Suggested Topics within your search.
Suggested Topics within your search.
-
1561
Electrochemical Detection of Sequence-Specific DNA with the Amplification of Gold Nanoparticles
Published 2011-01-01“…Scanning electron microscopy (SEM) and electrochemical impedance spectra (EIS) were used to investigate the film assembly process. The DNA hybridization events were monitored by differential pulse voltammetry (DPV), and adriamycin was used as the electrochemical indicator. …”
Get full text
Article -
1562
Road Damage Detection Using Yolov9-Based Imagery
Published 2025-05-01“…An annotated dataset of road images was used during the model training and testing process. The results show that the YOLOv9 model can accurately detect road damage. …”
Get full text
Article -
1563
Calibration and uncertainty quantification for deep learning-based drought detection
Published 2025-06-01“…Deep learning models have recently succeeded in detecting extreme climate events and promise to uncover and understand droughts further. …”
Get full text
Article -
1564
Prospects for detecting the couplings of axion-like particle with neutrinos at the CEPC
Published 2024-10-01“…Abstract We explore the possibility of detecting the couplings of axion-like particle (ALP) with leptons from their loop-level impact on the ALP couplings to electroweak (EW) gauge bosons via the signal process at the circular electron positron collider (CEPC) and obtain prospective sensitivities to the ALP-lepton couplings. …”
Get full text
Article -
1565
Detecting phishing gangs via taint analysis on the Ethereum blockchain
Published 2023-01-01“…Experimental results indicate that the proposed framework can be used to build a uniform platform to monitor every account on the Ethereum blockchain for early warning of phishing scams and detection of the phishers' money laundering and cashing process.…”
Get full text
Article -
1566
Optimized Detection Algorithm for Vertical Irregularities in Vertical Curve Segments
Published 2024-11-01“…The inertial reference method was then applied to process the acceleration and relative displacement data between the detection beam and the track, yielding virtual irregularities. …”
Get full text
Article -
1567
Study on PV Defect Detection Based on CWE YOLOv8
Published 2025-01-01“…A lightweight EfficientHead detection head is also introduced to boost the model’s accuracy and robustness in complex detection scenarios. …”
Get full text
Article -
1568
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
1569
Knowledge Error Detection via Textual and Structural Joint Learning
Published 2025-02-01“…Current methods for knowledge graph error detection primarily focus on graph structure and overlook the importance of textual information in error detection. …”
Get full text
Article -
1570
Can artificial ıntelligence detect the anti-aging effect of rhinoplasty?
Published 2025-04-01Get full text
Article -
1571
A Method for Detecting Tomato Maturity Based on Deep Learning
Published 2024-11-01“…The modeling of global and local information is realized through the self-attention mechanism, which improves the generalization ability and feature extraction ability of the model, thereby bringing higher detection accuracy. Secondly, the C2f convolution in the neck section is replaced with Distribution Shifting Convolution, so that the model can better process spatial information and further improve the object detection accuracy. …”
Get full text
Article -
1572
Myocarditis Detection Using Proximal Policy Optimization and Mutual Learning
Published 2024-09-01“…To address class imbalance, a proximal policy optimization (PPO)-based algorithm is utilized, significantly improving the training process by preventing abrupt policy shifts and stabilizing them. …”
Get full text
Article -
1573
Early detection of risky spatio-temporal congestion in urban traffic
Published 2025-01-01“…In this article, we develop a detection method for risky congestion based on its spatio-temporal evolution feature, which can detect risky spatio-temporal congestion clusters (SCCs) when they are small. …”
Get full text
Article -
1574
Detecting differential transmissibilities that affect the size of self-limited outbreaks.
Published 2014-10-01“…Our analysis is based on a branching process model that permits statistical comparison of both the strength and heterogeneity of transmission for two distinct types of cases. …”
Get full text
Article -
1575
Mixed Gas Detection and Temperature Compensation Based on Photoacoustic Spectroscopy
Published 2024-01-01“…Experimental results show that, compared to the traditional SVM algorithm, the KNN-SVM algorithm performs better in gas classification prediction, with an accuracy rate of 99.167% and an AUC indicator of 99.375%, enhancing the accuracy of gas detection. In response to the impact of temperature on the system during the experimental process, a WOA-BP temperature compensation model was established to compensate for temperature in gas concentration detection. …”
Get full text
Article -
1576
Capacity Constraint Analysis Using Object Detection for Smart Manufacturing
Published 2024-10-01“…The increasing adoption of Deep Learning (DL)-based Object Detection (OD) models in smart manufacturing has opened up new avenues for optimizing production processes. …”
Get full text
Article -
1577
Automated detection of hospital outbreaks: A systematic review of methods.
Published 2017-01-01“…<h4>Results</h4>Twenty-nine studies were included. The detection algorithms were grouped into 5 categories: simple thresholds (n = 6), statistical process control (n = 12), scan statistics (n = 6), traditional statistical models (n = 6), and data mining methods (n = 4). …”
Get full text
Article -
1578
Sysmon event logs for machine learning-based malware detection
Published 2025-12-01“…Malware poses a significant threat to modern computing environments, necessitating advanced detection techniques that can adapt to evolving attack methods. …”
Get full text
Article -
1579
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
Get full text
Article -
1580
Weed detection on embedded systems using computer vision algorithms
Published 2025-02-01“…They allow one to automate data analysis process and to make decisions faster. However, the weed detection task in agriculture requires not only high recognition accuracy, but also fast computations on portable devices with low memory availability that makes it possible to embed computer vision systems on unmanned aerial vehicles (UAVs). …”
Get full text
Article