-
221
Methods for Detecting Subvisible Particles in Medicines (Review)
Published 2025-07-01“…The microscopy) method, based on counting subvisible particles on the surface of a dried membrane filter after passing drug solutions through the membrane, is used to identify subvisible particles if the counting light blocking method cannot be used. The microscopic method with flow visualization and the scanning electron microscopy method are not used for routine control of medicines, but are important additional tools for determining the features of the granulometric composition and detecting undesirable contamination by foreign particles in medicines.CONCLUSION. …”
Get full text
Article -
222
Identification of a Conserved Linear Epitope on the p54 Protein of African Swine Fever Virus
Published 2025-06-01“…Moreover, a blocking ELISA based on the mAb 1F9 was established for detecting ASFV-specific antibodies in clinical serum samples, achieving a coincidence rate exceeding 95%. …”
Get full text
Article -
223
Performance Analysis of Generalized Quadrature Spatial Modulation with Quasi-Orthogonal Space-Time Block Codes Under Nakagami m-Fading Channels
Published 2025-06-01“…To address the impact of imperfect CSIR, the paper introduces three new QR decomposition-based detection techniques. These methods are specifically designed to reduce errors and enhance reliability in conditions where traditional maximum likelihood (ML) detection performs poorly. …”
Get full text
Article -
224
Robust tampering detection and localization of composite image
Published 2017-08-01“…Aiming at the problem of tamper detection of composite image of natural images and highly simulated computer-generated images,a method of extracting image block color and texture feature based on differential histogram and local binary texture descriptor in YCbCr color space was proposed.By training posterior probability support vector machine,the image block to be measured was identified.In the case of non-overlapping block,the approximate tampering area was general judged,then the block was discriminated by pixel in the region,ultimately the accurate location of tampering area was achieved.The experimental results show that the recognition rate of 128 dpi×128 dpi image blocks is 94.75%,which is higher than other methods.The tapering region of the synthesized image can be precisely positioned,and the rotation and scaling operation show good coercivity.…”
Get full text
Article -
225
-
226
Reduction of Vision-Based Models for Fall Detection
Published 2024-11-01“…Due to the limitations that falls have on humans, early detection of these becomes essential to avoid further damage. …”
Get full text
Article -
227
Tumor detection on bronchoscopic images by unsupervised learning
Published 2025-01-01“…To address this issue, a datasets for intratracheal tumor detection has been constructed to simulate the diagnostic level of experienced specialists, and a Knowledge Distillation-based Memory Feature Unsupervised Anomaly Detection (KD-MFAD) model was proposed to learn from this simulated experience. …”
Get full text
Article -
228
Hierarchical Information-guided robotic grasp detection
Published 2025-05-01“…Moreover, these methods struggle to capture long-range dependencies and non-local self-similarity, critical for accurate grasp detection. To address these issues, we propose GraspFormer, a novel method for robotic grasp detection. …”
Get full text
Article -
229
Lightweight blasthole image detection and positioning method
Published 2025-03-01“…Compared with the minimum baseline model, the Mv3-SCDn blasthole algorithm has the best blasthole detection effect, the number of blasthole detection model parameters is reduced by 7.17%, and the detection speed is increased by 45.44%. …”
Get full text
Article -
230
-
231
-
232
Establishment of an indirect ELISA method for detection of human cytomegalovirus
Published 2025-06-01“…An indirect ELISA method for HCMV was established by optimizing the detection conditions such as serum dilution ratio and the type of blocking solution, and the cut-off value of this method was determined; coefficient of variation (CV) was calculated to verify the repeatability of the method; the sensitivity and specificity of the method were assessed by detecting the serum samples from the patients with positive HCMV IgG, HSV-1, HSV-2, and EBV at various dilution ratios; the consistency rate between HCMV indirect ELISA and cytomegalovirus IgG ELISA kit was assessed by analyzing the serum samples of 349 healthy volunteers undergoing physical examination at the outpatient service. …”
Get full text
Article -
233
Design of Dual-wire Bidirectional Blocking Solid-state Circuit Breaker for Deep-sea Medium Voltage DC/DC Converter Based on SiC JFET
Published 2023-12-01“…In the context of deep-sea medium voltage DC/DC converter applications—an environment that necessitates the black start of DC/DC and the integration with the leakage detection functionality of the underwater cables—this paper proposes a design approach for a dual-wire bidirectional blocking SSCB (DWBB SSCB). …”
Get full text
Article -
234
Small target detection algorithm based on SAHI-Improved-YOLOv8 for UAV imagery: A case study of tree pit detection
Published 2025-12-01“…To address these challenges, this paper proposes a small target detection algorithm based on SAHI-ImprovedYOLOv8 for detecting tree pits, which includes Slicing Aided Hyper Inference (SAHI), Focal loss, Spatial Pyramid Pooling Concurrent Spatial Pyramid Convolution (SPPCSPC), and Convolutional Block Attention Module (CBAM). …”
Get full text
Article -
235
-
236
Effectiveness of face masks in blocking the transmission of SARS-CoV-2: A preliminary evaluation of masks used by SARS-CoV-2-infected individuals.
Published 2022-01-01“…Our findings suggest the blocking of virus transmission by different types of masks and reinforce the use of masks by both infected and non-infected individuals.…”
Get full text
Article -
237
A Comprehensive CNN Model for Age-Related Macular Degeneration Classification Using OCT: Integrating Inception Modules, SE Blocks, and ConvMixer
Published 2024-12-01“…<b>Methods</b>: The proposed method (PM) combines modified Inception modules, Depthwise Squeeze-and-Excitation Blocks, and ConvMixer architecture. Its effectiveness was evaluated on two datasets: a private dataset with 2316 images and the public Noor dataset. …”
Get full text
Article -
238
-
239
Detectability constraints on meso-scale structure in complex networks.
Published 2025-01-01“…Nestedness is closely related to core-periphery and is similarly restricted to only be detectable under certain conditions. We then derive a general equivalence between optimising block modularity and maximum likelihood estimation of the parameters of the degree corrected Stochastic Block Model. …”
Get full text
Article -
240