Results 31 to 40 of about 1,717,630 (292)
Criminal Trajectory Reconstruction Method Based on a Mobile Reference System
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding +4 more
doaj +1 more source
A Personalized and Practical Method for Analyzing the Risk of Chemical Terrorist Attacks
The chemical terrorist attack is a type of unconventional terrorism that threatens the safety of cities. This kind of terrorist attack is highly concealed and difficult to be detected.
Rongchen Zhu +3 more
doaj +1 more source
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan +2 more
wiley +1 more source
DyCARS: A dynamic context-aware recommendation system
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou +7 more
doaj +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao +3 more
doaj +1 more source
Characteristics of Cerebral Palsy in the Midwestern US
ABSTRACT Objective Cerebral palsy (CP) is the most common lifelong motor disability worldwide. Yet, data is limited on how CP manifests in the US. Our objective was to characterize and determine factors affecting functional outcomes in a large population of young people with CP in the Midwestern US.
Susie Kim +6 more
wiley +1 more source
ECGYOLO: Mask Detection Algorithm
Of past years, wearing masks has turned into a necessity in daily life due to the rampant new coronavirus and the increasing importance people place on health and life safety.
Wenyi Hu +6 more
doaj +1 more source
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source

