-
321
Typhus: epidemiological evolution and features of a clinical case in Novosibirsk
Published 2024-11-01“…In the period 2019-2022 in the Novosibirsk Region cases of typhoid fever were not detected. The article reflects the epidemiological features of typhoid fever for the period 2014-2023. …”
Get full text
Article -
322
Features of a new Coronavirus infection in children of different ages
Published 2021-07-01“…The new coronavirus infection (COVID-1 9) is a socially significant problem around the world. According to available statistics, complications are less common among children, asymptomatic or mild forms of the disease prevail more often.This article presents the features of the viral landscape of the upper respiratory tract in children with ARVI in a pandemic, the clinical and laboratory features of the course of COVID-1 9 in children of different ages.It was found that SARS-CoV-2 is detected only in a third (32.9%) of hospitalized patients with respiratory symptoms, in 4.3% of cases — in combination with seasonal CoV-OC43 / CoV-229E, in 1 1.6% — with other respiratory viruses. …”
Get full text
Article -
323
The current state and problems of studying the biological effects of THz irradiation
Published 2025-05-01Get full text
Article -
324
FEATURES OF CYTOKINE REGULATION IN PATIENTS WITH MECHANICAL JAUNDICE OF MALIGNANT GENESIS
Published 2018-01-01Get full text
Article -
325
Features of conducting a forensic commodity examination of furniture products
Published 2023-09-01Get full text
Article -
326
A survey of face recognition techniques under occlusion
Published 2021-11-01“…Second the authors analyse how the existing face recognition methods cope with the occlusion problem and classify them into three categories, which are given as: 1) occlusion robust feature extraction approaches, 2) occlusion aware face recognition approaches, and 3) occlusion recovery based face recognition approaches. …”
Get full text
Article -
327
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01“…In this paper, we propose a Protocol Based Deep Intrusion Detection (PB-DID) architecture, in which we created a data-set of packets from IoT traffic by comparing features from the UNSWNB15 and Bot-IoT data-sets based on flow and Transmission Control Protocol (TCP). …”
Get full text
Article -
328
Speaker verification method based on cross-domain attentive feature fusion
Published 2023-08-01“…Aiming at the problem that the lack of structure information among speech signal sample in the front-end acoustic features of speaker verification system, a speaker verification method based on cross-domain attentive feature fusion was proposed.Firstly, a feature extraction method based on the graph signal processing (GSP) was proposed to extract the structural information of speech signals, each sample point in a speech signal frame was regarded as a graph node to construct the speech graph signal and the graph frequency information of the speech signal was extracted through the graph Fourier transform and filter banks.Then, an attentive feature fusion network with the residual neural network and the squeeze-and- excitation block was proposed to fuse the features in the traditional time-frequency domain and those in the graph frequency domain to promote the speaker verification system performance.Finally, the experiment was carried out on the VoxCeleb, SITW, and CN-Celeb datasets.The experimental results show that the proposed method performs better than the baseline ECAPA-TDNN model in terms of equal error rate (EER) and minimum detection cost function (min-DCF).…”
Get full text
Article -
329
Speaker verification method based on cross-domain attentive feature fusion
Published 2023-08-01“…Aiming at the problem that the lack of structure information among speech signal sample in the front-end acoustic features of speaker verification system, a speaker verification method based on cross-domain attentive feature fusion was proposed.Firstly, a feature extraction method based on the graph signal processing (GSP) was proposed to extract the structural information of speech signals, each sample point in a speech signal frame was regarded as a graph node to construct the speech graph signal and the graph frequency information of the speech signal was extracted through the graph Fourier transform and filter banks.Then, an attentive feature fusion network with the residual neural network and the squeeze-and- excitation block was proposed to fuse the features in the traditional time-frequency domain and those in the graph frequency domain to promote the speaker verification system performance.Finally, the experiment was carried out on the VoxCeleb, SITW, and CN-Celeb datasets.The experimental results show that the proposed method performs better than the baseline ECAPA-TDNN model in terms of equal error rate (EER) and minimum detection cost function (min-DCF).…”
Get full text
Article -
330
Key nodes identification in complex networks based on subnetwork feature extraction
Published 2023-07-01Get full text
Article -
331
Feature Coding and Graph via Transformer: Different Granularities Classification for Aircraft
Published 2024-11-01Get full text
Article -
332
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
333
ShipYOLO: An Enhanced Model for Ship Detection
Published 2021-01-01“…In response to this problem, this study uses an improved YOLO-V4 detection model (ShipYOLO) to detect ships. …”
Get full text
Article -
334
Binocular Vision-Based Target Detection Algorithm
Published 2025-01-01“…In the field of target detection, algorithms are challenged with multi-objective optimization problems in identifying detection targets, and it is also crucial to improve the recognition of small and insignificant targets. …”
Get full text
Article -
335
Customer Attrition Detection Using the LGBM Model
Published 2025-01-01“…To select the most suitable model for accurately detecting customer churn, this study performs preprocessing, including data cleaning, feature engineering, and feature selection. …”
Get full text
Article -
336
Features of the clinical course of novel coronavirus infection COVID-19 in children
Published 2024-04-01“…Background. The problem of the clinical course and complications of a novel coronavirus infection (COVID-19) in children is given special attention in pediatrics. …”
Get full text
Article -
337
MODERN METHODS OF AUTOMATIC RECTANGLE OBJECTS DETECTION
Published 2019-06-01“…The algorithms were tested on the base of 1000 passports for the problem of accurate photo edges detection.…”
Get full text
Article -
338
An efficient fusion detector for road defect detection
Published 2025-07-01“…To address this problem, an SCB-AF-Detector is proposed, which combines space-to-depth convolution with bottleneck transformer and employs enhanced asymptotic feature pyramid network to fuse features. …”
Get full text
Article -
339
Sparse wavelet decomposition in problems of vibration-based diagnostics of rotary equipment
Published 2019-06-01“…At the present an increase in the effectiveness of vibration-based diagnostics is achieved by automating the solution of this problem and also by the use of matched sets of informative features, which causes the urgency of the development of algorithms for their detection. …”
Get full text
Article -
340
Immunohistochemical features of cyclooxygenase-2 expression in endometrial hyperplasia without atypia
Published 2019-07-01Get full text
Article