期刊文献+
共找到222,018篇文章
< 1 2 250 >
每页显示 20 50 100
Collision off-axis position dependence of relativistic nonlinear Thomson inverse scattering of an excited electron in a tightly focused circular polarized laser pulse
1
作者 王禹博 杨青屿 +2 位作者 常一凡 林宗熠 田友伟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期344-354,共11页
This paper presents a novel view of the impact of electron collision off-axis positions on the dynamic properties and relativistic nonlinear Thomson inverse scattering of excited electrons within tightly focused, circ... This paper presents a novel view of the impact of electron collision off-axis positions on the dynamic properties and relativistic nonlinear Thomson inverse scattering of excited electrons within tightly focused, circularly polarized laser pulses of varying intensities. We examine the effects of the transverse ponderomotive force, specifically how the deviation angle and speed of electron motion are affected by the initial off-axis position of the electron and the peak amplitude of the laser pulse. When the laser pulse intensity is low, an increase in the electron's initial off-axis distance results in reduced spatial radiation power, improved collimation, super-continuum phenomena generation, red-shifting of the spectrum's harmonic peak, and significant symmetry in the radiation radial direction. However, in contradiction to conventional understandings,when the laser pulse intensity is relatively high, the properties of the relativistic nonlinear Thomson inverse scattering of the electron deviate from the central axis, changing direction in opposition to the aforementioned effects. After reaching a peak, these properties then shift again, aligning with the previous direction. The complex interplay of these effects suggests a greater nuance and intricacy in the relationship between laser pulse intensity, electron position, and scattering properties than previously thought. 展开更多
关键词 relativistic nonlinear Thomson inverse scattering off-axis collision radiation angle distribution tightly focused laser pulse
下载PDF
Simultaneous detection of CH_(4)and CO_(2)through dual modulation off-axis integrated cavity output spectroscopy
2
作者 刘艺璇 王周兵 +3 位作者 韦欣欣 王静静 孟鑫 毛桂林 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期468-475,共8页
This study established a novel method for the simultaneous detection of two-component gases.Radio frequency(RF)white noise disturbance laser current and wavelength modulation were simultaneously used to improve the of... This study established a novel method for the simultaneous detection of two-component gases.Radio frequency(RF)white noise disturbance laser current and wavelength modulation were simultaneously used to improve the off-axis integrated cavity output spectroscopy technique,and a high-precision dual modulation OA-ICOS(RF-WM-OA-ICOS)system was established.The two laser beams were coupled into one laser beam that was applied incident to the cavity of RF-WM-OA-ICOS system.The second harmonic signals of CH_(4)and CO_(2)gas simultaneously appeared in the rising or falling edge of a triangular wave.This method was used to measure CH_(4)and CO_(2)with different concentrations.The results indicated that the proposed system has high stability and can accurately and simultaneously measure the concentrations of CH_(4)and CO_(2),with an optimal integration time of 220 s.The minimum detection limit was 10 ppb for CH_(4)and 1.5 ppm for CO_(2).The corresponding noise equivalent absorption sensitivity values were calculated as 2.67×10^(-13)cm^(-1)·Hz^(-1/2)and 5.18×10^(-11)cm^(-1)·Hz^(-1/2),respectively.The proposed dual-component gas simultaneous detection method can also be used for high-precision simultaneous detection of other gases.Therefore,this study may serve as a reference for developing portable multicomponent gas analyzers. 展开更多
关键词 off-axis integrated cavity output spectroscopy wavelength modulation radio frequency(RF)white noise simultaneous detection
下载PDF
A dual-RPA based lateral flow strip for sensitive,on-site detection of CP4-EPSPS and Cry1Ab/Ac genes in genetically modified crops 被引量:1
3
作者 Jinbin Wang Yu Wang +7 位作者 Xiuwen Hu Yifan Chen Wei Jiang Xiaofeng Liu Juan Liu Lemei Zhu Haijuan Zeng Hua Liu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期183-190,共8页
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSP... Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field. 展开更多
关键词 Genetically modifi ed crops On-site detection Lateral fl ow test strips Dual recombinase polymerase amplification (RPA)
下载PDF
Characteristic Analysis of Off-Axis Meta-Lens
4
作者 Jingaowa Hu Yang Liu +4 位作者 Shangnan Zhao Lingjie Wang Haokun Ye Jianping Zhang Xin Zhang 《Optics and Photonics Journal》 2023年第6期87-96,共10页
