-
481
-
482
Prediction models for Mtb infection among adolescent and adult household contacts in high tuberculosis incidence settings.
Published 2025-01-01“…Tuberculosis preventive therapy (TPT) is highly effective, but implementation is hindered by limited accessibility of diagnostic tests aimed at detecting Mycobacterium tuberculosis (Mtb) infection. …”
Get full text
Article -
483
Intravitreal Injections in Arc Sterile Setting: Safety Profile after More Than 10,000 Treatments
Published 2020-01-01“…To report the occurrence of endophthalmitis and other complications after intravitreal injections (IVIs) in the Arc Sterile setting. Methods. A retrospective study that enrolled all patients who underwent IVIs between November 2017 and March 2019, collecting data about the patient’s gender and age, type of injected drug, diagnosis, other ocular pathologies, physician and possible occurrence of endophthalmitis, or other complications. …”
Get full text
Article -
484
-
485
Landiolol bolus application for tachycardic dysrhythmia in the prehospital EMS setting – An observational study of a novel concept
Published 2025-07-01“…No allergic reactions, relevant bradycardias or cardiac arrests were detected immediately after Landiolol administration. …”
Get full text
Article -
486
-
487
-
488
Graph convolution network for fraud detection in bitcoin transactions
Published 2025-04-01“…We have selected the Elliptic Bitcoin Dataset. This data set is a graph data set generated from an anonymous blockchain. …”
Get full text
Article -
489
Outlier Detection and Explanation Method Based on FOLOF Algorithm
Published 2025-05-01“…Subsequently, the FCM objective function is employed to prune the dataset to extract a candidate set of outliers. Finally, a weighted local outlier factor detection algorithm computes the degree of anomaly for each sample in the candidate set. …”
Get full text
Article -
490
Image recoloring detection based on inter-channel correlation
Published 2022-10-01“…Image recoloring is an emerging editing technique that can change the color style of an image by modifying pixel values.With the rapid proliferation of social networks and image editing techniques, recolored images have seriously hampered the authenticity of the communicated information.However, there are few works specifically designed for image recoloring.Existing recoloring detection methods still have much improvement space in conventional recoloring scenarios and are ineffective in dealing with hand-crafted recolored images.For this purpose, a recolored image detection method based on inter-channel correlation was proposed for conventional recoloring and hand-crafted recoloring scenarios.Based on the phenomenon that there were significant disparities between camera imaging and recolored image generation methods, the hypothesis that recoloring operations might destroy the inter-channel correlation of natural images was proposed.The numerical analysis demonstrated that the inter-channel correlation disparities can be used as an important discriminative metric to distinguish between recolored images and natural images.Based on such new prior knowledge, the proposed method obtained the inter-channel correlation feature set of the image.The feature set was extracted from the channel co-occurrence matrix of the first-order differential residuals of the differential image.In addition, three detection scenarios were assumed based on practical situations, including scenarios with matching and mismatching between training-testing data, and scenario with hand-crafted recoloring.Experimental results show that the proposed method can accurately identify recolored images and outperforms existing methods in all three hypothetical scenarios, achieving state-of-the-art detection accuracy.In addition, the proposed method is less dependent on the amount of training data and can achieve fairly accurate prediction results with limited training data.…”
Get full text
Article -
491
Web Traffic Anomaly Detection Using Isolation Forest
Published 2024-11-01“…This led to the addition of derived columns in the training set and manually labeled testing set that was then used to compare the anomaly detection performance of the Isolation Forest model with that of cybersecurity experts. …”
Get full text
Article -
492
Study on user behavior profiling in insider threat detection
Published 2018-12-01“…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. …”
Get full text
Article -
493
Network intrusion detection based on improved KNN algorithm
Published 2025-08-01“…Therefore, a new three-branch decision soft increment K-nearest neighbor algorithm is proposed, representing the class cluster as an interval set. The interval set’s upper, boundary, and lower bound correspond to the positive, boundary, and negative domains generated by the three-branch decision. …”
Get full text
Article -
494
Visual Scheme for the Detection of Mobile Attack on WSN Simulator
Published 2013-08-01“…This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.…”
Get full text
Article -
495
Deep learning-enhanced signal detection for communication systems.
Published 2025-01-01“…Based on this, the study innovatively combines Multiple Input Multiple Output (MIMO) with orthogonal frequency division multiplexing technology to construct a data-driven detection system. The system adopts a Multi-DNN method with a dual-DNN cascade structure and mixed activation function design to optimize the channel estimation and signal detection coordination process of the MIMO part. …”
Get full text
Article -
496
FOA-BDNet: A behavior detection algorithm for elevator maintenance personnel based on first-order deep network architecture
Published 2024-11-01“…Experiments show that the detection accuracy rate on the self-built data set in this paper is 98.68%, which is 4.41% higher than that of the latest target detection model YOLOv8-s, and the reasoning speed reaches 69.51fps/s, which can be easily deployed in common edge devices and meet the real-time detection requirements for the unsafe behaviors of elevator scene maintenance personnel.…”
Get full text
Article -
497
Automated detection of bicycle helmets using deep learning
Published 2024-12-01“…In this paper, we develop and test a computer vision-based detection method that can be applied to traffic video data. …”
Get full text
Article -
498
Nonnegative Matrix Factorizations Performing Object Detection and Localization
Published 2012-01-01“…In this paper, we present a prototype system based on some nonnegative factorization algorithms, which differ in the additional properties added to the nonnegative representation of data, in order to investigate if any additional constraint produces better results in general object detection via nonnegative matrix factorizations.…”
Get full text
Article -
499
A fear detection method based on palpebral fissure
Published 2021-10-01“…Three hundred sixty images were derived from horror-thriller-murder movies based on IMDb. This data set was utilized to generate the proposed pattern. …”
Get full text
Article -
500
Driver and Path Detection through Time-Series Classification
Published 2018-01-01Get full text
Article