-
1281
Recent Advances of Guided Mode Resonant Sensors Applied to Cancer Biomarker Detection
Published 2025-04-01“…Additionally, it aims to provide researchers valuable insights for developing GMR sensors capable of detecting cancer biomarkers outside the laboratory environment.…”
Get full text
Article -
1282
A Short History of (Orbital) Decay: Roman’s Prospects for Detecting Dying Planets
Published 2025-01-01“…Assuming a constant stellar tidal dissipation factor, ${Q}_{* }^{{\prime} }$ , of 10 ^6 , we predict ∼5–10 detections. We additionally consider an empirical period-dependent parameterization of ${Q}_{* }^{{\prime} }\propto {P}^{-3}$ and find a substantially suppressed yield. …”
Get full text
Article -
1283
Detecting anomalies in traffic data using a flexible semi-parametric model
Published 2025-05-01“…We employed a Generalized Additive Model (GAM) to detect non-standard data segments successfully. …”
Get full text
Article -
1284
Analysis of Conventional Direct Detection and Coherent Optical Receivers in Optical Access Networks
Published 2024-11-01“…The findings demonstrated that coherent detection markedly enhances receiver sensitivity by approximately 3 dB compared to direct detection, thereby augmenting the capacity of optical fronthaul networks despite the elevated cost. …”
Get full text
Article -
1285
Harnessing Electrostatic Forces: A Review of Bees as Bioindicators for Particulate Matter Detection
Published 2025-04-01Get full text
Article -
1286
Artificial Intelligence in Cable Fault Detection and Localization: Recent Advances and Research Challenges
Published 2025-07-01“…With the large-scale integration of new power systems and distributed generators (DGs), cable fault detection and localization face numerous challenges, where artificial intelligence (AI) techniques demonstrate significant advantages. …”
Get full text
Article -
1287
TADBD: a sensitive and fast method for detection of typologically associated domain boundaries
Published 2020-07-01“…Here, we present TAD boundary detection (TADBD), a sensitive and fast computational method for detection of TAD boundaries on Hi-C contact matrix. …”
Get full text
Article -
1288
Efficient class‐agnostic obstacle detection for UAV‐assisted waterway inspection systems
Published 2024-12-01“…This system uses a class‐agnostic version of the YOLOv7 detector, which is capable of detecting objects regardless of its class. Additionally, through the usage of the GPS data of the drone and camera parameters, the location of the objects are pinpointed with 0.58 m Distance Root Mean Square. …”
Get full text
Article -
1289
AS1411-Templated Fluorescent Cu Nanomaterial’s Synthesis and Its Application to Detecting Melamine
Published 2020-01-01“…Under the optimized conditions, the quenching fluorescence intensities of copper nanomaterials showed a good linear relationship with the concentration of melamine in the range of 50 μmol/L–120 μmol/L, and the correlation coefficient was 0.9823. In addition, the method was successfully applied in the detection of melamine in milk samples. …”
Get full text
Article -
1290
Modern Detection of Prostate Cancer's Bone Metastasis: Is the Bone Scan Era Over?
Published 2012-01-01Get full text
Article -
1291
Cable fault detection based on enhanced spread spectrum time domain reflectometry
Published 2025-02-01“…Spread spectrum time domain reflectometry (SSTDR) is applicable for cable fault detection, effectively ensuring the safety of power generation systems. …”
Get full text
Article -
1292
File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks
Published 2024-12-01“…The results of the testing show that the implementation of Wazuh and the file integrity monitoring module can real-time detect malicious activities and file additions, so that it can be used to mitigate cyberattacks.…”
Get full text
Article -
1293
Detecting Keratoconus by Using SVM and Decision Tree Classifiers with the Aid of Image Processing
Published 2019-12-01“…Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. …”
Get full text
Article -
1294
Study on Support Vector Machine-Based Fault Detection in Tennessee Eastman Process
Published 2014-01-01“…SVM algorithm combined with kernel function has the nonlinear attribute and can better handle the case where samples and attributes are massive. In addition, with forehand optimizing the parameters using the cross-validation technique, SVM can produce high accuracy in fault detection. …”
Get full text
Article -
1295
A Metal-Assisted Silicon Slot Waveguide for Highly Sensitive Gas Detection
Published 2017-01-01“…A metal-assisted silicon slot waveguide for highly sensitive gas detection is proposed. To show the superiority of the proposed structure, the optical confinement factor in the gas region and the sensitivity are theoretically investigated using the 2-D vector finite element method. …”
Get full text
Article -
1296
Research Progress on Video-based Abnormal Behavior Detection in the Grain Storage Industry
Published 2025-05-01“…Utilizing in-silo surveillance video to detect and analyze the behavior of workers is a crucial technical measure to ensure safe operations. …”
Get full text
Article -
1297
Harnessing Large Language Models and Deep Neural Networks for Fake News Detection
Published 2025-04-01“…By integrating these approaches, we improve fake news detection, making it more accurate and interpretable. …”
Get full text
Article -
1298
Fluorescent labeling of asbestos fiber for enhanced asbestos detection under fluorescence microscopy
Published 2025-05-01“…The application of fluorescence microscopy (FM) for detecting micro- and nano-scale inorganic materials has historically been limited by the lack of specific fluorescent probes. …”
Get full text
Article -
1299
DETECTION OF RICE WEEVIL LIFE STAGES IN RICE SEEDS USING RADIOGRAPHIC TECHNIQUES
Published 2025-01-01“…The objective of this study was detect the developmental stages of S. oryzae (Coleoptera: Curculionidae) using X-rays. …”
Get full text
Article -
1300
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
Published 2015-06-01“…Additionally, it analyzes malicious behaviors and permissions to increase detection accuracy. …”
Get full text
Article