Results 251 to 260 of about 239,405 (340)
Separation of thoracic and abdominal measurements in neonatal vital sign monitoring using radar vision fusion system. [PDF]
Jiang N+6 more
europepmc +1 more source
ABSTRACT We suggest a modified version of the nonnegative matrix factorization problem, adding penalty terms to the model with the aim of taking control of the condition number of the decomposition elements. This measure is taken to reinforce computational stability in the solution path of the relevant optimization model.
Fatemeh Dargahi+3 more
wiley +1 more source
Characteristics of the Mirror Image of Precipitation Observed by the TRMM Precipitation Radar
Ji Li, Kenji Nakamura
openalex +1 more source
From the oral cavity to the establishment of bacterial adhesion in the intestinal tract, probiotic cells traverse 4 main stages: (1) bacterial transport, (2) reversible adhesion, (3) irreversible adhesion, and (4) biofilm formation. Each stage involves distinct mechanisms that govern the adhesion potential of bacteria to the intestinal mucus, which ...
Thị‐Thanh‐Trúc Phùng+4 more
wiley +1 more source
Building occupancy estimation using single channel CW radar and deep learning. [PDF]
Pramanik SK, Hossain MS, Islam SMM.
europepmc +1 more source
Experimental imaging of internal waves by a mm-wave radar
G. Connan+5 more
openalex +2 more sources
The tentacles of surveillance: Cephalopods and United States satellite intelligence
Abstract This article examines the symbol placed on a US spy satellite, National Reconnaissance Office Launch–39 (NROL‐39). In 2013, NROL‐39 was launched into space, the payload vehicle and mission patch emblazoned with a gigantic octopus, its tentacles surrounding the globe, and the words “Nothing Is Beyond Our Reach” written below the globe.
Andrew Bickford
wiley +1 more source
Lossless compression of Synthetic Aperture Radar images
Robert W. Ives+2 more
openalex +2 more sources
Inspection Game With Imperfect Detection Technology
ABSTRACT In this article, we investigate a generalized two‐player inspection game between an attacker and a defender who allocates multiple resources across a critical system. Specifically, the attacker targets components of the system while the defender coordinates multiple inspection units to monitor disjoint subsets of components and detect attacks.
J. Haden Boone, Mathieu Dahan
wiley +1 more source