-
1601
Molecular detection of Escherichia coli from ovine aborted fetuses in Mosul city, Iraq
Published 2025-01-01“…Genetic relatedness shows that the local isolates were closer to Escherichia coli strain W170 and Escherichia coli O157:H7 strain K1516 from China and USA, respectively. …”
Get full text
Article -
1602
DETECTION OF TEXT OBJECTS IN IMAGES OF REAL SCENES BASED ON CONVOLUTIONAL NEURAL NETWORK MODEL
Published 2016-09-01Get full text
Article -
1603
Modular iodinated carboxybetaine copolymers as charge-sensitive contrast agents for the detection of cartilage degradation
Published 2024-12-01“…Moreover, this polymer also showed a strong local specificity, visualizing local differences in GAG distribution with significantly increased accuracy compared to the controls. …”
Get full text
Article -
1604
MSGEGA: Multiscale Gaussian Enhancement and Global-Aware Network for Infrared Small Target Detection
Published 2025-01-01“…In recent years, the development of deep learning has significantly improved the performance of infrared small targets detection, particularly in addressing the issue of detecting small infrared targets with high signal-to-clutter ratio (SCR). …”
Get full text
Article -
1605
Evaluation of Moore and grab sampling method for Salmonella Typhi detection in environmental samples in Ghana.
Published 2025-01-01“…Limited detection of confirmed typhoid fever cases at the local hospital may reflect healthcare seeking behaviours, access as well as early treatment with over-the-counter antibiotics. …”
Get full text
Article -
1606
Detecting ear lesions in slaughtered pigs through open-source convolutional neural networks
Published 2025-05-01Get full text
Article -
1607
A genetic programming approach with adaptive region detection to skin cancer image classification
Published 2024-12-01“…This paper proposes a new genetic programming (GP) approach to automatically learn global and/or local features from skin images for classification. …”
Get full text
Article -
1608
Swincloud: a hybrid network for cloud detection in thermal infrared remote sensing images
Published 2024-12-01“…Convolutional neural networks have shown outstanding performance in previous cloud detection algorithms due to their robust ability to extract local information. …”
Get full text
Article -
1609
Application of Online Anomaly Detection Using One-Class Classification to the Z24 Bridge
Published 2024-12-01“…In this study, we examine an online setting for damage detection in the Z24 bridge. We evaluate and compare the performance of the elliptic envelope, incremental one-class support vector classification, local outlier factor, half-space trees, and entropy-guided envelopes. …”
Get full text
Article -
1610
SCCA-YOLO: Spatial Channel Fusion and Context-Aware YOLO for Lunar Crater Detection
Published 2025-07-01“…These challenges significantly hinder detection performance in remote sensing imagery and underscore the necessity of enhancing both local feature representation and global semantic reasoning. …”
Get full text
Article -
1611
Comparative Analysis of Keypoint Detection Performance in SIFT Implementations on Small-Scale Image Datasets
Published 2024-12-01“…Scale-invariant feature transform (SIFT) is widely used as an image local feature extraction method because of its invariance to rotation, scale, and illumination change. …”
Get full text
Article -
1612
Context guided transformer enhanced YOLOv8 for accurate juvenile abalone detection and counting
Published 2025-12-01Get full text
Article -
1613
-
1614
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article -
1615
Aircraft Detection from VHR Images Based on Circle-Frequency Filter and Multilevel Features
Published 2013-01-01“…Aircraft automatic detection from very high-resolution (VHR) images plays an important role in a wide variety of applications. …”
Get full text
Article -
1616
Network security traffic detection and legal supervision based on adaptive metric learning algorithm
Published 2025-09-01Get full text
Article -
1617
Auditor’s Professional Skepticism and Experience on Fraud Detection: The Moderating Role of Professional Ethical Commitment
Published 2024-05-01“…This research is expected to be taken into consideration in terms of auditor accountability in detecting fraud in local government agencies. Novelty: This research contributes to the theory related to auditor behavior in decision-making, specifically the attribution theory, as it involves a combination of internal and external factors in an individual’s behavior, in this case, internal auditors. …”
Get full text
Article -
1618
Unusual 99mTc-pyrophosphate accumulation in aortic aneurysm detected by bone scintigraphy
Published 2016-11-01Get full text
Article -
1619
The Detection and Enumeration of Coliform Bacteria in Some Ready-to-Eat Unpackaged Food in Fethiye Region
Published 2021-12-01Get full text
Article -
1620
Multi‐Distance Spatial‐Temporal Graph Neural Network for Anomaly Detection in Blockchain Transactions
Published 2025-08-01“…This article presents MDST‐GNN, a multi‐distance spatial‐temporal graph neural network for blockchain anomaly detection. To address challenges in detecting fraudulent cryptocurrency transactions, MDST‐GNN integrates a multi‐distance graph convolutional architecture with adaptive temporal modeling, enabling capture of both local and global spatial dependencies while inferring patterns from anonymized temporal data. …”
Get full text
Article