Meta-lens are a new type of planar optical element that can flexibly manipulate the phase, polarization and amplitude of the beam, and are currently receiving a great deal of attention as they are easier to process an... Meta-lens are a new type of planar optical element that can flexibly manipulate the phase, polarization and amplitude of the beam, and are currently receiving a great deal of attention as they are easier to process and manufacture. Off-axis meta-lens are a special type of meta-lens with a certain degree of dispersion that can be used as a beam-splitting element, providing a unique and feasible way to realize micro-miniature instruments. We analyze the effects of different numerical apertures and off-axis angles on the spectral resolution, focusing efficiency and simulation results of off-axis meta-lens to provide ideas for subsequent research and application of off-axis meta-lens. A number of off-axis meta-lens with parameters NA = 0.408 α = 13°, NA = 0.18 α = 13°<sup></sup> and NA = 0.408 α = 20° were simulated through Lumerical software. The results show that the off-axis angle is related to the resolution;the larger the angle, the better the spectral resolution but the lower the focusing efficiency;when the numerical aperture is smaller, the smaller the coverage of the phase distribution, which will lead to a larger deviation between simulation and theory. The designer needs to balance the numerical aperture, off-axis angle and other parameters reasonably according to the requirements in order to achieve the desired effect. The findings of this study have important reference values for the theoretical analysis of off-axis meta-lens and the design of parameters in practical applications. . 展开更多
关键词 Meta-Lens off-axis Meta-Lens Simulation Analysis
下载PDF
Target Detection Algorithm in Foggy Scenes Based on Dual Subnets
5
作者 Yuecheng Yu Liming Cai +3 位作者 Anqi Ning Jinlong Shi Xudong Chen Shixin Huang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1915-1931,共17页
Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the ima... Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the image by the universal detection network.Thus,a dual subnet based on multi-task collaborative training(DSMCT)is proposed in this paper.Firstly,in the training phase,the Gated Context Aggregation Network(GCANet)is used as the supervisory network of YOLOX to promote the extraction of clean information in foggy scenes.In the test phase,only the YOLOX branch needs to be activated to ensure the detection speed of the model.Secondly,the deformable convolution module is used to improve GCANet to enhance the model’s ability to capture details of non-homogeneous fog.Finally,the Coordinate Attention mechanism is introduced into the Vision Transformer and the backbone network of YOLOX is redesigned.In this way,the feature extraction ability of the network for deep-level information can be enhanced.The experimental results on artificial fog data set FOG_VOC and real fog data set RTTS show that the map value of DSMCT reached 86.56%and 62.39%,respectively,which was 2.27%and 4.41%higher than the current most advanced detection model.The DSMCT network has high practicality and effectiveness for target detection in real foggy scenes. 展开更多
关键词 Target detection fog target detection YOLOX twin network multi-task learning
下载PDF
Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method
6
作者 CaiMing Liu Yan Zhang +1 位作者 Zhihui Hu Chunming Xie 《Computers, Materials & Continua》 SCIE EI 2024年第2期2361-2389,共29页
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune de... Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune detection model for network intrusion data based on a quantitative matching method.The proposed model defines the detection process by using network data and decimal values to express features and artificial immune mechanisms are simulated to define immune elements.Then,to improve the accuracy of similarity calculation,a quantitative matching method is proposed.The model uses mathematical methods to train and evolve immune elements,increasing the diversity of immune recognition and allowing for the successful detection of unknown intrusions.The proposed model’s objective is to accurately identify known intrusions and expand the identification of unknown intrusions through signature detection and immune detection,overcoming the disadvantages of traditional methods.The experiment results show that the proposed model can detect intrusions effectively.It has a detection rate of more than 99.6%on average and a false alarm rate of 0.0264%.It outperforms existing immune intrusion detection methods in terms of comprehensive detection performance. 展开更多
关键词 Immune detection network intrusion network data signature detection quantitative matching method
下载PDF
