期刊文献+
共找到223,925篇文章
< 1 2 250 >
每页显示 20 50 100
A dual-RPA based lateral flow strip for sensitive,on-site detection of CP4-EPSPS and Cry1Ab/Ac genes in genetically modified crops 被引量:1
1
作者 Jinbin Wang Yu Wang +7 位作者 Xiuwen Hu Yifan Chen Wei Jiang Xiaofeng Liu Juan Liu Lemei Zhu Haijuan Zeng Hua Liu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期183-190,共8页
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSP... Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field. 展开更多
关键词 Genetically modifi ed crops On-site detection Lateral fl ow test strips Dual recombinase polymerase amplification (RPA)
下载PDF
Analysis of the joint detection capability of the SMILE satellite and EISCAT-3D radar 被引量:1
2
作者 JiaoJiao Zhang TianRan Sun +7 位作者 XiZheng Yu DaLin Li Hang Li JiaQi Guo ZongHua Ding Tao Chen Jian Wu Chi Wang 《Earth and Planetary Physics》 EI CSCD 2024年第1期299-306,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite European Incoherent Scatter Sciences Association(EISCAT)-3D radar joint detection
下载PDF
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
3
作者 Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1419-1439,共21页
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks. 展开更多
关键词 Portable executable MALWARE intrusion detection CYBERSECURITY zero-day threats Host Intrusiondetection System(HIDS) machine learning Anomaly-based Intrusion detection System(AIDS) deep learning
下载PDF
Design and prototyping of the readout electronics for the transition radiation detector in the high energy cosmic radiation detection facility
4
作者 Jie-Yu Zhu Yang-Zhou Su +12 位作者 Hai-Bo Yang Fen-Hua Lu Yan Yang Xi-Wen Liu Ping Wei Shu-Cai Wan Hao-Qing Xie Xian-Qin Li Cong Dai Hui-Jun Hu Hong-Bang Liu Shu-Wen Tang Cheng-Xin Zhao 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期189-199,共11页
The high energy cosmic-radiation detection(HERD)facility is planned to launch in 2027 and scheduled to be installed on the China Space Station.It serves as a dark matter particle detector,a cosmic ray instrument,and a... The high energy cosmic-radiation detection(HERD)facility is planned to launch in 2027 and scheduled to be installed on the China Space Station.It serves as a dark matter particle detector,a cosmic ray instrument,and an observatory for high-energy gamma rays.A transition radiation detector placed on one of its lateral sides serves dual purpose,(ⅰ)calibrating HERD's electromagnetic calorimeter in the TeV energy range,and(ⅱ)serving as an independent detector for high-energy gamma rays.In this paper,the prototype readout electronics design of the transition radiation detector is demonstrated,which aims to accurately measure the charge of the anodes using the SAMPA application specific integrated circuit chip.The electronic performance of the prototype system is evaluated in terms of noise,linearity,and resolution.Through the presented design,each electronic channel can achieve a dynamic range of 0–100 fC,the RMS noise level not exceeding 0.15 fC,and the integral nonlinearity was<0.2%.To further verify the readout electronic performance,a joint test with the detector was carried out,and the results show that the prototype system can satisfy the requirements of the detector's scientific goals. 展开更多
关键词 HERD Dark matter particle detection TRD Readout electronics SAMPA Data acquisition Performance test
下载PDF
YOLO-MFD:Remote Sensing Image Object Detection with Multi-Scale Fusion Dynamic Head
5
作者 Zhongyuan Zhang Wenqiu Zhu 《Computers, Materials & Continua》 SCIE EI 2024年第5期2547-2563,共17页
Remote sensing imagery,due to its high altitude,presents inherent challenges characterized by multiple scales,limited target areas,and intricate backgrounds.These inherent traits often lead to increased miss and false... Remote sensing imagery,due to its high altitude,presents inherent challenges characterized by multiple scales,limited target areas,and intricate backgrounds.These inherent traits often lead to increased miss and false detection rates when applying object recognition algorithms tailored for remote sensing imagery.Additionally,these complexities contribute to inaccuracies in target localization and hinder precise target categorization.This paper addresses these challenges by proposing a solution:The YOLO-MFD model(YOLO-MFD:Remote Sensing Image Object Detection withMulti-scale Fusion Dynamic Head).Before presenting our method,we delve into the prevalent issues faced in remote sensing imagery analysis.Specifically,we emphasize the struggles of existing object recognition algorithms in comprehensively capturing critical image features amidst varying scales and complex backgrounds.To resolve these issues,we introduce a novel approach.First,we propose the implementation of a lightweight multi-scale module called CEF.This module significantly improves the model’s ability to comprehensively capture important image features by merging multi-scale feature information.It effectively addresses the issues of missed detection and mistaken alarms that are common in remote sensing imagery.Second,an