Suggested Topics within your search.
Suggested Topics within your search.
-
521
Detection of Toxoplasma gondii Infection in Rodents, Shrews and Cats in Unguja Island, Zanzibar
Published 2024-10-01“…Fifty-one seropositive samples from cats were detected where eight were from pet cats and 43 from stray cats. …”
Get full text
Article -
522
-
523
Screening Germplasms and Detecting Quantitative Trait Loci for High Sucrose Content in Soybean
Published 2024-10-01Get full text
Article -
524
Detecting and identifying Schistosoma infections in snails and aquatic habitats: A systematic review.
Published 2021-03-01“…Ability to detect schistosome infections in snails or in the water is needed if control and elimination programs hope to succeed. …”
Get full text
Article -
525
-
526
The impact of artificial intelligence on financial auditing: the case of Algeria
Published 2025-06-01Get full text
Article -
527
Serological Detection of West Nile Virus in Single-Humped Camels in Northern Nigeria
Published 2024-10-01Get full text
Article -
528
Leveraging AI to automate detection and quantification of extrachromosomal DNA to decode drug responses
Published 2025-02-01Get full text
Article -
529
DeepRD:LSTM-based Siamese network for Android repackaged applications detection
Published 2018-08-01“…The state-of-art techniques in Android repackaging detection relied on experts to define features,however,these techniques were not only labor-intensive and time-consuming,but also the features were easily guessed by attackers.Moreover,the feature representation of applications which defined by experts cannot perform well to the common types of repackaging detection,which caused a high false negative rate in the real detection scenario.A deep learning-based repackaged applications detection approach was proposed to learn the program semantic features automatically for addressing the above two issues.Firstly,control and data flow analysis were taken for applications to form a sequence feature representation.Secondly,the sequence features were transformed into vectors based on word embedding model to train a Siamese LSTM network for automatically program feature learning.Finally,repackaged applications were detected based on the similarity measurement of learned program features.Experimental results show that the proposed approach achieves a precision of 95.7% and false negative rate of 6.2% in an open sourced dataset AndroZoo.…”
Get full text
Article -
530
LiDAR-Based Detection of Urban Trees Using a Backpack System
Published 2025-07-01Get full text
Article -
531
Early Fault Detection in FOC Driven Induction Motors: A Case Study
Published 2024-01-01Get full text
Article -
532
Detection of African swine fever virus in pork products brought to Taiwan by travellers
Published 2019-01-01Get full text
Article -
533
Evaluating Machine Learning Algorithms for Financial Fraud Detection: Insights from Indonesia
Published 2025-02-01Get full text
Article -
534
Enhancing Bee Mite Detection with YOLO: The Role of Data Augmentation and Stratified Sampling
Published 2025-06-01Get full text
Article -
535
Interpretable Deep Learning for Pneumonia Detection Using Chest X-Ray Images
Published 2025-01-01Get full text
Article -
536
-
537
Ultra tough and high resilience mechanochromic fibres for real world stress detection
Published 2025-03-01Get full text
Article -
538
Research on industrial control system intrusion detection method based on simulation modelling
Published 2017-07-01“…At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.…”
Get full text
Article -
539
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
540
MAGECODE: Machine-Generated Code Detection Method Using Large Language Models
Published 2024-01-01“…Consequently, various machine-generated text (MGT) detection methods, developed from metric-based and model-based approaches, were proposed and shown to be highly effective. …”
Get full text
Article