-
381
Method for Detecting Tiny Defects on Machined Surfaces of Mechanical Parts Based on Object Recognition
Published 2025-02-01“…Initially, referencing the network architectures of Resnet and Yolo, an image detection network was designed featuring a shared encoder, a classification decoder, and a localization decoder. …”
Get full text
Article -
382
A magnetic epitope-imprinted microsphere used for selective separation and rapid detection of SHV-type β-lactamases in bacteria: a novel strategy of antimicrobial resistance detect...
Published 2024-11-01“…Based on this, an initial drug option scheme can be quickly formulated for antimicrobial therapy. …”
Get full text
Article -
383
Residual stresses in cold-formed steel sections: An overview of influences and measurement techniques
Published 2025-02-01“…This paper reviews current design methods for CFS, focusing on the impact of initial imperfections. It also examines various techniques for measuring residual stress in CFS sections, including analytical, experimental, and numerical approaches. …”
Get full text
Article -
384
Dominant Symmetry Plane Detection for Point-Based 3D Models
Published 2020-01-01“…In this paper, a symmetry detection algorithm for three-dimensional point cloud model based on weighted principal component analysis (PCA) is proposed. …”
Get full text
Article -
385
Hyperspectral Anomaly Detection Based on Intrinsic Image Decomposition and Background Subtraction
Published 2025-01-01“…Finally, the weight map is fused with the initial anomaly detection map to obtain the final anomaly detection result. …”
Get full text
Article -
386
A Method for Community Detection of Complex Networks Based on Hierarchical Clustering
Published 2015-06-01“…Finding out community structure helps to extract useful information in complex networks, so the research on community detection is becoming a hotspot in recent years. There are two remarkable problems in detecting communities. …”
Get full text
Article -
387
Exploring LLM Embedding Potential for Dementia Detection Using Audio Transcripts
Published 2025-07-01“…To compare the performance of the five approaches, a stratified 5-fold cross-validation was conducted; the best results were obtained with BERT embeddings (84.73% accuracy) closely followed by the simpler Tf–Idf approach (83.73% accuracy) and the state-of-the-art model Linq-Embed-Mistral (83.54% accuracy), while Gemma-2B and GloVe embeddings yielded slightly lower performances (80.91% and 78.11% accuracy, respectively). Contrary to initial expectations—that richer semantic and contextual embeddings would substantially outperform simpler frequency-based methods—the competitive accuracy of Tf–Idf suggests that the choice and frequency of the words used might be more important than semantic or contextual information in Alzheimer’s detection. …”
Get full text
Article -
388
Fuzzy clustering method based on genetic algorithm in intrusion detection study
Published 2009-01-01“…Regarding the problem that fuzzy c-means algorithm(FCM) was sensitive to the initial value and converging to the local infinitesimal point easily, applies genetic algorithm to optimization of the FCM algorithm.Firstly, the results of FCM will be sent to the genetic algorithm for optimization, then the new results again used in FCM to obtain the most advantage of the overall situation.The experimental result shows that the algorithm can effectively detect anomaly intrusions behavior of special target and be better than FCM algorithm, and have a strong global optimization and faster convergence speed.…”
Get full text
Article -
389
Development of transient ischemic attack risk prediction model suitable for initializing a learning health system unit using electronic medical records
Published 2024-12-01“…This model is essential for initiating the first ML-enabled learning health system (LHS) unit designed for routine and equitable TIA screening and early detection across broad populations. …”
Get full text
Article -
390
Computational analysis for wax detection in deepwater pipelines using nuclear techniques
Published 2023-07-01“…To solve it, one must monitor the wax formation in its initial stage. In this light, nuclear techniques are an effective alternative solution, as they can detect characteristics of materials or substances in an indirect and non-invasive manner. …”
Get full text
Article -
391
Active learning for deep object detection by fully exploiting unlabeled data
Published 2023-12-01“…Object detection is a challenging task that requires a large amount of labeled data to train high-performance models. …”
Get full text
Article -
392
Evaluating the effectiveness of participatory science dog teams to detect devitalized Spotted Lanternfly (Lycorma delicatula) egg masses
Published 2025-07-01“…The spotted lanternfly (Lycorma delicatula, SLF) is an invasive planthopper first detected in the United States in 2014, with initial sightings in Pennsylvania. …”
Get full text
Article -
393
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
394
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
395
Optimized molecule detection in localization microscopy with selected false positive probability
Published 2025-01-01“…Abstract Single-molecule localization microscopy (SMLM) allows imaging beyond the diffraction limit. Detection of molecules is a crucial initial step in SMLM. …”
Get full text
Article -
396
Application of Sinusoidal Function in Financial Crisis Early Warning and Detection System
Published 2025-01-01“…Therefore, this paper studies the application of sine signal function in financial crisis early warning and detection system. According to the principle of “different frequencies are uncorrelated,” the derivation process of a single sinusoidal signal with noise in the crisis warning period is also applicable to the case of multiple sinusoidal signals, so the program can also be used to detect multiple sinusoidal signals in the crisis warning period at the same time. …”
Get full text
Article -
397
Three-dimensional Orbital Architectures and Detectability of Adjacent Companions to Hot Jupiters
Published 2025-01-01Get full text
Article -
398
Implementation of a Methodology for the Detection of Biochemical Markers in Type 1 Tyrosinemia
Published 2023-11-01“…<strong><br />Objective:</strong> to implement a work methodology for the detection of marker metabolites of type 1 tyrosinemia. …”
Get full text
Article -
399
-
400
Enhancing credit card fraud detection: highly imbalanced data case
Published 2024-12-01“…Given the inherent imbalance in fraud detection data, feature selection must be done with an enhanced focus. …”
Get full text
Article