additional layer of small target detection heads is added,and a residual link is established with the higher-level feature extraction module in the backbone section.This allows the model to incorporate shallower information,significantly improving the accuracy of target localization in remotely sensed images.Finally,a dynamic head attentionmechanism is introduced.This allows themodel to exhibit greater flexibility and accuracy in recognizing shapes and targets of different sizes.Consequently,the precision of object detection is significantly improved.The trial results show that the YOLO-MFD model shows improvements of 6.3%,3.5%,and 2.5%over the original YOLOv8 model in Precision,map@0.5 and map@0.5:0.95,separately.These results illustrate the clear advantages of the method. 展开更多
关键词 Object detection YOLOv8 MULTI-SCALE attention mechanism dynamic detection head
下载PDF
SDH-FCOS:An Efficient Neural Network for Defect Detection in Urban Underground Pipelines
6
作者 Bin Zhou Bo Li +2 位作者 Wenfei Lan Congwen Tian Wei Yao 《Computers, Materials & Continua》 SCIE EI 2024年第1期633-652,共20页
Urban underground pipelines are an important infrastructure in cities,and timely investigation of problems in underground pipelines can help ensure the normal operation of cities.Owing to the growing demand for defect... Urban underground pipelines are an important infrastructure in cities,and timely investigation of problems in underground pipelines can help ensure the normal operation of cities.Owing to the growing demand for defect detection in urban underground pipelines,this study developed an improved defect detection method for urban underground pipelines based on fully convolutional one-stage object detector(FCOS),called spatial pyramid pooling-fast(SPPF)feature fusion and dual detection heads based on FCOS(SDH-FCOS)model.This study improved the feature fusion component of the model network based on FCOS,introduced an SPPF network structure behind the last output feature layer of the backbone network,fused the local and global features,added a top-down path to accelerate the circulation of shallowinformation,and enriched the semantic information acquired by shallow features.The ability of the model to detect objects with multiple morphologies was strengthened by introducing dual detection heads.The experimental results using an open dataset of underground pipes show that the proposed SDH-FCOS model can recognize underground pipe defects more accurately;the average accuracy was improved by 2.7% compared with the original FCOS model,reducing the leakage rate to a large extent and achieving real-time detection.Also,our model achieved a good trade-off between accuracy and speed compared with other mainstream methods.This proved the effectiveness of the proposed model. 展开更多
关键词 Urban underground pipelines defect detection SDH-FCOS feature fusion SPPF dual detection heads
下载PDF
A self-organization formation configuration based assignment probability and collision detection
7
作者 SONG Wei WANG Tong +1 位作者 YANG Guangxin ZHANG Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期222-232,共11页
The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment pro... The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment probability is proposed to achieve the shortest overall formation path of multi-UAVs with low complexity and reduce the energy consumption.In order to avoid the collision between UAVs in the formation process,the concept of safety ball is introduced,and the collision detection based on continuous motion of two time slots and the lane occupation detection after motion is proposed to avoid collision between UAVs.Based on the idea of game theory,a method of UAV motion form setting based on the maximization of interests is proposed,including the maximization of self-interest and the maximization of formation interest is proposed,so that multi-UAVs can complete the formation task quickly and reasonably with the linear trajectory assigned in advance.Finally,through simulation verification,the multi-UAVs target assignment algorithm based on the assignment probability proposed in this paper can effectively reduce the total path length,and the UAV motion selection method based on the maximization interests can effectively complete the task formation. 展开更多
关键词 straight line trajectory assignment probability collision detection lane occupation detection maximization of interests
下载PDF
An Efficient Modelling of Oversampling with Optimal Deep Learning Enabled Anomaly Detection in Streaming Data
8
作者 R.Rajakumar S.Sathiya Devi 《China Communications》 SCIE CSCD 2024年第5期249-260,共12页
Recently,anomaly detection(AD)in streaming data gained significant attention among research communities due to its applicability in finance,business,healthcare,education,etc.The recent developments of deep learning(DL... Recently,anomaly detection(AD)in streaming data gained significant attention among research communities due to its applicability in finance,business,healthcare,education,etc.The recent developments of deep learning(DL)models find helpful in the detection and classification of anomalies.This article designs an oversampling with an optimal deep learning-based streaming data classification(OS-ODLSDC)model.The aim of the OSODLSDC model is to recognize and classify the presence of anomalies in the streaming data.The proposed OS-ODLSDC model initially undergoes preprocessing step.Since streaming data is unbalanced,support vector machine(SVM)-Synthetic Minority Over-sampling Technique(SVM-SMOTE)is applied for oversampling process.Besides,the OS-ODLSDC model employs bidirectional long short-term memory(Bi LSTM)for AD and classification.Finally,the root means square propagation(RMSProp)optimizer is applied for optimal hyperparameter tuning of the Bi LSTM model.For ensuring the promising performance of the OS-ODLSDC model,a wide-ranging experimental analysis is performed using three benchmark datasets such as CICIDS 2018,KDD-Cup 1999,and NSL-KDD datasets. 展开更多
关键词 anomaly detection deep learning hyperparameter optimization OVERSAMPLING SMOTE streaming data
下载PDF
Finite element model updating for structural damage detection using transmissibility data
9
作者 Ahmad Izadi Akbar Esfandiari 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期87-101,共15页
This paper presents a new finite element model updating method for estimating structural parameters and detecting structural damage location and severity based on the structural responses(output-only data).The method ... This paper presents a new finite element model updating method for estimating structural parameters and detecting structural damage location and severity based on the structural responses(output-only data).The method uses the sensitivity relation of transmissibility data through a least-squares algorithm and appropriate normalization of the extracted equations.The proposed transmissibility-based sensitivity equation produces a more significant number of equations than the sensitivity equations based on the frequency response function(FRF),which can estimate the structural parameters with higher accuracy.The abilities of the proposed method are assessed by using numerical data of a two-story two-bay frame model and a plate structure model.In evaluating different damage cases,the number,location,and stiffness reduction of the damaged elements and the severity of the simulated damage have been accurately identified.The reliability and stability of the presented method against measurement and modeling errors are examined using error-contaminated data.The parameter estimation results prove the method’s capabilities as an accurate model updating algorithm. 展开更多
关键词 damage detection model updating output-only TRANSMISSIBILITY sensitivity equation
下载PDF
Target Detection Algorithm in Foggy Scenes Based on Dual Subnets
10
作者 Yuecheng Yu Liming Cai +3 位作者 Anqi Ning Jinlong Shi Xudong Chen Shixin Huang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1915-1931,共17页
Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the ima... Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the image by the universal detection network.Thus,a dual subnet based on multi-task collaborative training(DSMCT)is proposed in this paper.Firstly,in the training phase,the Gated Context Aggregation Network(GCANet)is used as the supervisory network of YOLOX to promote the extraction of clean information in foggy scenes.In the test phase,only the YOLOX branch needs to be activated to ensure the detection speed of the model.Secondly,the deformable convolution module is used to improve GCANet to enhance the model’s ability to capture details of non-homogeneous fog.Finally,the Coordinate Attention mechanism is introduced into the Vision Transformer and the backbone network of YOLOX is redesigned.In this way,the feature extraction ability of the network for deep-level information can be enhanced.The experimental results on artificial fog data set FOG_VOC and real fog data set RTTS show that the map value of DSMCT reached 86.56%and 62.39%,respectively,which was 2.27%and 4.41%higher than the current most advanced detection model.The DSMCT network has high practicality and effectiveness for target detection in real foggy scenes. 展开更多
关键词 Target detection fog target detection YOLOX twin network multi-task learning
下载PDF
Microstrip Patch Antenna with an Inverted T-Type Notch in the Partial Ground for Breast Cancer Detections
11
作者 Nure Alam Chowdhury Lulu Wang +2 位作者 Md Shazzadul Islam Linxia Gu Mehmet Kaya 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1301-1322,共22页
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)... This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)todistribute around the breast phantom.The operating frequency has been observed from6–14GHzwith a minimumreturn loss of−61.18 dB and themaximumgain of current proposed antenna is 5.8 dBiwhich is flexiblewith respectto the size of antenna.After the distribution of eight antennas around the breast phantom,the return loss curveswere observed in the presence and absence of tumor cells inside the breast phantom,and these observations showa sharp difference between the presence and absence of tumor cells.The simulated results show that this proposedantenna is suitable for early detection of cancerous cells inside the breast. 展开更多
关键词 Antenna microwave wideband cancer breast phantom tumor detection
下载PDF
Improving Federated Learning through Abnormal Client Detection and Incentive
12
作者 Hongle Guo Yingchi Mao +3 位作者 Xiaoming He Benteng Zhang Tianfu Pang Ping Ping 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期383-403,共21页
Data sharing and privacy protection are made possible by federated learning,which allows for continuous model parameter sharing between several clients and a central server.Multiple reliable and high-quality clients m... Data sharing and privacy protection are made possible by federated learning,which allows for continuous model parameter sharing between several clients and a central server.Multiple reliable and high-quality clients must participate in practical applications for the federated learning global model to be accurate,but because the clients are independent,the central server cannot fully control their behavior.The central server has no way of knowing the correctness of the model parameters provided by each client in this round,so clients may purposefully or unwittingly submit anomalous data,leading to abnormal behavior,such as becoming malicious attackers or defective clients.To reduce their negative consequences,it is crucial to quickly detect these abnormalities and incentivize them.In this paper,we propose a Federated Learning framework for Detecting and Incentivizing Abnormal Clients(FL-DIAC)to accomplish efficient and security federated learning.We build a detector that introduces an auto-encoder for anomaly detection and use it to perform anomaly identification and prevent the involvement of abnormal clients,in particular for the anomaly client detection problem.Among them,before the model parameters are input to the detector,we propose a Fourier transform-based anomaly data detectionmethod for dimensionality reduction in order to reduce the computational complexity.Additionally,we create a credit scorebased incentive structure to encourage clients to participate in training in order tomake clients actively participate.Three training models(CNN,MLP,and ResNet-18)and three datasets(MNIST,Fashion MNIST,and CIFAR-10)have been used in experiments.According to theoretical analysis and experimental findings,the FL-DIAC is superior to other federated learning schemes of the same type in terms of effectiveness. 展开更多
关键词 Federated learning abnormal clients INCENTIVE credit score abnormal score detection
下载PDF
Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method
13
作者 CaiMing Liu Yan Zhang +1 位作者 Zhihui Hu Chunming Xie 《Computers, Materials & Continua》 SCIE EI 2024年第2期2361-2389,共29页
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune de... Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune detection model for network intrusion data based on a quantitative matching method.The proposed model defines the detection process by using network data and decimal values to express features and artificial immune mechanisms are simulated to define immune elements.Then,to improve the accuracy of similarity calculation,a quantitative matching method is proposed.The model uses mathematical methods to train and evolve immune elements,increasing the diversity of immune recognition and allowing for the successful detection of unknown intrusions.The proposed model’s objective is to accurately identify known intrusions and expand the identification of unknown intrusions through signature detection and immune detection,overcoming the disadvantages of traditional methods.The experiment results show that the proposed model can detect intrusions effectively.It has a detection rate of more than 99.6%on average and a false alarm rate of 0.0264%.It outperforms existing immune intrusion detection methods in terms of comprehensive detection performance. 展开更多
关键词 Immune detection network intrusion network data signature detection quantitative matching method
下载PDF
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
14
作者 Ahmed Barnawi Krishan Kumar +2 位作者 Neeraj Kumar Bander Alzahrani Amal Almansour 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2117-2137,共21页
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human lives.The detonation of these landmines results in thousands of casualties repo... Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human lives.The detonation of these landmines results in thousands of casualties reported worldwide annually.Therefore,there is a pressing need to employ diverse landmine detection techniques for their removal.One effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic field.It can generate a contour plot or heat map that visually represents the magnetic field strength.Despite the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith risks.Edge computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine detection.By processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field data.It enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the process.Furthermore,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during transmission.This paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and localization.We have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset traces.By simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry images.The trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%. 展开更多
