Suggested Topics within your search.
Suggested Topics within your search.
-
561
Metagenomic and phylogenetic analyses reveal gene-level selection constrained by bacterial phylogeny, surrounding oxalate metabolism in the gut microbiota
Published 2025-06-01“…The frc gene was primarily allocated to the Pseudomonodota phylum, particularly the Bradyrhizobium genus, which is a species capable of utilizing oxalate as a sole carbon and energy source. Collectively evidence provides strong support that, for oxalate metabolism, evolutionary selection occurs at the gene level, through horizontal gene transfer, rather than at the species level.IMPORTANCEA critical function of the gut microbiota is to neutralize dietary toxins, such as oxalate, which is highly prevalent in plant-based foods and is not degraded by host enzymes. …”
Get full text
Article -
562
Testing the functionality and contact error of a GPS‐based wildlife tracking network
Published 2013-12-01Get full text
Article -
563
Serum albumin nanoparticles: Ligand functionalization for enhanced targeted therapeutics in precision medicine
Published 2025-09-01“…Serum albumin-based nanoparticles, derived from bovine (BSA) and human (HSA) sources, have emerged as versatile carriers in drug delivery systems due to their intrinsic biocompatibility, biodegradability, and amenability to surface modification. …”
Get full text
Article -
564
-
565
Automated Dead Chicken Detection in Poultry Farms Using Knowledge Distillation and Vision Transformers
Published 2024-12-01“…Then, a deep learning classifier, enhanced through knowledge distillation, confirms whether the detected stationary object is indeed a chicken. EfficientNet-B0 is employed as the teacher model, while DeiT-Tiny functions as the student model, balancing high accuracy and computational efficiency. …”
Get full text
Article -
566
The Ecosystem Services Assessment of Wetlands based on the Classification of Hydrological-ecological Structures and Functions (Case study: Shadegan Wetland)
Published 2019-06-01“…Selecting Shadegan International Wetland as a case study in this research, the ecosystem services approach have been applied to ecological conditions assessment of the wetland based on biophysical structures, processes, functions and ecosystem services in a hydrological-ecological framework, which provides a valuable tool for optimal allocation of wetland resources and their effective management, as well as adopting rational and sustainable policies. 2-Materials and Methods The proposed framework can be considered as a hierarchical approach based on the characteristics of biophysical structure, functions and ecosystem services. …”
Get full text
Article -
567
Morphological and functional characteristics of Trichinella sp. larvae in bears and badgers in the Kirov Region
Published 2022-03-01“…For postmortem diagnosis of trichinellosis in the obtained bears and badgers, we can use trichinelloscopy and peptolysis methods which are aimed at detecting infection sources and preventing zoonosis in humans.…”
Get full text
Article -
568
Leveraging large language models for automated detection of velopharyngeal dysfunction in patients with cleft palate
Published 2025-03-01“…BackgroundHypernasality, a hallmark of velopharyngeal insufficiency (VPI), is a speech disorder with significant psychosocial and functional implications. Conventional diagnostic methods rely heavily on specialized expertise and equipment, posing challenges in resource-limited settings. …”
Get full text
Article -
569
MSSA: multi-stage semantic-aware neural network for binary code similarity detection
Published 2025-01-01“…Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection. …”
Get full text
Article -
570
Employing SAE-GRU deep learning for scalable botnet detection in smart city infrastructure
Published 2025-04-01“…These findings enhance the understanding of IoT security by offering a scalable and resource-efficient solution for botnet detection. The functional investigation establishes a foundation for future research into adaptive security mechanisms that address emerging threats and highlights the practical potential of advanced deep learning techniques in safeguarding next-generation smart city ecosystems.…”
Get full text
Article -
571
A Lightweight Network for UAV Multi-Scale Feature Fusion-Based Object Detection
Published 2025-03-01“…To tackle the issues of small target sizes, missed detections, and false alarms in aerial drone imagery, alongside the constraints posed by limited hardware resources during model deployment, a streamlined object detection approach is proposed to enhance the performance of YOLOv8s. …”
Get full text
Article -
572
Network security traffic detection and legal supervision based on adaptive metric learning algorithm
Published 2025-09-01Get full text
Article -
573
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01“…As it ignored the detection of ramp-up and pulsing type of application layer DDoS (App-DDoS) attacks in existing flow-based App-DDoS detection methods,an effective detection method for multi-type App-DDoS was proposed.Firstly,in order to fast count the number of HTTP GET for users and further support the calculation of feature parameters applied in detection method,the indexes of source IP address in multiple time windows were constructed by the approach of Hash function.Then the feature parameters by combining SVM classifiers with the structure of partial binary tree were trained hierarchically,and the App-DDoS detection method was proposed with the idea of traversing binary tree and feedback learning to distinguish non-burst normal flow,burst normal flow and multi-type App-DDoS flows.The experimental results show that compared with the conventional SVM-based and naïve-Bayes-based detection methods,the proposed method has more excellent detection performance and can distinguish specific App-DDoS types through subdividing attack types and training detection model layer by layer.…”
Get full text
Article -
574
Quantifying the spatial impact of an invasive Acacia on ecosystem functioning using remote sensing
Published 2025-01-01Get full text
Article -
575
GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm
Published 2025-05-01“…Printed circuit boards (PCBs) are an indispensable part of electronic products, and their quality is crucial to the operational integrity and functional reliability of these products. Currently, existing PCB defect detection models are beset with issues such as excessive model size and parameter complexity, rendering them ill-equipped to meet the requirements for lightweight deployment on mobile devices. …”
Get full text
Article -
576
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
577
RSWD-YOLO: A Walnut Detection Method Based on UAV Remote Sensing Images
Published 2025-04-01“…Furthermore, to optimize the detection performance under hardware resource constraints, we apply knowledge distillation to RSWD-YOLO, thereby further improving the detection accuracy. …”
Get full text
Article -
578
-
579
Automatic detection of human gait events: a simple but versatile 3D algorithm
Published 2025-05-01Get full text
Article -
580
A lightweight UAV target detection algorithm based on improved YOLOv8s model
Published 2025-05-01“…Furthermore, the original loss function is replaced with SIoU to enhance detection accuracy. …”
Get full text
Article