-
861
Development of Gas Sensors and Their Applications in Health Safety, Medical Detection, and Diagnosis
Published 2025-05-01“…In the sphere of medical detection and diagnosis, this paper focuses on the detection of biomarkers in human exhaled breath by gas sensors, which facilitates the early diagnosis of diseases such as lung cancer. …”
Get full text
Article -
862
Diet and Abdominal Autofluorescence Detected by in Vivo Fluorescence Imaging of Living Mice
Published 2008-01-01“…We investigated the effect of diet on abdominal autofluorescence detected by in vivo fluorescence imaging (FLI) of living mice. …”
Get full text
Article -
863
Leveraging Multi-Modality and Enhanced Temporal Networks for Robust Violence Detection
Published 2024-10-01“…Using the XD-Violence dataset, which includes audio data for violence detection, we conduct experiments to evaluate various feature fusion methods. …”
Get full text
Article -
864
A Review of House Detection from High Resolution Satellite Images
Published 2024-12-01“…Detecting houses through high-resolution satellite images has received increasing attention in recent years and is considered a basic but difficult task in the field of remote sensing. …”
Get full text
Article -
865
Incoherent Region-Aware Occlusion Instance Synthesis for Grape Amodal Detection
Published 2025-03-01“…Additionally, the proposed overlapping cover strategy significantly outperforms the random cover strategy in amodal detection performance.…”
Get full text
Article -
866
BN-SNN: Spiking neural networks with bistable neurons for object detection.
Published 2025-01-01“…However, existing conversion techniques are hindered by long temporal durations or inference latencies, which negatively impact the accuracy of the converted networks. Additionally, the application of SNNs in object detection tasks remains largely under-explored. …”
Get full text
Article -
867
Multi-Channel Replay Speech Detection Using an Adaptive Learnable Beamformer
Published 2025-01-01“…In this work, we propose a multi-channel neural network architecture called M-ALRAD for the detection of replay attacks based on spatial audio features. …”
Get full text
Article -
868
BETWEEN ARCHAEOLOGY AND METAL DETECTING, ANCIENT COINS FROM OCNIȚA-BURIDAVA
Published 2024-03-01“…Associating discoveries from metal detection with information related to findings with a clear archaeological context can be a solution in understanding certain phenomena that led to their deposition, loss, or concealment. …”
Get full text
Article -
869
Research Progress of Electrochemical Biosensors for Diseases Detection in China: A Review
Published 2025-04-01“…It systematically categorizes and summarizes biosensors developed in China for detecting cancer, infectious diseases, inflammation, and neurodegenerative disorders. …”
Get full text
Article -
870
Overlapping Box Suppression and Merging Algorithms for Window-Based Object Detection
Published 2025-09-01“…Additionally, we introduce a novel Overlapping Box Merging (OBM) algorithm, which further refines detection results by combining partial detections into a single, more accurate detection. …”
Get full text
Article -
871
Optimal resource allocation for two-stage connectionless access with collision detection
Published 2019-05-01“…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
Get full text
Article -
872
Detection of attacker and location in wireless sensor network as an application for border surveillance
Published 2017-11-01“…One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. …”
Get full text
Article -
873
Bolt Loosening and Preload Loss Detection Technology Based on Machine Vision
Published 2024-12-01“…This finding lays a theoretical foundation for defining effective detection intervals in future bolt loosening recognition systems. …”
Get full text
Article -
874
A Community Detection Algorithm Based on Topology Potential and Spectral Clustering
Published 2014-01-01“…Community detection is of great value for complex networks in understanding their inherent law and predicting their behavior. …”
Get full text
Article -
875
Symmetry constrained neural networks for detection and localization of damage in metal plates
Published 2025-06-01“…Upon training a neural network to analyze time-series data of the material response, which displayed damage-reflective features whenever the plate-guided waves interacted with a contact load, we achieved a model that detected with >99% accuracy in addition to a model that localized with 2.58 ± 0.12 mm mean distance error. …”
Get full text
Article -
876
Enhancing cyber threat detection with an improved artificial neural network model
Published 2025-03-01“…Compared to traditional approaches, the augmented ANN’s 92% accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity, brought about by the addition of a random weight and standard scaler. Considering the ever-evolving nature of cybersecurity threats, this study introduces a revolutionary intrusion detection method.…”
Get full text
Article -
877
Generalized Likelihood Block Detection for SPAD-Based Underwater VLC System
Published 2020-01-01“…The proposed receiver can detect the data sequence without any prior knowledge of the channel and the background radiation. …”
Get full text
Article -
878
A Defect Detection Algorithm for Optoelectronic Detectors Utilizing GLV-YOLO
Published 2025-02-01“…To meet the demands of real-time and accurate defect detection, this paper introduces an optimization algorithm based on the GLV-YOLO model tailored for photodetector defect detection in manufacturing settings. …”
Get full text
Article -
879
Multiple Sclerosis Lesion Detection Using Constrained GMM and Curve Evolution
Published 2009-01-01“…This paper focuses on the detection and segmentation of Multiple Sclerosis (MS) lesions in magnetic resonance (MRI) brain images. …”
Get full text
Article -
880
Detecting Dynamic States of Temporal Networks Using Connection Series Tensors
Published 2020-01-01“…Here we propose a new method for detecting dynamic states in temporal networks using connection series (i.e., time series of connection status) between nodes. …”
Get full text
Article