期刊文献+
共找到541,829篇文章
< 1 2 250 >
每页显示 20 50 100
Online Capacitor Voltage Transformer Measurement Error State Evaluation Method Based on In-Phase Relationship and Abnormal Point Detection
1
作者 Yongqi Liu Wei Shi +2 位作者 Jiusong Hu Yantao Zhao Pang Wang 《Smart Grid and Renewable Energy》 2024年第1期34-48,共15页
The assessment of the measurement error status of online Capacitor Voltage Transformers (CVT) within the power grid is of profound significance to the equitable trade of electric energy and the secure operation of the... The assessment of the measurement error status of online Capacitor Voltage Transformers (CVT) within the power grid is of profound significance to the equitable trade of electric energy and the secure operation of the power grid. This paper advances an online CVT error state evaluation method, anchored in the in-phase relationship and outlier detection. Initially, this method leverages the in-phase relationship to obviate the influence of primary side fluctuations in the grid on assessment accuracy. Subsequently, Principal Component Analysis (PCA) is employed to meticulously disentangle the error change information inherent in the CVT from the measured values and to compute statistics that delineate the error state. Finally, the Local Outlier Factor (LOF) is deployed to discern outliers in the statistics, with thresholds serving to appraise the CVT error state. Experimental results incontrovertibly demonstrate the efficacy of this method, showcasing its prowess in effecting online tracking of CVT error changes and conducting error state assessments. The discernible enhancements in reliability, accuracy, and sensitivity are manifest, with the assessment accuracy reaching an exemplary 0.01%. 展开更多
关键词 Capacitor Voltage Transformer measurement Error Online Monitoring Principal Component Analysis Local Outlier Factor
下载PDF
A Hybrid Intrusion Detection Method Based on Convolutional Neural Network and AdaBoost 被引量:1
2
作者 Wu Zhijun Li Yuqi Yue Meng 《China Communications》 SCIE CSCD 2024年第11期180-189,共10页
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection... To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data. 展开更多
关键词 ADABOOST CNN detection rate false positive rate feature extraction intrusion detection
下载PDF
Esophageal cancer screening,early detection and treatment:Current insights and future directions 被引量:3
3
作者 Hong-Tao Qu Qing Li +7 位作者 Liang Hao Yan-Jing Ni Wen-Yu Luan Zhe Yang Xiao-Dong Chen Tong-Tong Zhang Yan-Dong Miao Fang Zhang 《World Journal of Gastrointestinal Oncology》 SCIE 2024年第4期1180-1191,共12页
Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately ... Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately 604000 new cases of esophageal cancer,resulting in 544000 deaths.The 5-year survival rate hovers around a mere 15%-25%.Notably,distinct variations exist in the risk factors associated with the two primary histological types,influencing their worldwide incidence and distribution.Squamous cell carcinoma displays a high incidence in specific regions,such as certain areas in China,where it meets the cost-effect-iveness criteria for widespread endoscopy-based early diagnosis within the local population.Conversely,adenocarcinoma(EAC)represents the most common histological subtype of esophageal cancer in Europe and the United States.The role of early diagnosis in cases of EAC originating from Barrett's esophagus(BE)remains a subject of controversy.The effectiveness of early detection for EAC,particularly those arising from BE,continues to be a debated topic.The variations in how early-stage esophageal carcinoma is treated in different regions are largely due to the differing rates of early-stage cancer diagnoses.In areas with higher incidences,such as China and Japan,early diagnosis is more common,which has led to the advancement of endoscopic methods as definitive treatments.These techniques have demonstrated remarkable efficacy with minimal complications while preserving esophageal functionality.Early screening,prompt diagnosis,and timely treatment are key strategies that can significantly lower both the occurrence and death rates associated with esophageal cancer. 展开更多
关键词 Esophageal cancer SCREENING Early detection Treatment Endoscopic mucosal resection Endoscopic submucosal dissection
下载PDF
An Intelligent SDN-IoT Enabled Intrusion Detection System for Healthcare Systems Using a Hybrid Deep Learning and Machine Learning Approach 被引量:1
4
作者 R Arthi S Krishnaveni Sherali Zeadally 《China Communications》 SCIE CSCD 2024年第10期267-287,共21页
