-
321
Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis
Published 2020-01-01“…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
Get full text
Article -
322
Rapid urban health security assessment tool: a new resource for evaluating local-level public health preparedness
Published 2020-06-01“…Plans and policies for responding to public health emergencies are generally framed at higher levels of governance, but developing, improving and sustaining the capacities necessary for implementing these policies is a direct function of local-level authorities. Evaluating local-level public health capacities is an important process for identifying strengths and weaknesses that can impact the preparedness for, detection of and response to health security threats. …”
Get full text
Article -
323
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
Get full text
Article -
324
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
325
Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection
Published 2025-02-01“…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
Get full text
Article -
326
Polymethacrylate Sphere-Based Assay for Ultrasensitive miRNA Detection
Published 2020-01-01“…Furthermore, MiR159 presence, which is known to be inversely correlated to breast cancer incidence and progression, was successfully detected in a competitive assay, which is promising for upgrading the current assay to clinical use.…”
Get full text
Article -
327
Difficulties in generating specific antibodies for immunohistochemical detection of nitrosylated tubulins.
Published 2013-01-01“…We suggest that different tagging strategies or alternative methods such as fluorescence resonance energy transfer techniques might be more successful.…”
Get full text
Article -
328
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
Get full text
Article -
329
Distribution and functional significance of KLF15 in mouse cerebellum
Published 2025-01-01Get full text
Article -
330
The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables
Published 2025-01-01“…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
Get full text
Article -
331
-
332
Advances in the detection of virulence genes of Staphylococcus aureus originate from food
Published 2020-03-01Get full text
Article -
333
Detection of the Trajectories of Moving Rectilinearly Air Targets in the Secondary Processing of Radar Information
Published 2019-12-01“…Introduction. The primary functions of secondary processing of radar information are to detect and maintain the trajectories of air targets (AT). …”
Get full text
Article -
334
Reduced graphene oxide-based electrochemical aptasensor for the multiplexed detection of imidacloprid, thiamethoxam, and clothianidin in food samples
Published 2025-03-01“…Nonetheless, no aptasensor was reported for the multiplexed detection of neonicotinoids. Herein, a graphene-based electrochemical biosensor was fabricated with three aptamers for the detection of imidacloprid, thiamethoxam, and clothianidin. …”
Get full text
Article -
335
MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation
Published 2025-01-01“…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
Get full text
Article -
336
Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions
Published 2025-01-01“…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
Get full text
Article -
337
Survey on key technologies for protective DNS service
Published 2024-10-01“…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
Get full text
Article -
338
Improving dependability with low power fault detection model for skinny-hash.
Published 2024-01-01“…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
Get full text
Article -
339
Study on lightweight strategies for L-YOLO algorithm in road object detection
Published 2025-03-01“…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
Get full text
Article -
340
The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping
Published 2025-03-01“…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
Get full text
Article