SDH-FCOS:An Efficient Neural Network for Defect Detection in Urban Underground Pipelines
7
作者 Bin Zhou Bo Li +2 位作者 Wenfei Lan Congwen Tian Wei Yao 《Computers, Materials & Continua》 SCIE EI 2024年第1期633-652,共20页
Urban underground pipelines are an important infrastructure in cities,and timely investigation of problems in underground pipelines can help ensure the normal operation of cities.Owing to the growing demand for defect... Urban underground pipelines are an important infrastructure in cities,and timely investigation of problems in underground pipelines can help ensure the normal operation of cities.Owing to the growing demand for defect detection in urban underground pipelines,this study developed an improved defect detection method for urban underground pipelines based on fully convolutional one-stage object detector(FCOS),called spatial pyramid pooling-fast(SPPF)feature fusion and dual detection heads based on FCOS(SDH-FCOS)model.This study improved the feature fusion component of the model network based on FCOS,introduced an SPPF network structure behind the last output feature layer of the backbone network,fused the local and global features,added a top-down path to accelerate the circulation of shallowinformation,and enriched the semantic information acquired by shallow features.The ability of the model to detect objects with multiple morphologies was strengthened by introducing dual detection heads.The experimental results using an open dataset of underground pipes show that the proposed SDH-FCOS model can recognize underground pipe defects more accurately;the average accuracy was improved by 2.7% compared with the original FCOS model,reducing the leakage rate to a large extent and achieving real-time detection.Also,our model achieved a good trade-off between accuracy and speed compared with other mainstream methods.This proved the effectiveness of the proposed model. 展开更多
关键词 Urban underground pipelines defect detection SDH-FCOS feature fusion SPPF dual detection heads
下载PDF
A self-organization formation configuration based assignment probability and collision detection
8
作者 SONG Wei WANG Tong +1 位作者 YANG Guangxin ZHANG Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期222-232,共11页
The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment pro... The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment probability is proposed to achieve the shortest overall formation path of multi-UAVs with low complexity and reduce the energy consumption.In order to avoid the collision between UAVs in the formation process,the concept of safety ball is introduced,and the collision detection based on continuous motion of two time slots and the lane occupation detection after motion is proposed to avoid collision between UAVs.Based on the idea of game theory,a method of UAV motion form setting based on the maximization of interests is proposed,including the maximization of self-interest and the maximization of formation interest is proposed,so that multi-UAVs can complete the formation task quickly and reasonably with the linear trajectory assigned in advance.Finally,through simulation verification,the multi-UAVs target assignment algorithm based on the assignment probability proposed in this paper can effectively reduce the total path length,and the UAV motion selection method based on the maximization interests can effectively complete the task formation. 展开更多
关键词 straight line trajectory assignment probability collision detection lane occupation detection maximization of interests
下载PDF
Robust Space-Time Adaptive Track-Before-Detect Algorithm Based on Persymmetry and Symmetric Spectrum
9
作者 Xiaojing Su Da Xu +1 位作者 Dongsheng Zhu Zhixun Ma 《Journal of Beijing Institute of Technology》 EI CAS 2024年第1期65-74,共10页
Underwater monopulse space-time adaptive track-before-detect method,which combines space-time adaptive detector(STAD)and the track-before-detect algorithm based on dynamic programming(DP-TBD),denoted as STAD-DP-TBD,ca... Underwater monopulse space-time adaptive track-before-detect method,which combines space-time adaptive detector(STAD)and the track-before-detect algorithm based on dynamic programming(DP-TBD),denoted as STAD-DP-TBD,can effectively detect low-speed weak targets.However,due to the complexity and variability of the underwater environment,it is difficult to obtain sufficient secondary data,resulting in a serious decline in the detection and tracking performance,and leading to poor robustness of the algorithm.In this paper,based on the adaptive matched filter(AMF)test and the RAO test,underwater monopulse AMF-DP-TBD algorithm and RAO-DP-TBD algorithm which incorporate persymmetry and symmetric spectrum,denoted as PSAMF-DP-TBD and PS-RAO-DP-TBD,are proposed and compared with the AMF-DP-TBD algorithm and RAO-DP-TBD algorithm based on persymmetry array,denoted as P-AMF-DP-TBD and P-RAO-DP-TBD.The simulation results show that the four methods can work normally with sufficient secondary data and slightly insufficient secondary data,but when the secondary data is severely insufficient,the P-AMF-DP-TBD and P-RAO-DP-TBD algorithms has failed while the PSAMF-DP-TBD and PS-RAO-DP-TBD algorithms still have good detection and tracking capabilities. 展开更多