The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during the... The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches. 展开更多
关键词 deep neural network healthcare intrusion detection system IOT machine learning software-defined networks
下载PDF
Defect Detection Model Using Time Series Data Augmentation and Transformation 被引量:1
5
作者 Gyu-Il Kim Hyun Yoo +1 位作者 Han-Jin Cho Kyungyong Chung 《Computers, Materials & Continua》 SCIE EI 2024年第2期1713-1730,共18页
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal depende... Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight. 展开更多
关键词 Defect detection time series deep learning data augmentation data transformation
下载PDF
Multimodal Social Media Fake News Detection Based on Similarity Inference and Adversarial Networks 被引量:1
6
作者 Fangfang Shan Huifang Sun Mengyi Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期581-605,共25页
As social networks become increasingly complex, contemporary fake news often includes textual descriptionsof events accompanied by corresponding images or videos. Fake news in multiple modalities is more likely tocrea... As social networks become increasingly complex, contemporary fake news often includes textual descriptionsof events accompanied by corresponding images or videos. Fake news in multiple modalities is more likely tocreate a misleading perception among users. While early research primarily focused on text-based features forfake news detection mechanisms, there has been relatively limited exploration of learning shared representationsin multimodal (text and visual) contexts. To address these limitations, this paper introduces a multimodal modelfor detecting fake news, which relies on similarity reasoning and adversarial networks. The model employsBidirectional Encoder Representation from Transformers (BERT) and Text Convolutional Neural Network (Text-CNN) for extracting textual features while utilizing the pre-trained Visual Geometry Group 19-layer (VGG-19) toextract visual features. Subsequently, the model establishes similarity representations between the textual featuresextracted by Text-CNN and visual features through similarity learning and reasoning. Finally, these features arefused to enhance the accuracy of fake news detection, and adversarial networks have been employed to investigatethe relationship between fake news and events. This paper validates the proposed model using publicly availablemultimodal datasets from Weibo and Twitter. Experimental results demonstrate that our proposed approachachieves superior performance on Twitter, with an accuracy of 86%, surpassing traditional unimodalmodalmodelsand existing multimodal models. In contrast, the overall better performance of our model on the Weibo datasetsurpasses the benchmark models across multiple metrics. The application of similarity reasoning and adversarialnetworks in multimodal fake news detection significantly enhances detection effectiveness in this paper. However,current research is limited to the fusion of only text and image modalities. Future research directions should aimto further integrate features fromadditionalmodalities to comprehensively represent themultifaceted informationof fake news. 展开更多
关键词 Fake news detection attention mechanism image-text similarity multimodal feature fusion
下载PDF
An Underwater Target Detection Algorithm Based on Attention Mechanism and Improved YOLOv7 被引量:1
7
作者 Liqiu Ren Zhanying Li +2 位作者 Xueyu He Lingyan Kong Yinghao Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期2829-2845,共17页
For underwater robots in the process of performing target detection tasks,the color distortion and the uneven quality of underwater images lead to great difficulties in the feature extraction process of the model,whic... For underwater robots in the process of performing target detection tasks,the color distortion and the uneven quality of underwater images lead to great difficulties in the feature extraction process of the model,which is prone to issues like error detection,omission detection,and poor accuracy.Therefore,this paper proposed the CER-YOLOv7(CBAM-EIOU-RepVGG-YOLOv7)underwater target detection algorithm.To improve the algorithm’s capability to retain valid features from both spatial and channel perspectives during the feature extraction phase,we have added a Convolutional Block Attention Module(CBAM)to the backbone network.The Reparameterization Visual Geometry Group(RepVGG)module is inserted into the backbone to improve the training and inference capabilities.The Efficient Intersection over Union(EIoU)loss is also used as the localization loss function,which reduces the error detection rate and missed detection rate of the algorithm.The experimental results of the CER-YOLOv7 algorithm on the UPRC(Underwater Robot Prototype Competition)dataset show that the mAP(mean Average Precision)score of the algorithm is 86.1%,which is a 2.2%improvement compared to the YOLOv7.The feasibility and validity of the CER-YOLOv7 are proved through ablation and comparison experiments,and it is more suitable for underwater target detection. 展开更多
关键词 Deep learning underwater object detection improved YOLOv7 attention mechanism
下载PDF
A core-satellite self-assembled SERS aptasensor containing a“biological-silent region”Raman tag for the accurate and ultrasensitive detection of histamine 被引量:1
8
作者 Chen Chen Yingfang Zhang +3 位作者 Ximo Wang Xuguang Qiao Geoffrey I.N.Waterhouse Zhixiang Xu 《Food Science and Human Wellness》 SCIE CSCD 2024年第2期1029-1039,共11页
Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-s... Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-satellite SERS aptasensor was constructed by combining aptamer-decorated Fe_(3)O_(4)@Au MNPs(as the recognize probe for histamine)and complementary DNA-modified silver nanoparticles carrying 4-mercaptobenzonitrile(4-MBN)(Ag@4-MBN@Ag-c-DNA)as the SERS signal probe for the indirect detection of histamine.Under an applied magnetic field in the absence of histamine,the assembly gave an intense Raman signal at“Raman biological-silent”region due to 4-MBN.In the presence of histamine,the Ag@4-MBN@Ag-c-DNA SERS-tag was released from the Fe_(3)O_(4)@Au MNPs,thus decreasing the SERS signal.Under optimal conditions,an ultra-low limit of detection of 0.65×10^(-3)ng/mL and a linear range 10^(-2)-10^5 ng/mL on the SERS aptasensor were obtained.The histamine content in four food samples were analyzed using the SERS aptasensor,with the results consistent with those determined by high performance liquid chromatography.The present work highlights the merits of indirect strategies for the ultrasensitive and highly selective SERS detection of small biological molecules in complex matrices. 展开更多
关键词 Surface-enhanced Raman spectroscopy Raman biological-silent region APTAMER Histamine detection Universal SERS-tag
下载PDF
A dual-RPA based lateral flow strip for sensitive,on-site detection of CP4-EPSPS and Cry1Ab/Ac genes in genetically modified crops 被引量:1
9
作者 Jinbin Wang Yu Wang +7 位作者 Xiuwen Hu Yifan Chen Wei Jiang Xiaofeng Liu Juan Liu Lemei Zhu Haijuan Zeng Hua Liu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期183-190,共8页
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSP... Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field. 展开更多
关键词 Genetically modifi ed crops On-site detection Lateral fl ow test strips Dual recombinase polymerase amplification (RPA)
下载PDF
Analysis of the joint detection capability of the SMILE satellite and EISCAT-3D radar 被引量:2
10
作者 JiaoJiao Zhang TianRan Sun +7 位作者 XiZheng Yu DaLin Li Hang Li JiaQi Guo ZongHua Ding Tao Chen Jian Wu Chi Wang 《Earth and Planetary Physics》 EI CSCD 2024年第1期299-306,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite European Incoherent Scatter Sciences Association(EISCAT)-3D radar joint detection
下载PDF
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment
11
作者 Abdulrahman Alzahrani 《Computers, Materials & Continua》 SCIE EI 2024年第8期2331-2349,共19页
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent ... The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices.Anomaly detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual activities.Machine learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device behaviour.In addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to botnets.Various ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT systems.To overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)technique.The GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT environment.For data preprocessing,the min-max data normalization approach is primarily used.The GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature subsets.Moreover,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet detection.Finally,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM method.The experimental validation of the GTODL-BADC technique can be tested on a benchmark dataset.The simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process. 展开更多
关键词 Botnet detection internet of things gorilla troops optimizer hyperparameter tuning intrusion detection system
下载PDF
