نتایج جستجو برای: detection methods

تعداد نتایج: 2325656  

2000
T. Koivula A. Ellman M. Vilenius

Cavitation is in most cases harmful and undesired phenomenon in fluid power systems. When actions for preventing cavitation are considered, it is essential to recognise the existence of cavitation and location of cavitation inception point. In fluid power components and systems cavitation can occur in various locations where the access for measuring instruments is limited. Therefore, the existe...

2011
Marketa Ryvolova Sona Krizkova Vojtech Adam Miroslava Beklova Libuse Trnkova Jaromir Hubalek Rene Kizek

Metallothioneins (MTs) are a group of low molecular mass, cysteine-rich proteins with a variety of functions including involvement in metal homeostasis, free radical scavenging, protection against heavy metal damage, and metabolic regulation via Zn donation. The overexpression of MTs in proliferating cells is turning the attention to the study of MTs as novel promising marker of tumor diseases....

2009

Malwares are malignant software’s .It is designed to damage computer systems without the knowledge of the owner using the system. Software’s from reputable vendors also contain malicious code that affects the system or leaks information’s to remote servers.Malware’s includes computer viruses, spyware, dihonest ad-ware,rootkits,Trojans,dialers etc. The paper focuses on various Malware detection ...

2016
K.Rathina Priya R.Ramachandiran

---------------------------------------------------------------------***-----------------------------------------------------------------------Abstract This paper presents a scheme for vehicle detection and tracking and categorization from pavement CCTV in traffic surveillance. The system counts vehicles and separate them into four categories: car, van, bus and motorbike. A new backdrop Gaussia...

2016
Anil Kumar

Islanding is detected by all distributed generations (DGs), especially those connected at secondary distribution grids. Islanding methods are mainly classified in three main categories: Passive, Active, Communication based. Hybrid methods are first time discussed in this paper. These methods are under evolution and as their advantages are coming they become an important part of islanding detect...

2013
Blair D. Sullivan

Anomaly detection enjoys a myriad of useful applications including fraud and intrusion detection, image processing, and quality control to name a few; consequently, the methods for anomaly detection have equally wide scope with techniques combining elements from statistics, machine learning, probability, graph theory, and other subjects, often tailored to a specific application domain. This min...

2013
Frederick George Frederick George Walls Carrie Daake

A system is developed to group news stories together according to topic. Several clustering algorithms can be used to group related stories into clusters. The clustering algorithms used require two types of metrics: metrics that, given a story and a set of clusters, can find the most topical cluster for that story; or metrics that can help decide whether or not a given story is on the same topi...

2002

Catalytic tests These tests rely on the fact that haem can catalyse the breakdown of hydrogen peroxide. As the H2O2 breaks down, another substance in the reaction mixture is oxidised, producing a colour change. It is important to note that a positive test does not mean that a given stain is blood, let alone that it is human blood, as various enzymes and certain metals can also give positive res...

1998
J. Zmuidzinas

Coherent detection techniques are used almost exclusively in radio astronomy, while direct detection predominates in the optical and infrared bands. The millimeter, submillimeter, and far–infrared bands represent a transition region from coherent to direct detection. In this paper, the relative merits of coherent and direct detection in the mm through far–IR are compared, the techniques of cohe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید