Results 91 to 100 of about 194,338 (137)

Weapon Detection in Real-Time CCTV Videos Using Deep Learning

open access: yesIEEE Access, 2021
Security and safety is a big concern for today’s modern world. For a country to be economically strong, it must ensure a safe and secure environment for investors and tourists. Having said that, Closed Circuit Television (CCTV) cameras are being used for
Muhammad Tahir Bhatti   +2 more
exaly   +2 more sources

The evolution of the type VI secretion system as a disintegration weapon

open access: yesPLoS Biology, 2020
The type VI secretion system (T6SS) is a nanomachine used by many bacteria to drive a toxin-laden needle into other bacterial cells. Although the potential to influence bacterial competition is clear, the fitness impacts of wielding a T6SS are not well ...
William P J Smith   +2 more
exaly   +2 more sources
Some of the next articles are maybe not open access.

Related searches:

Rama ambon Timor‐Leste

ANZ journal of surgery, 2018
A middle aged patient was hit by a rama ambon in the upper left chest. The angle of entry was such that the weapon struck the proximal humerus, fortunately missing all vital structures (Fig. 1).
RF Grace
semanticscholar   +1 more source

An Efficient Marginal-Return-Based Constructive Heuristic to Solve the Sensor–Weapon–Target Assignment Problem

IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019
In network-centric warfare, the interconnections among various combat resources enable an advanced operational pattern of cooperative engagement. The operational effectiveness and outcome strongly depends on the reasonable utilization of available ...
Bin Xin, Yipeng Wang, Jie Chen
exaly   +2 more sources

Internal ballistics of the sling

American Journal of Physics
The venerable sling is a difficult weapon to master—we show that very precise timing is required to hit a target. Internal ballistics are analyzed to support ancient claims of the weapon's range (exceeding 400 m in some cases).
Mark Denny
semanticscholar   +1 more source

Weapon Detection using Artificial Intelligence and Deep Learning for Security Applications

International Conference Electronic Systems, Signal Processing and Computing Technologies [ICESC-], 2020
Security is always a main concern in every domain, due to a rise in crime rate in a crowded event or suspicious lonely areas. Abnormal detection and monitoring have major applications of computer vision to tackle various problems.
Harsh Jain   +4 more
semanticscholar   +1 more source

Artificial urinary sphincter significantly better than fixed sling for moderate post‐prostatectomy stress urinary incontinence: a propensity score‐matched study

BJU International, 2020
To compare the efficacy of artificial urinary sphincter (AUS) vs retrourethral transobturator sling (RTS) in men with moderate post‐prostatectomy urinary incontinence (PPI) using propensity score‐matching analysis to enhance the validity of the ...
E. Sacco   +8 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy