kalman filter based disaggregation approach; utilizing PLC data for workpiece flaw detection in machine tools; simulation of machining operations based on the VMT concept; cyber physical system to improve machining process performance; fleet wide proactive maintenance of machine tools; visualization of simulated and measured process data from theory to practice... and other contents.

    pdf298p muasambanhan06 01-02-2024 4 3   Download

  • Ebook How to cheat at managing information security: Part 2 includes contents: Chapter 7 infrastructure security; chapter 8 firewalls; chapter 9 intrusion detection systems: theory; chapter 10 intrusion detection systems: in practice; chapter 11 intrusion prevention and protection; chapter 12 network penetration testing; chapter 13 application security flaws and application testing.

    pdf204p haojiubujain010 14-12-2023 6 3   Download

  • A recent theory supports that high-grade serous epithelial ovarian cancer derives from the fimbrial end of the fallopian tube and during the last decade, a few studies have examined the fallopian tube cytology.

    pdf8p vischultz 20-10-2023 5 1   Download

  • Part 1 of ebook "Basic radar analysis" provides readers with contents including: radar basics; radar range equation; radar cross section; noise; radar losses; detection theory; matched filter; detection probability improvement techniques; ambiguity function; waveform coding;...

    pdf300p tieulangtran 28-09-2023 3 2   Download

  • Part 2 book "Advances in poultry genetics and genomics" includes content: Genetics and genomics of immunity and disease traits in poultry species, genetics and genomics of skeletal traits in poultry species, theory of genome-wide association for QTL detection, genomic selection using Bayesian methods, genomic selection in poultry breeding using single-step genomic best linear unbiased prediction,.... and other contents.

    pdf292p oursky04 14-09-2023 6 4   Download

  • The Dempster-Shafer (DS) theory of evidence is frequently used to combine multiple supervised machine learning models into a robust fusion-based model. However, using the DS theory to create a fusion model from multiple one-class classifications (OCCs) for network anomaly detection is a challenging task.

    pdf16p vimulcahy 18-09-2023 5 4   Download

  • Part 2 book Industrial engineering - Concepts, methodologies, tools and applications" includes content: Dynamics in knowledge, application of dynamic analysis in a centralised supply chain, design of manufacturing cells based on graph theory, engineering design as research, advanced technologies for transient faults detection and compensation.

    pdf660p oursky01 24-07-2023 7 4   Download

  • Part 1 of ebook "Excursions in harmonic analysis - Volume 3: The February fourier talks at the Norbert Wiener center" provide readers with content including: special topics in harmonic analysis; the algebra of elimination; Hodge-de Rham theory of K-forms on carpet type fractals; applications and algorithms in the physical sciences; biosequence time–frequency processing - pathogen detection and identification; wavelet–shearlet edge detection and thresholding methods in 3D;...

    pdf168p dieptieuung 19-07-2023 2 2   Download

  • This paper aims at modifying a learning algorithm, developed from Recurrent Perceptron Learning Algorithm (RPLA) and a Pattern Recognition Algorithm for High-Order Cellular Neural Networks (HOCNN). Our research methods are developing theory of learning for high-order cellular neural networks and experiment with modified algorithms.

    pdf9p viwolverine 07-07-2023 4 3   Download

  • The aim of this project was to select highly sensitive and specific aptamer capable of detecting Fusarium graminearum (Fg) and F. pseudograminearum (Fp) species. The aptamer-based testing allows early detection of fungal infection in the field. Fungi are known to change their activity and may often undergo genetic changes. The classic "gene for gene" theory explains the relationship between host plant cultivars and fungal pathogenic races.

    pdf131p runthenight04 02-02-2023 2 1   Download

  • We present MUSTACHE, a new method for multi-scale detection of chromatin loops from Hi-C and Micro-C contact maps. MUSTACHE employs scale-space theory, a technical advance in computer vision, to detect blob-shaped objects in contact maps.

    pdf17p viarchimedes 26-01-2022 12 0   Download

  • Colorectal cancer (CRC) is the second leading cause of cancer deaths in the USA. Although a number of CRC screening tests have been established as being effective for CRC prevention and early detection, rates of CRC screening test completion in the US population remain suboptimal, especially among the uninsured, recent immigrants and Hispanics.

    pdf13p vielonmusk 21-01-2022 10 1   Download

  • The study concluded that the idea of fraud within the rules of administrative law is surrounded by provisions that are separate from the provisions of fraud in civil and criminal law, and that the administrative decision that based on fraud is a decision that is independent of the null decision, and it also constitutes a separate administrative theory in France's administrative law.

    pdf7p mudbound 06-12-2021 14 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2