Bunch-length measurement at a bunch-by-bunch rate based on time–frequency-domain joint analysis techniques and its application
12
作者 Hong-Shuang Wang Xing Yang +2 位作者 Yong-Bin Leng Yi-Mei Zhou Ji-Gang Wang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期165-175,共11页
This paper presents a new technique for measuring the bunch length of a high-energy electron beam at a bunch-by-bunch rate in storage rings.This technique uses the time–frequency-domain joint analysis of the bunch si... This paper presents a new technique for measuring the bunch length of a high-energy electron beam at a bunch-by-bunch rate in storage rings.This technique uses the time–frequency-domain joint analysis of the bunch signal to obtain bunch-by-bunch and turn-by-turn longitudinal parameters,such as bunch length and synchronous phase.The bunch signal is obtained using a button electrode with a bandwidth of several gigahertz.The data acquisition device was a high-speed digital oscilloscope with a sampling rate of more than 10 GS/s,and the single-shot sampling data buffer covered thousands of turns.The bunch-length and synchronous phase information were extracted via offline calculations using Python scripts.The calibration coefficient of the system was determined using a commercial streak camera.Moreover,this technique was tested on two different storage rings and successfully captured various longitudinal transient processes during the harmonic cavity debugging process at the Shanghai Synchrotron Radiation Facility(SSRF),and longitudinal instabilities were observed during the single-bunch accumulation process at Hefei Light Source(HLS).For Gaussian-distribution bunches,the uncertainty of the bunch phase obtained using this technique was better than 0.2 ps,and the bunch-length uncertainty was better than 1 ps.The dynamic range exceeded 10 ms.This technology is a powerful and versatile beam diagnostic tool that can be conveniently deployed in high-energy electron storage rings. 展开更多
关键词 Bunch-by-bunch diagnostic Bunch-length measurement Synchronous phase measurement Joint time–frequency-domain analysis Longitudinal instability
下载PDF
A self-organization formation configuration based assignment probability and collision detection
13
作者 SONG Wei WANG Tong +1 位作者 YANG Guangxin ZHANG Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期222-232,共11页
The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment pro... The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment probability is proposed to achieve the shortest overall formation path of multi-UAVs with low complexity and reduce the energy consumption.In order to avoid the collision between UAVs in the formation process,the concept of safety ball is introduced,and the collision detection based on continuous motion of two time slots and the lane occupation detection after motion is proposed to avoid collision between UAVs.Based on the idea of game theory,a method of UAV motion form setting based on the maximization of interests is proposed,including the maximization of self-interest and the maximization of formation interest is proposed,so that multi-UAVs can complete the formation task quickly and reasonably with the linear trajectory assigned in advance.Finally,through simulation verification,the multi-UAVs target assignment algorithm based on the assignment probability proposed in this paper can effectively reduce the total path length,and the UAV motion selection method based on the maximization interests can effectively complete the task formation. 展开更多
关键词 straight line trajectory assignment probability collision detection lane occupation detection maximization of interests
下载PDF
Establishment and performance analysis of a new multiplex detection method for influenza an and B virus antigen
14
作者 Cheng-Jing Xia Bao-Hua Li +3 位作者 Yan-Ni Guo Xiao-He Zhou Run-Ling Zhang Ying-No Niu 《World Journal of Clinical Cases》 SCIE 2024年第23期5338-5345,共8页
BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevent... BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevention.Quantum dot-encoded microspheres have been widely used in immunodetection.The integration of quantum dot-encoded microspheres with flow cytometry is a well-established technique that enables rapid analysis.Thus,establishing a multiplex detection method for influenza A and B virus antigens based on flow cytometry quantum dot microspheres will help in disease diagnosis.AIM To establish a codetection method of influenza A and B virus antigens based on flow cytometry quantum dot-encoded microsphere technology,which forms the foundation for the assays of multiple respiratory virus biomarkers.METHODS Different quantum dot-encoded microspheres were used to couple the monoclonal antibodies against influenza A and B.The known influenza A and B antigens were detected both separately and simultaneously on a flow cytometer,and the detection conditions were optimized to establish the influenza A and B antigen codetection method,which was utilized for their detection in clinical samples.The results were compared with the fluorescence quantitative polymerase chain reaction(PCR)method to validate the clinical performance of this method.RESULTS The limits of detection of this method were 26.1 and 10.7 pg/mL for influenza A and B antigens,respectively,which both ranged from 15.6 to 250000 pg/mL.In the clinical sample evaluation,the proposed method well correlated with the fluorescent quantitative PCR method,with positive,negative,and overall compliance rates of 57.4%,100%,and 71.6%,respectively.CONCLUSION A multiplex assay for quantitative detection of influenza A and B virus antigens has been established,which is characterized by high sensitivity,good specificity,and a wide detection range and is promising for clinical applications. 展开更多
关键词 Influenza A Influenza B Quantum dot microspheres Antigen detection Multiplex detection
下载PDF
Co-salient object detection with iterative purification and predictive optimization
15
作者 Yang WEN Yuhuan WANG +2 位作者 Hao WANG Wuzhen SHI Wenming CAO 《虚拟现实与智能硬件(中英文)》 EI 2024年第5期396-407,共12页
Background Co-salient object detection(Co-SOD)aims to identify and segment commonly salient objects in a set of related images.However,most current Co-SOD methods encounter issues with the inclusion of irrelevant info... Background Co-salient object detection(Co-SOD)aims to identify and segment commonly salient objects in a set of related images.However,most current Co-SOD methods encounter issues with the inclusion of irrelevant information in the co-representation.These issues hamper their ability to locate co-salient objects and significantly restrict the accuracy of detection.Methods To address this issue,this study introduces a novel Co-SOD method with iterative purification and predictive optimization(IPPO)comprising a common salient purification module(CSPM),predictive optimizing module(POM),and diminishing mixed enhancement block(DMEB).Results These components are designed to explore noise-free joint representations,assist the model in enhancing the quality of the final prediction results,and significantly improve the performance of the Co-SOD algorithm.Furthermore,through a comprehensive evaluation of IPPO and state-of-the-art algorithms focusing on the roles of CSPM,POM,and DMEB,our experiments confirmed that these components are pivotal in enhancing the performance of the model,substantiating the significant advancements of our method over existing benchmarks.Experiments on several challenging benchmark co-saliency datasets demonstrate that the proposed IPPO achieves state-of-the-art performance. 展开更多
关键词 Co-salient object detection Saliency detection Iterative method Predictive optimization
下载PDF
Strengthening Network Security: Deep Learning Models for Intrusion Detectionwith Optimized Feature Subset and Effective Imbalance Handling
16
作者 Bayi Xu Lei Sun +2 位作者 Xiuqing Mao Chengwei Liu Zhiyi Ding 《Computers, Materials & Continua》 SCIE EI 2024年第2期1995-2022,共28页
In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prep... In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prepro-cessing stage and a deep learning model for accurately identifying network attacks.We have proposed four deep neural network models,which are constructed using architectures such as Convolutional Neural Networks(CNN),Bi-directional Long Short-Term Memory(BiLSTM),Bidirectional Gate Recurrent Unit(BiGRU),and Attention mechanism.These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the models,we apply various preprocessing techniques and employ the particle swarm optimization algorithm to perform feature selection on the NSL-KDD dataset,resulting in an optimized feature subset.Moreover,we address class imbalance in the dataset using focal loss.Finally,we employ the BO-TPE algorithm to optimize the hyperparameters of the four models,maximizing their detection performance.The test results demonstrate that the proposed model is capable of extracting the spatiotemporal features of network traffic data effectively.In binary and multiclass experiments,it achieved accuracy rates of 0.999158 and 0.999091,respectively,surpassing other state-of-the-art methods. 展开更多