关键词 CNN deep learning landmine detection MAGNETOMETER mean average precision UAV
下载PDF
Fluorescent Double Network Hydrogels with Ionic Responsiveness and High Mechanical Properties for Visual Detection
15
作者 郑湾 LIU Lerong +5 位作者 Lü Hanlin WANG Yuhang LI Feihu ZHANG Yixuan 陈艳军 WANG Yifeng 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第2期487-496,共10页
We developed a fluorescent double network hydrogel with ionic responsiveness and high mechanical properties for visual detection.The nanocomposite hydrogel of laponite and polyacrylamide serves as the first network,wh... We developed a fluorescent double network hydrogel with ionic responsiveness and high mechanical properties for visual detection.The nanocomposite hydrogel of laponite and polyacrylamide serves as the first network,while the ionic cross-linked hydrogel of terbium ions and sodium alginate serves as the second network.The double-network structure,the introduction of nanoparticles and the reversible ionic crosslinked interactions confer high mechanical properties to the hydrogel.Terbium ions are not only used as the ionic cross-linked points,but also used as green emitters to endow hydrogels with fluorescent properties.On the basis of the “antenna effect” of terbium ions and the ion exchange interaction,the fluorescence of the hydrogels can make selective responses to various ions(such as organic acid radical ions,transition metal ions) in aqueous solutions,which enables a convenient strategy for visual detection toward ions.Consequently,the fluorescent double network hydrogel fabricated in this study is promising for use in the field of visual sensor detection. 展开更多
关键词 visual detection ionic responsiveness fluorescent hydrogels double network hydrogels mechanical property
下载PDF
Isomeric fluorescence sensors for wide range detection of ionizing radiations
16
作者 Jimin Han Tianyu Yang +1 位作者 Li Yang Yuanjian Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第4期247-257,共11页
In order to achieve a wider range of ionizing radiations detection,novel fluorescence sensing materials have been developed that utilize the fluorescence enhancement phenomenon caused by the intramolecular photoinduce... In order to achieve a wider range of ionizing radiations detection,novel fluorescence sensing materials have been developed that utilize the fluorescence enhancement phenomenon caused by the intramolecular photoinduced electron transfer(PET)effect.Two perylene diimide isomers PDI-P and PDI-B were designed and synthesized,and their molecular structures were characterized by high-resolution Fourier transform mass spectrometry(HRMS),nuclear magnetic resonance hydrogen and carbon spectroscopy(~1H and~(13)C NMR).The interaction between ionizing radiation and fluorescent molecules was simulated by HCl titration.The results show that combining PDIs and HCl can improve fluorescence through the retro-PET process.Despite the similarities in chemical structures,the fluorescent enhancement multiple of PDI-B with aromatic amine as electron donor is much higher than that of PDI-P with alkyl amine.In the direct irradiation experiments of ionizing radiation,the emission enhancement multiples of PDI-P and PDI-B are 2.01 and 45.4,respectively.Furthermore,density functional theory(DFT)and time-dependent density functional theory(TDDFT)calculations indicate that the HOMO and HOMO-1 energy ranges of PDI-P and PDI-B are 0.54 e V and 1.13 e V,respectively.A wider energy range has a stronger driving force on electrons,which is conducive to fluorescence quenching.Both femtosecond transient absorption spectroscopy(fs-TAS)and transient fluorescence spectroscopy(TFS)tests show that PDI-B has shorter charge separation lifetime and higher electron transfer rate constant.Although both isomers can significantly reduce LOD during PET process,PDI-B with aromatic amine has a wider detection range of 0.118—240 Gy due to its larger emission enhancement,which is a leap of three orders of magnitude.It breaks through the detection range of gamma radiation reported in existing studies,and provides theoretical support for the further study of sensitive and effective new materials for ionizing radiation detection. 展开更多
关键词 Perylene imide Intramolecular PET Ionizing radiation detection Fluorescence sensor ISOMERS
下载PDF
Establishment of a Multiplex Detection Method for Common Bacteria in Blood Based on Human Mannan-Binding Lectin Protein-Conjugated Magnetic Bead Enrichment Combined with Recombinase-Aided PCR Technology
