-
1481
-
1482
Optimal number of the examined lymph nodes for different N stages in colorectal cancer
Published 2025-08-01“…Moreover, the restricted cubic splines (RCS) method was used to detect inflection points within the risk function and to investigate the correlation between the number of examined lymph nodes (ELNs) and OS. …”
Get full text
Article -
1483
Polarization of road target detection under complex weather conditions
Published 2024-12-01“…The optimal polarization parameters should be adaptively adjusted to weather conditions, angles and target features, whereas most existing research employs handcrafted polarization parameters without considering actual complex detection requirements, which are unable to adaptively adjust the polarization feature enhancement methods. …”
Get full text
Article -
1484
Deep Learning-Based Crack Detection on Cultural Heritage Surfaces
Published 2025-07-01“…This study employs a deep learning-based object detection model, GoogleNet, to identify cracks in cultural heritage images. …”
Get full text
Article -
1485
The usefulness of presepsin in the early detection of anastomotic leakage after esophagectomy
Published 2025-01-01“…Conclusions: Presepsin levels on PODs 5 and 7 effectively detect anastomotic leakage after esophagectomy, making it a valuable, simple, non-invasive early detection test.…”
Get full text
Article -
1486
Crack detection in beam-like structures by nonlinear harmonic identification
Published 2014-07-01Get full text
Article -
1487
Satellite-Based Forest Stand Detection Using Artificial Intelligence
Published 2025-01-01“…Several models, including YOLOv8, YOLOv5 and Mask R-CNN, were tested and compared. An optimal model was selected based on parameters such as detection accuracy, total training time, and the precision of labeling detected image elements. …”
Get full text
Article -
1488
Crack detection in beam-like structures by nonlinear harmonic identification
Published 2014-07-01Get full text
Article -
1489
MIMO Detection for High Order QAM by Canonical Dual Approach
Published 2015-01-01Get full text
Article -
1490
Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
Published 2025-06-01Get full text
Article -
1491
Rice Plant Disease Detection using Convolutional Neural Networks
Published 2025-05-01Get full text
Article -
1492
Prevalence and associations of hypertension detection, treatment and control in Cape Town
Published 2025-05-01“…Prevalence of hypertension detection among participants with hypertension (62.4%), treatment among the detected (75.6%) and control among the treated (57.1%) were sub-optimal, with better rates in women (73.6%, 80.0%, 59.1%, respectively) than in men (41.6%, 61.2%, 48.8%) (p < 0.05 for detection and treatment). …”
Get full text
Article -
1493
Robust Symbol Detection in Large-Scale Overloaded NOMA Systems
Published 2021-01-01“…It is also shown via simulations that the technique can be integrated with existing iterative detection-and-decoding (IDD) methods, resulting in accelerated convergence.…”
Get full text
Article -
1494
PV-YOLO: Lightweight YOLO for Photovoltaic Panel Fault Detection
Published 2023-01-01“…The CBAM attention mechanism is added to enhance the effective features and improve the detection accuracy of small objects. The label assignment mechanism is optimized, and the SIoU loss functionis used to improve the uneven distribution of samples and accelerate network convergence. …”
Get full text
Article -
1495
Design and optimization of a compact dual band metal insulator metal filter for high sensitivity refractive index sensing using particle swarm optimization
Published 2025-07-01“…The integration of the PSO algorithm ensures optimal performance across both wavelength bands, making the sensor a promising candidate for applications in biosensing, chemical detection, and environmental monitoring. …”
Get full text
Article -
1496
Advanced Nanoformulations for Detection and Removal of Poly- and Perfluoroalkyl Substances (PFAS)
Published 2025-04-01“…Nano-enabled techniques also offer improved performance over conventional methods. In this review, the details of the detection and removal of PFAS, as well as their optimization and limitations, and future perspectives are discussed. …”
Get full text
Article -
1497
POCT Detection of Pseudomonas aeruginosa by PGM and Application of Preventing Nosocomial Infection of Bronchoscopy
Published 2024-01-01“…The PGM represents a convenient and accurate quantitative detection method suitable for potential clinical diagnostic applications.…”
Get full text
Article -
1498
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
1499
Detection of cervical cell based on multi-scale spatial information
Published 2025-01-01“…To tackle this problem effectively, we propose a cervical cell detection method that utilizes multi-scale spatial information. …”
Get full text
Article -
1500
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article