关键词 space-time adaptive detection track before detect ROBUSTNESS persymmetric property symmetric spectrum AMF test RAO test
下载PDF
Phenotypic Detection of Enterobacterales Strains Susceptible of Producing OXA-48 Carbapenemase
10
作者 Abdoulaye Seck Abdou Diop +5 位作者 Babacar Ndiaye Assane Dieng Awa Ba Amadou Diop Chantal Mahou Douala-Djemba Thierno Abdoulaye Diallo 《Advances in Microbiology》 CAS 2024年第2期115-121,共7页
Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type O... Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type OXA-48 (Ambler class D) have been identified in Dakar. The aim of this study was to evaluate the phenotypic detection of OXA-48 CPE using a temocillin disc (30 μg). Methodology: A retrospective study was carried out at Medical Biology Laboratory of Pasteur Institute in Dakar on Ertapenem-Resistant Enterobacterales (ERE) strains isolated from 2015 to 2017. These strains were then tested with a 30 μg temocillin disc. Any strain resistant to temocillin (inhibition diameter Results: Forty-one ERE isolated during the study period were tested, of which 34 (82.9%) were OXA-48 based on phenotypic detection using temocillin disc and confirmed by PCR (100%). OXA-48 CPE strains detected were composed of Klebsiella pneumoniae (n = 14;41.2%), Enterobacter cloacae (n = 8;23.5%), Escherichia coli (n = 7, 20.5%), Citrobacter freundii (n = 3;8.8%), Cronobacter sakazakii (n = 1;3%) and Morganella morganii (n = 1;3%). Conclusion: Temocillin resistance has a good positive predictive value for detecting OXA-48 CPE by phenotypic method, confirmed by PCR. Temocillin is therefore a good marker for detection of OXA-48 CPE except Hafnia alvei. 展开更多
关键词 ERTAPENEM Temocillin Phenotypic detection Carbapenemase-Producing Enterobacterales OXA-48
下载PDF
Strengthening Network Security: Deep Learning Models for Intrusion Detectionwith Optimized Feature Subset and Effective Imbalance Handling
11
作者 Bayi Xu Lei Sun +2 位作者 Xiuqing Mao Chengwei Liu Zhiyi Ding 《Computers, Materials & Continua》 SCIE EI 2024年第2期1995-2022,共28页
In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prep... In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prepro-cessing stage and a deep learning model for accurately identifying network attacks.We have proposed four deep neural network models,which are constructed using architectures such as Convolutional Neural Networks(CNN),Bi-directional Long Short-Term Memory(BiLSTM),Bidirectional Gate Recurrent Unit(BiGRU),and Attention mechanism.These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the models,we apply various preprocessing techniques and employ the particle swarm optimization algorithm to perform feature selection on the NSL-KDD dataset,resulting in an optimized feature subset.Moreover,we address class imbalance in the dataset using focal loss.Finally,we employ the BO-TPE algorithm to optimize the hyperparameters of the four models,maximizing their detection performance.The test results demonstrate that the proposed model is capable of extracting the spatiotemporal features of network traffic data effectively.In binary and multiclass experiments,it achieved accuracy rates of 0.999158 and 0.999091,respectively,surpassing other state-of-the-art methods. 展开更多
关键词 Intrusion detection CNN BiLSTM BiGRU ATTENTION
下载PDF
A Secure and Cost-Effective Training Framework Atop Serverless Computing for Object Detection in Blasting
12
作者 Tianming Zhang Zebin Chen +4 位作者 Haonan Guo Bojun Ren Quanmin Xie Mengke Tian Yong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2139-2154,共16页
The data analysis of blasting sites has always been the research goal of relevant researchers.The rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection ... The data analysis of blasting sites has always been the research goal of relevant researchers.The rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection in the field of blasting.Serverless Computing can provide a variety of computing services for people without hardware foundations and rich software development experience,which has aroused people’s interest in how to use it in the field ofmachine learning.In this paper,we design a distributedmachine learning training application based on the AWS Lambda platform.Based on data parallelism,the data aggregation and training synchronization in Function as a Service(FaaS)are effectively realized.It also encrypts the data set,effectively reducing the risk of data leakage.We rent a cloud server and a Lambda,and then we conduct experiments to evaluate our applications.Our results indicate the effectiveness,rapidity,and economy of distributed training on FaaS. 展开更多
关键词 Serverless computing object detection BLASTING
下载PDF
Analysis of the joint detection capability of the SMILE satellite and EISCAT-3D radar 被引量:1
13
作者 JiaoJiao Zhang TianRan Sun +7 位作者 XiZheng Yu DaLin Li Hang Li JiaQi Guo ZongHua Ding Tao Chen Jian Wu Chi Wang 《Earth and Planetary Physics》 EI CSCD 2024年第1期299-306,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite European Incoherent Scatter Sciences Association(EISCAT)-3D radar joint detection
下载PDF
Finite element model updating for structural damage detection using transmissibility data
14
作者 Ahmad Izadi Akbar Esfandiari 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期87-101,共15页
This paper presents a new finite element model updating method for estimating structural parameters and detecting structural damage location and severity based on the structural responses(output-only data).The method ... This paper presents a new finite element model updating method for estimating structural parameters and detecting structural damage location and severity based on the structural responses(output-only data).The method uses the sensitivity relation of transmissibility data through a least-squares algorithm and appropriate normalization of the extracted equations.The proposed transmissibility-based sensitivity equation produces a more significant number of equations than the sensitivity equations based on the frequency response function(FRF),which can estimate the structural parameters with higher accuracy.The abilities of the proposed method are assessed by using numerical data of a two-story two-bay frame model and a plate structure model.In evaluating different damage cases,the number,location,and stiffness reduction of the damaged elements and the severity of the simulated damage have been accurately identified.The reliability and stability of the presented method against measurement and modeling errors are examined using error-contaminated data.The parameter estimation results prove the method’s capabilities as an accurate model updating algorithm. 展开更多
关键词 damage detection model updating output-only TRANSMISSIBILITY sensitivity equation
下载PDF
Microstrip Patch Antenna with an Inverted T-Type Notch in the Partial Ground for Breast Cancer Detections
15
作者 Nure Alam Chowdhury Lulu Wang +2 位作者 Md Shazzadul Islam Linxia Gu Mehmet Kaya 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1301-1322,共22页
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)... This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)todistribute around the breast phantom.The operating frequency has been observed from6–14GHzwith a minimumreturn loss of−61.18 dB and themaximumgain of current proposed antenna is 5.8 dBiwhich is flexiblewith respectto the size of antenna.After the distribution of eight antennas around the breast phantom,the return loss curveswere observed in the presence and absence of tumor cells inside the breast phantom,and these observations showa sharp difference between the presence and absence of tumor cells.The simulated results show that this proposedantenna is suitable for early detection of cancerous cells inside the breast. 展开更多
关键词 Antenna microwave wideband cancer breast phantom tumor detection
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
16
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Development of a High-throughput Sequencing Platform for Detection of Viral Encephalitis Pathogens Based on Amplicon Sequencing
17
作者 ZHANG Ya Li SU Wen Zhe +16 位作者 WANG Rui Chen LI Yan ZHANG Jun Feng LIU Sheng Hui HU Dan He XU Chong Xiao YIN Jia Yu YIN Qi Kai HE Ying LI Fan FU Shi Hong NIE Kai LIANG Guo Dong TAO Yong XU Song Tao MA Chao Feng WANG Huan Yu 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2024年第3期294-302,共9页
Objective Viral encephalitis is an infectious disease severely affecting human health.It is caused by a wide variety of viral pathogens,including herpes viruses,flaviviruses,enteroviruses,and other viruses.The laborat... Objective Viral encephalitis is an infectious disease severely affecting human health.It is caused by a wide variety of viral pathogens,including herpes viruses,flaviviruses,enteroviruses,and other viruses.The laboratory diagnosis of viral encephalitis is a worldwide challenge.Recently,high-throughput sequencing technology has provided new tools for diagnosing central nervous system infections.Thus,In this study,we established a multipathogen detection platform for viral encephalitis based on amplicon sequencing.Methods We designed nine pairs of specific polymerase chain reaction(PCR)primers for the 12 viruses by reviewing the relevant literature.The detection ability of the primers was verified by software simulation and the detection of known positive samples.Amplicon sequencing was used to validate the samples,and consistency was compared with Sanger sequencing.Results The results showed that the target sequences of various pathogens were obtained at a coverage depth level greater than 20×,and the sequence lengths were consistent with the sizes of the predicted amplicons.The sequences were verified using the National Center for Biotechnology Information BLAST,and all results were consistent with the results of Sanger sequencing.Conclusion Amplicon-based high-throughput sequencing technology is feasible as a supplementary method for the pathogenic detection of viral encephalitis.It is also a useful tool for the high-volume screening of clinical samples. 展开更多
关键词 Viral encephalitis Amplicon sequencing High-throughput sequencing Multipathogen detection
下载PDF
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
18
作者 Amardeep Singh Hamad Ali Abosaq +5 位作者 Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud AlMazroa 《Computers, Materials & Continua》 SCIE EI 2024年第4期857-873,共17页
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats. 展开更多
关键词 Cloud encryption RAAS ENSEMBLE threat detection deep learning CYBERSECURITY
下载PDF
YOLO-DD:Improved YOLOv5 for Defect Detection
19
作者 Jinhai Wang Wei Wang +4 位作者 Zongyin Zhang Xuemin Lin Jingxian Zhao Mingyou Chen Lufeng Luo 《Computers, Materials & Continua》 SCIE EI 2024年第1期759-780,共22页
As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex b... As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex backgrounds and defects of varying shapes and sizes.To address this issue,this paper proposes YOLO-DD,a defect detectionmodel based on YOLOv5 that is effective and robust.To improve the feature extraction process and better capture global information,the vanilla YOLOv5 is augmented with a new module called Relative-Distance-Aware Transformer(RDAT).Additionally,an Information Gap Filling Strategy(IGFS)is proposed to improve the fusion of features at different scales.The classic lightweight attention mechanism Squeeze-and-Excitation(SE)module is also incorporated into the neck section to enhance feature expression and improve the model’s performance.Experimental results on the NEU-DET dataset demonstrate that YOLO-DDachieves competitive results compared to state-of-the-art methods,with a 2.0% increase in accuracy compared to the original YOLOv5,achieving 82.41% accuracy and38.25FPS(framesper second).Themodel is also testedon a self-constructed fabric defect dataset,and the results show that YOLO-DD is more stable and has higher accuracy than the original YOLOv5,demonstrating its stability and generalization ability.The high efficiency of YOLO-DD enables it to meet the requirements of industrial high accuracy and real-time detection. 展开更多
关键词 YOLO-DD defect detection feature fusion attention mechanism
下载PDF
Real-Time Detection and Instance Segmentation of Strawberry in Unstructured Environment
20
作者 Chengjun Wang Fan Ding +4 位作者 Yiwen Wang Renyuan Wu Xingyu Yao Chengjie Jiang Liuyi Ling 《Computers, Materials & Continua》 SCIE EI 2024年第1期1481-1501,共21页
The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-r... The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-ronment is a challenging task.Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy.To this end,the present study proposes an Efficient YOLACT(E-YOLACT)algorithm for strawberry detection and segmentation based on the YOLACT framework.The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism,pyramid squeeze shuffle attention(PSSA),for efficient feature extraction.Additionally,an attention-guided context-feature pyramid network(AC-FPN)is employed instead of FPN to optimize the architecture’s performance.Furthermore,a feature-enhanced model(FEM)is introduced to enhance the prediction head’s capabilities,while efficient fast non-maximum suppression(EF-NMS)is devised to improve non-maximum suppression.The experimental results demonstrate that the E-YOLACT achieves a Box-mAP and Mask-mAP of 77.9 and 76.6,respectively,on the custom dataset.Moreover,it exhibits an impressive category accuracy of 93.5%.Notably,the E-YOLACT also demonstrates a remarkable real-time detection capability with a speed of 34.8 FPS.The method proposed in this article presents an efficient approach for the vision system of a strawberry-picking robot. 展开更多
关键词 YOLACT real-time detection instance segmentation attention mechanism STRAWBERRY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部