17
作者 ZHAO Zi Jin CHEN Xiao Ping +13 位作者 HUA Shao Wei LI Feng Yu ZHAO Meng XING Chen Hao WANG Jie TIAN Feng Yu ZHANG Rui Qing LYU Xiao Na HAN Zhi Qiang WANG Yu Xin LI Hong Yi SHEN Xin Xin MA Xue Jun TIE Yan Qing 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2024年第4期387-398,共12页
Objective Recombinase-aided polymerase chain reaction(RAP)is a sensitive,single-tube,two-stage nucleic acid amplification method.This study aimed to develop an assay that can be used for the early diagnosis of three t... Objective Recombinase-aided polymerase chain reaction(RAP)is a sensitive,single-tube,two-stage nucleic acid amplification method.This study aimed to develop an assay that can be used for the early diagnosis of three types of bacteremia caused by Staphylococcus aureus(SA),Pseudomonas aeruginosa(PA),and Acinetobacter baumannii(AB)in the bloodstream based on recombinant human mannanbinding lectin protein(M1 protein)-conjugated magnetic bead(M1 bead)enrichment of pathogens combined with RAP.Methods Recombinant plasmids were used to evaluate the assay sensitivity.Common blood influenza bacteria were used for the specific detection.Simulated and clinical plasma samples were enriched with M1 beads and then subjected to multiple recombinase-aided PCR(M-RAP)and quantitative PCR(qPCR)assays.Kappa analysis was used to evaluate the consistency between the two assays.Results The M-RAP method had sensitivity rates of 1,10,and 1 copies/μL for the detection of SA,PA,and AB plasmids,respectively,without cross-reaction to other bacterial species.The M-RAP assay obtained results for<10 CFU/mL pathogens in the blood within 4 h,with higher sensitivity than qPCR.M-RAP and qPCR for SA,PA,and AB yielded Kappa values of 0.839,0.815,and 0.856,respectively(P<0.05).Conclusion An M-RAP assay for SA,PA,and AB in blood samples utilizing M1 bead enrichment has been developed and can be potentially used for the early detection of bacteremia. 展开更多
关键词 Staphylococcus aureus Pseudomonas aeruginosa Acinetobacter baumannii Human Mannan-binding lectin protein Bloodstream infection Recombinase-aided PCR assay Multiple detection
下载PDF
NFA:A neural factorization autoencoder based online telephony fraud detection
18
作者 Abdul Wahid Mounira Msahli +1 位作者 Albert Bifet Gerard Memmi 《Digital Communications and Networks》 SCIE CSCD 2024年第1期158-167,共10页
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac... The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks. 展开更多
关键词 Telecom industry Streaming anomaly detection Fraud analysis Factorization machine Real-time system Security
下载PDF
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
19
作者 Farhan Ullah Shamsher Ullah +1 位作者 Gautam Srivastava Jerry Chun-Wei Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第1期190-204,共15页
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a... A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model. 展开更多
关键词 Network intrusion detection Transfer learning Features extraction Imbalance data Explainable AI CYBERSECURITY
下载PDF
ST-LaneNet: Lane Line Detection Method Based on Swin Transformer and LaneNet
20
作者 Yufeng Du Rongyun Zhang +3 位作者 Peicheng Shi Linfeng Zhao Bin Zhang Yaming Liu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第1期130-145,共16页
The advancement of autonomous driving heavily relies on the ability to accurate lane lines detection.As deep learning and computer vision technologies evolve,a variety of deep learning-based methods for lane line dete... The advancement of autonomous driving heavily relies on the ability to accurate lane lines detection.As deep learning and computer vision technologies evolve,a variety of deep learning-based methods for lane line detection have been proposed by researchers in the field.However,owing to the simple appearance of lane lines and the lack of distinctive features,it is easy for other objects with similar local appearances to interfere with the process of detecting lane lines.The precision of lane line detection is limited by the unpredictable quantity and diversity of lane lines.To address the aforementioned challenges,we propose a novel deep learning approach for lane line detection.This method leverages the Swin Transformer in conjunction with LaneNet(called ST-LaneNet).The experience results showed that the true positive detection rate can reach 97.53%for easy lanes and 96.83%for difficult lanes(such as scenes with severe occlusion and extreme lighting conditions),which can better accomplish the objective of detecting lane lines.In 1000 detection samples,the average detection accuracy can reach 97.83%,the average inference time per image can reach 17.8 ms,and the average number of frames per second can reach 64.8 Hz.The programming scripts and associated models for this project can be accessed openly at the following GitHub repository:https://github.com/Duane 711/Lane-line-detec tion-ST-LaneNet. 展开更多
关键词 Autonomous driving Lane line detection Deep learning Swin transformer
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部