Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
221
Are Your Kidneys Ok? Detect Early to Protect Kidney Health
Published 2025-03-01“…using serum creatinine to estimate kidney function and urine albumin to assess for kidney and endothelial damage. …”
Get full text
Article -
222
A Benchmark Review of YOLO Algorithm Developments for Object Detection
Published 2025-01-01“…You Only Look Once (YOLO) has established itself as a prominent object detection framework due to its excellent balance between speed and accuracy. …”
Get full text
Article -
223
Lightweight detection algorithms for small targets on unmanned mining trucks
Published 2025-07-01“…Accurate target category detection is a prerequisite for obstacle avoidance decisions, and model lightweighting facilitates deployment in resource-limited conditions. …”
Get full text
Article -
224
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
Get full text
Article -
225
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
Get full text
Article -
226
Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations.
Published 2023-01-01“…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
Get full text
Article -
227
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
228
A rapid and accurate method for Helicobacter pylori detection via integrating LAMP assay with CRISPR/Cas12b detection by one-step in one-pot
Published 2025-08-01“…Conventional diagnostic methods, such as PCR and culture, require specialized equipment and expertise, limiting their applicability in resource-limited settings. There is a pressing need for a rapid, cost-effective, and user-friendly diagnostic platform for HP detection, particularly in point-of-care settings.MethodsWe developed an integrated detection platform combining loop-mediated isothermal amplification (LAMP) with the CRISPR/Cas12b system in a single, one-step, one-pot reaction. …”
Get full text
Article -
229
Assessment of the Integrated Communicable Disease Surveillance and Response System in Thamar Governorate, Yemen
Published 2024-12-01“…The questionnaire included two sections: assessment of core activities of the IDSR system (structure, case confirmation, data reporting, data analysis, outbreak investigation, epidemic preparedness, epidemic responses, feedback) and assessment of support functions of the IDSR system (supervision, training, coordination, logistics and resources). …”
Article -
230
Detection of water surface targets based on improved Deformable DETR
Published 2025-06-01“…Objective With technological advancements and the increasing demand for water resource exploration, water surface target detection plays a crucial role in various applications, such as ship navigation and maritime safety. …”
Get full text
Article -
231
Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection
Published 2025-02-01“…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
Get full text
Article -
232
A Study of Mixed Non-Motorized Traffic Flow Characteristics and Capacity Based on Multi-Source Video Data
Published 2024-10-01Get full text
Article -
233
RpiBeh offers a versatile open source solution for rodent behavior tracking and closed loop interventions
Published 2025-08-01“…Existing commercial systems are costly and inflexible for customization, while current open-source tools are often lack of real-time functionality and suffer from steep learning curve. …”
Get full text
Article -
234
A lightweight object detection approach based on edge computing for mining industry
Published 2024-11-01“…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
Get full text
Article -
235
A Self-Adaptive Particle Swarm Optimization Based Multiple Source Localization Algorithm in Binary Sensor Networks
Published 2015-08-01“…Then the maximum likelihood estimator is employed to establish the objective function which is used to estimate the location of sources. …”
Get full text
Article -
236
Anisotropic Diffusion of e± in Pulsar Halos over Multiple Coherence of Magnetic Fields
Published 2025-01-01“…Also, the halo’s morphology may appear less asymmetric, especially after being smoothed by the point-spread function of instruments. This largely relaxes the tension between the asymmetric morphology of halos predicted by the model and the lack of apparent asymmetric halos detected so far. …”
Get full text
Article -
237
Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis
Published 2020-01-01“…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
Get full text
Article -
238
Performance Analysis of Diabetes Detection Using Machine Learning Classifiers
Published 2024-10-01Get full text
Article -
239
Toward global rooftop PV detection with Deep Active Learning
Published 2024-12-01“…It is crucial to know the location of rooftop PV systems to monitor the regional progress toward sustainable societies and to ensure the integration of decentralized energy resources into the electricity grid. However, locations of PV are often unknown, which is why a large number of studies have proposed variants of Deep Learning to detect PV panels in remote sensing data using supervised Deep Learning. …”
Get full text
Article -
240
A Lightweight Citrus Object Detection Method in Complex Environments
Published 2025-05-01“…Aiming at the limitations of current citrus detection methods in complex orchard environments, especially the problems of poor model adaptability and high computational complexity under different lighting, multiple occlusions, and dense fruit conditions, this study proposes an improved citrus detection model, YOLO-PBGM, based on You Only Look Once v7 (YOLOv7). …”
Get full text
Article