-
1241
Neurophysiological Approaches to Lie Detection: A Systematic Review
Published 2025-05-01“…The goal is to summarize commonly used EEG signal processing techniques, feature extraction methods, and classification algorithms, identifying those that yield the highest accuracy in lie detection tasks. …”
Get full text
Article -
1242
Rapid and sensitive melamine detection via paper-based surface-enhanced Raman scattering substrate: Plasma-assisted in situ growth of closely packed gold nanoparticles on cellulose...
Published 2025-03-01“…The AuNP–cellulose paper not only exhibited a low detection limit (23 nM (2.9 ppb)) for melamine, adulterated in milk, after sample pretreatments but also enabled rapid detection of 0.2 ppm melamine in formula and low-fat milk within 30 s without any pretreatments, with the supports of principal component analysis (PCA) method. …”
Get full text
Article -
1243
Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology
Published 2022-01-01“…The combined terahertz time-domain spectroscopy (THz-TDS) and chemometric technology is used to detect the adulteration of similar substances in Panax notoginseng powder. …”
Get full text
Article -
1244
Novel Immune Microlens Imaging for Detection of Antigen and Antibody
Published 2019-01-01“…Detection and analysis of antigen-antibody reaction is one of the most critical detection techniques in the fields of medicine, biology, environmental science, and food safety. …”
Get full text
Article -
1245
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
1246
Driver and Path Detection through Time-Series Classification
Published 2018-01-01Get full text
Article -
1247
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
1248
Investigate the Use of Deep Learning in IoT Attack Detection
Published 2025-06-01“…This study contributes a comprehensive comparative analysis of deep learning models for IoT security, focusing on the effectiveness of weighted features in improving detection accuracy. …”
Get full text
Article -
1249
Strawberry Disease Detection Using Multispectral UAV Imagery
Published 2025-07-01“…The acquired imagery underwent preliminary processing, including orthophotomap generation and extraction of spectral and textural features from the images. (Results and discussion) Analysis of the multispectral data enabled the identification of informative feature sets for distinguishing between healthy and fungus-infected strawberry plants. …”
Get full text
Article -
1250
Toward an Onboard Anomaly Detection and Identification Method for Satellites
Published 2025-01-01“…Feature contribution analysis using orthogonal arrays and signal-to-noise ratios was used to enhance explainability, attempting to identify the type and location of detected anomalies. …”
Get full text
Article -
1251
Relationship Between YWHAQ Expression and Clinicopathological Features and Prognosis of Patients with Gastric Adenocarcinoma
Published 2025-05-01“…Immunohistochemistry was used to detect the protein expression of YWHAQ in gastric adenocarcinoma tissues. …”
Get full text
Article -
1252
Features of the pre-analytical stage in quantitative determination of TREC/KREC in peripheral blood
Published 2023-11-01Get full text
Article -
1253
Circulating Tumor Cells Count and Morphological Features in Breast, Colorectal and Prostate Cancer.
Published 2013-01-01“…The number of CTC correlated strongest with survival, whereas CTC size, roundness and apoptosis features reached significance in univariate analysis, but not in multivariate analysis. …”
Get full text
Article -
1254
Algorithm for Recognition of Small Air Targets by Trajectory Features in Passive Bistatic Radar
Published 2023-11-01“…The results of a comparative analysis of decision-making methods for recognizing small UAVs and birds based on their trajectory features are presented. …”
Get full text
Article -
1255
-
1256
Cell-phone origin identification based on spectral features of device self-noise
Published 2017-01-01“…With the widespread availability of cell-phone recording devices and the availability of various powerful and easy-to-use digital media editing software,source cell-phone identification has become a hot topic in multimedia forensics.A novel cell-phone identification method was proposed based on the recorded speech.Firstly,device self-noise (DSN) was considered as the fingerprint of the cell-phone and estimated from the silent segments of the speech.Then,the mean of the noise's spectrum was extracted as the identification.Principal components analysis (PCA) was applied to reduce the feature dimension.Support vector machine (SVM) was adopted as the classifier to determine the source of the detecting speech.Twenty-four popular models of the cell-phones were evaluated in the experiment.The experimental results show that the average identification accuracy and recall of the method can reach up to 99.24% and demonstrate that the self-noise feature has more superior performance than the MFCC feature.…”
Get full text
Article -
1257
Specific Features of the Spread of New Coronavirus Infection (COVID 19) in Orenburg Region
Published 2021-07-01“…It is necessary to study COVID-19 distribution features among the population of the central Orenburg region administrative districts in June–December 2020.Materials & Methods. …”
Get full text
Article -
1258
Role of EEG as Biomarker in the Early Detection and Classification of Dementia
Published 2014-01-01“…The early detection and classification of dementia are important clinical support tasks for medical practitioners in customizing patient treatment programs to better manage the development and progression of these diseases. …”
Get full text
Article -
1259
-
1260
The biochemical and morphostructural features of biological fluids in patients with rapidly growing uterine myoma
Published 2014-08-01“…A new procedure has been developed and tested to diagnose rapidly growing UM, including the latter concurrent with endometrial hyperplastic processes, which is based on the comparison of the levels of lipid peroxidation products in the biomolecules in the study biological fluids (endometrial lavages) and on the analysis of their morphostructural features. A mathematical model to calculate uterine volume has been proposed to objectify the estimation of tumor growth rates. …”
Get full text
Article