-
1181
A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks
Published 2025-07-01“…In next-generation Low-Earth-Orbit (LEO) satellite networks, securing inter-satellite communication links (ISLs) through strong authentication is essential due to the network’s dynamic and distributed structure. …”
Get full text
Article -
1182
AI‐ECG for early detection of atrial fibrillation: First‐year results from a stroke prevention study in Shimizu, Japan
Published 2025-08-01“…Abstract Background An artificial intelligence algorithm‐guided electrocardiogram (AI‐ECG) has been developed to detect atrial fibrillation (AF) in patients with sinus rhythm (SR). …”
Get full text
Article -
1183
3D-Printed PLA Hollow Microneedles Loaded with Chitosan Nanoparticles for Colorimetric Glucose Detection in Sweat Using Machine Learning
Published 2025-07-01“…The developed biosensor system exhibited a good linear response range toward glucose (0.025−0.375 mM), a low limit of detection (0.023 mM), a limit of quantification (0.078 mM), high specificity, and recovery rates ranging between 86–112%. …”
Get full text
Article -
1184
A multicenter pragmatic implementation study of AI-ECG-based clinical decision support software to identify low LVEF: Clinical trial design and methods
Published 2025-06-01“…Background: Artificial intelligence (AI) enabled algorithms can detect or predict cardiovascular conditions using electrocardiogram (ECG) data. …”
Get full text
Article -
1185
An Encrypted Speech Integrity Authentication Method: Focus on Fine-Grained Tampering Detection and Tampering Recovery Under High Tamper Ratios
Published 2025-02-01“…This paper proposes an encrypted speech integrity authentication method that can simultaneously address both of problems, and its main contributions are as follows: (1) A 2-least significant bit (2-LSB)-based dual fragile watermarking method is proposed to improve tampering detection performance. This method constructs correlations between encrypted speech sampling points by 2-LSB-based fragile watermarking embedding method and achieves low-error tampering detection of tampered sampling points based on four types of fragile watermarkings. (2) A speech self-recovery model based on residual recovery-based linear interpolation (R2-Lerp) is proposed to achieve tampering recovery under high tampering ratios. …”
Get full text
Article -
1186
Detection of mixed infection from bacterial whole genome sequence data allows assessment of its role in Clostridium difficile transmission.
Published 2013-01-01“…Given the relatively low density of single nucleotide polymorphisms within bacterial sequence data, direct reconstruction of mixed infection haplotypes from current short-read sequence data is not consistently possible. …”
Get full text
Article -
1187
Lateral Flow Loop-Mediated Isothermal Amplification Test with Stem Primers: Detection of Cryptosporidium Species in Kenyan Children Presenting with Diarrhea
Published 2018-01-01“…The SAM-1 LAMP detected 27/39. On detection of Cryptosporidium DNA in 67 clinical samples, the stem LFD LAMP detected 16 samples and SAM-2 LAMP 14 and nested PCR identified 11. …”
Get full text
Article -
1188
MODEL OF ORGANIZATION OF KIDNEY CANCER EARLY DIAGNOSIS
Published 2021-05-01“…The model included a population questionnaire to identify risk factors and algorithm of patient routing («roadmap») with suspected kidney cancer for in-depth examination and treatment. …”
Get full text
Article -
1189
A Fish Target Identification and Counting Method Based on DIDSON Sonar and YOLOv5 Model
Published 2024-08-01“…In order to more accurately and quickly identify and count underwater fish targets, and to address the issues of excessive reliance on manual processes and low processing efficiency in the identification and counting of fish targets using sonar data, a method based on DIDSON and YOLOv5 for fish target identification and counting is proposed. …”
Get full text
Article -
1190
A combination of urinary biomarker panel and PancRISK score for earlier detection of pancreatic cancer: A case-control study.
Published 2020-12-01“…We have previously described a promising biomarker panel (LYVE1, REG1A, and TFF1) for earlier detection of PDAC in urine. Here, we aimed to establish the accuracy of an improved panel, including REG1B instead of REG1A, and an algorithm for data interpretation, the PancRISK score, in additional retrospectively collected urine specimens. …”
Get full text
Article -
1191
Identification of Mattic Epipedon Degradation on the Northeastern Qinghai–Tibetan Plateau Using Hyperspectral Data
Published 2025-06-01“…The characteristic bands were concentrated in the visible light range (446–450 nm) and short-wave infrared range (2134 nm, 2267–2269 nm), which are closely related to the spectral responses of organic carbon and mineral components. (2) Spectral reflectance was significantly negatively correlated with moisture content, and model accuracy decreased as moisture content increased. (3) After correction using the EPO algorithm, the model accuracy for the high-moisture group improved by 13.2–16.7%, whereas that for the low-moisture group (<15%) decreased by 7.5%, verifying 15% moisture content as the critical threshold for water interference. …”
Get full text
Article -
1192
-
1193
Rapid differentiation of patients with lung cancers from benign lung nodule based on dried serum Fourier-transform infrared spectroscopy combined with machine learning algorithms
Published 2025-08-01“…Lung cancer (LC) is associated with poor 5-year survival rates when diagnosed at advanced stages. While low-dose computed tomography (LDCT) screening enables earlier detection, its high false-positive rate, primarily due to benign lung nodules (BLN), necessitates more accurate diagnostic tools. …”
Get full text
Article -
1194
A Robust Multispectral Reconstruction Network from RGB Images Trained by Diverse Satellite Data and Application in Classification and Detection Tasks
Published 2025-05-01“…This study further reveals the potential of multispectral image reconstruction from natural color RGB images and its effectiveness in target detection, which promotes low-cost visual perception of intelligent unmanned systems.…”
Get full text
Article -
1195
Water tank and swimming pool detection based on remote sensing and deep learning: Relationship with socioeconomic level and applications in dengue control.
Published 2021-01-01“…With mosaics of images obtained by a 12.1 MP Canon PowerShot S100 (5.2 mm focal length) carried by unmanned aerial vehicles, we developed deep learning algorithms in the scope of computer vision for the detection of water tanks and swimming pools. …”
Get full text
Article -
1196
ENHANCEMENT OF SENSOR PANEL TACTILE TOUCH INTERFACE
Published 2025-03-01“…Additionally, the algorithm's low computational requirements make it suitable for use in low-power devices, such as those powered by batteries or energy harvesting systems. …”
Get full text
Article -
1197
Advances in Aircraft Skin Defect Detection Using Computer Vision: A Survey and Comparison of YOLOv9 and RT-DETR Performance
Published 2025-04-01“…Beyond a detailed review, we experimentally evaluate the accuracy and feasibility of existing low-cost, easily deployable hardware (drone) and software solutions (computer vision algorithms). …”
Get full text
Article -
1198
-
1199
A novel hybrid fuzzy logic and federated learning framework for enhancing cybersecurity and fraud detection in IoT-enabled metaverse transactions
Published 2025-06-01“…The optimized federated learning model for IoT devices implements lightweight algorithms with hierarchical aggregation that reduce computational and communication overhead to enhance fraud detection capabilities. …”
Get full text
Article -
1200
Multi-layered based network security defense system
Published 2007-01-01“…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
Get full text
Article