-
1741
Highway subgrade stability prediction model based on depth separation convolutional fusion network
Published 2025-06-01“…To promote the ability of high-precision highway maintenance and detection and solve the situation of false detection or missing detection of road defects, it is necessary to establish a monitoring mechanism of multi-scale feature fusion. …”
Get full text
Article -
1742
Hematological features of mine-blast trauma, accompanied by acubarotrauma, among servicemen - participants in high-intensity combat operations
Published 2024-12-01“…All patients were fixed on the psychotraumatic circumstances of hostilities. Clinical blood analysis was performed on an automatic haematology analyser ABX Micros ES 60 of the company Horiba ABX. …”
Get full text
Article -
1743
Comparative characteristics of the clinical and laboratory features of the primary Sjogren’s syndrome associated with anticentromere antibodies and the “classic” subtype of the dis...
Published 2021-05-01“…A combination of pSS and SSc was diagnosed in 37 patients, and they were excluded from further analysis. We compared clinical and laboratory features in patients with pSS-ACA+ (n=82) and ACA-negative pSS (pSS-ACA–, n=64) and characterized lymphomas in the pSS-ACA+ (n = 14) and pSS-ACA– (n=10) groups.Results and discussion. …”
Get full text
Article -
1744
Making a Real-Time IoT Network Intrusion-Detection System (INIDS) Using a Realistic BoT–IoT Dataset with Multiple Machine-Learning Classifiers
Published 2025-02-01“…In our research, we have developed and trained a real-time intrusion-detection system for IoT networks that can detect multiple modern and traditional threats with high accuracy. …”
Get full text
Article -
1745
DTNLS: 3D Point Cloud Segmentation Based on 2D Image and 3D Point Cloud Double Texture Feature
Published 2025-01-01“…The DTNLS method first uses the color texture feature of the image to segment the pixels and then obtains the clustering center and segmentation boundary outline. 3D LiDAR point cloud texture segmentation takes the clustering center obtained above as the diffusion source, diffuses outwards along the ring LiDAR line, finds the LiDAR point cloud texture boundary features near the image segmentation boundary contour, and finally realizes 3D point cloud segmentation. …”
Get full text
Article -
1746
Wavelet Analysis-Based Texture Analysis of Ceramic Surface Images
Published 2021-01-01“…The main research includes the extraction and evaluation of damage features of ceramic surface morphology by applying wavelet methods, the extraction of damage features in surface contours by using wavelet analysis, and the quantitative evaluation of damage degree by using damage rate and damage mean spacing. …”
Get full text
Article -
1747
Emotional and Aesthetic Values as Basis for Popularity of TV Programs: Contrastive-Comparative Experience
Published 2022-04-01“…The article is devoted to the problem of identifying the competitive advantages of journalistic TV works. The analysis technique is based on a comparison of the format-forming features of two TV programs that are similar in terms of display subject, subject matter, functions, genres, and other features. …”
Get full text
Article -
1748
-
1749
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…For rules generation NSL-KDD Data Set is used which include, KDDTrain and KDDTest, 125973 and 22544 records respectively, each record consists of 41 features and one class attribute for specifying normal and abnormal connection (complete train and test data are used), In order to get rid of redundancy and inappropriate features Principal Component Analysis (PCA) is used for selecting (5) features. …”
Get full text
Article -
1750
Enhanced Fetal Arrhythmia Classification by Non-Invasive ECG Using Cross Domain Feature and Spatial Differences Windows Information
Published 2025-01-01“…This study presents a new cross-domain feature extraction method that incorporates temporal relationships between consecutive windows, improving feature representation by examining the correlation between neighboring windows. …”
Get full text
Article -
1751
Self-Supervised Multi-Task Learning for the Detection and Classification of RHD-Induced Valvular Pathology
Published 2025-03-01“…Embedding visualisations, using both Uniform Manifold Approximation Projection (UMAP) and t-distributed Stochastic Neighbor Embedding (t-SNE), revealed distinct clusters for all tasks in both models, indicating the effective capture of the discriminative features of the echocardiograms. This study demonstrates the potential of using self-supervised multi-task learning for automated echocardiogram analysis, offering a scalable and efficient approach to improving RHD diagnosis, especially in resource-limited settings.…”
Get full text
Article -
1752
Urgent natural foci infections transmitted by ticks in Saint-Petersburg
Published 2018-12-01“…Purpose: to conduct a comparative analysis and to identify the epidemiological and clinical features of tick-borne encephalitis (TBE) and Lyme borreliosis as a mono- and coinfections in St. …”
Get full text
Article -
1753
The diagnostic value of convolutional neural networks in thyroid cancer detection using ultrasound images
Published 2025-05-01Get full text
Article -
1754
Non-Contact Laser Ultrasound Detection of Internal Gas Defects in Lithium-Ion Batteries
Published 2025-03-01“…Through both time-domain and frequency-domain analysis of the ultrasonic features, the results demonstrate that the signal amplitude attenuation characteristics of ultrasound in media with acoustic impedance mismatches can be used for precise detection and quantitative characterization of gas defect regions within the battery. …”
Get full text
Article -
1755
Multitask Change-Aware Network and Semisupervised Enhanced Multistep Training for Semantic Change Detection
Published 2025-01-01“…Compared to binary change detection, which only predicts the location of changes, SCD provides detailed from-to change information, helping to gain a comprehensive understanding and analysis of land cover and land use. …”
Get full text
Article -
1756
-
1757
Incipient Fault Detection of Rolling Element Bearings Based on Deep EMD-PCA Algorithm
Published 2020-01-01“…Due to the relatively weak early fault characteristics of rolling bearings, the difficulty of early fault detection increases. For unsolving this problem, an incipient fault detection method based on deep empirical mode decomposition and principal component analysis (Deep EMD-PCA) is proposed. …”
Get full text
Article -
1758
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
1759
Epileptic Seizure Detection in EEG Signals Using Machine Learning and Deep Learning Techniques
Published 2024-01-01“…Machine Learning (ML) and Deep learning (DL) algorithms have emerged as powerful feature extraction and classification tools in EEG signal analysis. …”
Get full text
Article -
1760
OVALYTICS: Enhancing Offensive Video Detection with YouTube Transcriptions and Advanced Language Models
Published 2025-06-01“…In response, this work presents OVALYTICS (Offensive Video Analysis Leveraging YouTube Transcriptions with Intelligent Classification System), a comprehensive framework that introduces novel integrations of advanced technologies for offensive video detection. …”
Get full text
Article