-
141
Merging Surface Plasmon Optical Detection with Electronic Sensing
Published 2024-04-01Get full text
Article -
142
Image Processing for Laser Impact Detection in Shooting Simulators
Published 2025-03-01“…Moreover, wired setups limit their use in outdoor environments due to the lack of access to a power source. This study developed an image-processing-based method to replace live ammunition with a laser-emitting device. …”
Get full text
Article -
143
Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia
Published 2025-01-01“…Information on the frequency of a given detection limit, and the cumulative probability of detection, are provided as a function of instrument spectral resolution and noise. …”
Get full text
Article -
144
Advances in preparation and application of coal-based functional nanomaterials
Published 2025-07-01“…However, traditional coal utilization as a primary carbon emission source fundamentally conflicts with the “dual-carbon” strategic goals. …”
Get full text
Article -
145
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
Get full text
Article -
146
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
Get full text
Article -
147
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
148
Introduction of AI Technology for Objective Physical Function Assessment
Published 2024-11-01“…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
Get full text
Article -
149
Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection
Published 2025-02-01“…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
Get full text
Article -
150
Fast detection method for radionuclides based on Sequential Bayesian approach
Published 2025-01-01“…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
Get full text
Article -
151
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…Research has been sourced from multiple databases and screened using predefined inclusion criteria. …”
Get full text
Article -
152
A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells
Published 2024-01-01“…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
Get full text
Article -
153
Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions
Published 2025-01-01“…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
Get full text
Article -
154
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
155
Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin
Published 2025-08-01“…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
Get full text
Article -
156
The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping
Published 2025-03-01“…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
Get full text
Article -
157
Automated quantification reveals hyperglycemia inhibits endothelial angiogenic function.
Published 2014-01-01Get full text
Article -
158
LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model
Published 2025-06-01“…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
Get full text
Article -
159
An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions
Published 2018-06-01“…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
Get full text
Article -
160
Enhanced object detection in low-visibility haze conditions with YOLOv9s.
Published 2025-01-01“…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
Get full text
Article