关键词 Intrusion detection CNN BiLSTM BiGRU ATTENTION
下载PDF
A Secure and Cost-Effective Training Framework Atop Serverless Computing for Object Detection in Blasting
17
作者 Tianming Zhang Zebin Chen +4 位作者 Haonan Guo Bojun Ren Quanmin Xie Mengke Tian Yong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2139-2154,共16页
The data analysis of blasting sites has always been the research goal of relevant researchers.The rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection ... The data analysis of blasting sites has always been the research goal of relevant researchers.The rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection in the field of blasting.Serverless Computing can provide a variety of computing services for people without hardware foundations and rich software development experience,which has aroused people’s interest in how to use it in the field ofmachine learning.In this paper,we design a distributedmachine learning training application based on the AWS Lambda platform.Based on data parallelism,the data aggregation and training synchronization in Function as a Service(FaaS)are effectively realized.It also encrypts the data set,effectively reducing the risk of data leakage.We rent a cloud server and a Lambda,and then we conduct experiments to evaluate our applications.Our results indicate the effectiveness,rapidity,and economy of distributed training on FaaS. 展开更多
关键词 Serverless computing object detection BLASTING
下载PDF
Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention
18
作者 Yifan Gao Jieming Zhang +1 位作者 Zhanchen Chen Xianchao Chen 《Computers, Materials & Continua》 SCIE EI 2024年第4期493-507,共15页
In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower s... In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection. 展开更多
关键词 Anomaly detection TRANSFORMER graph structure
下载PDF
Miniaturized power detection module operating in millimeter wave band
19
作者 Xiang Zhou Zhi-Yong Zhong 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第2期69-76,共8页
The miniaturized broadband detection module can be embedded into the microwave application system such as the front end of the transmitter to detect the power or other parameters in real time.It is highly prospective ... The miniaturized broadband detection module can be embedded into the microwave application system such as the front end of the transmitter to detect the power or other parameters in real time.It is highly prospective in military and scientific research.In this paper,a broadband power detection module operating at 26.5 GHz-40.0 GHz is designed by using low-barrier Schottky diode as the detector and a comparator for threshold output.This module can dynamically detect the power range between-10 dBm and 10 dBm with the detection accuracy of 0.1 dB.Further,the temperature compensation circuit is also applied to improve the measurement error.As a result,the resulted error low to±1 dB in the temperature range of -55℃ to +85℃ is achieved.The designed module is encapsulated by a Kovar alloy with a small volume of 9 mm×6 mm×3 mm.This endows the designed module the advantages of small size,easy integration,and low cost,and even it is applicable to high-reliability environments such as satellites. 展开更多
关键词 DIODE MINIATURIZATION Power detection Temperature compensation
下载PDF
Detection of Oxidants Such as Hydroxyl Radicals and Chlorine Electrogenerated on a BDD Electrode by Simple Methods
20
作者 Konan Sylvestre Koffi Konan Martin Koffi +4 位作者 Foffié Thiery Auguste Appia Sahi Placide Sadia Kouakou Jocelin Kimou Souleymane Kone Lassiné Ouattara 《Advances in Chemical Engineering and Science》 CAS 2024年第4期173-187,共15页
The aim of this work is to detect electrogenerated hydroxyl radicals and chlorine by simple and less expensive methods. Preparative electrolyses of perchloric acid (HClO4) and sodium chloride (NaCl) were performed on ... The aim of this work is to detect electrogenerated hydroxyl radicals and chlorine by simple and less expensive methods. Preparative electrolyses of perchloric acid (HClO4) and sodium chloride (NaCl) were performed on a boron-doped diamond (BDD) electrode. The hydroxyl radicals were quantified indirectly by assaying the samples from the HClO4 (0.1 M) electrolysis with a 10−4 M potassium permanganate solution. The investigations showed that the amount of hydroxyl radicals depends on the concentration of HClO4 and the current density. As for chlorine, a qualitative determination was carried out. A mixture of the electrolyte solution of HClO4 (0.1 M) + NaI (0.2 M) + 2 mL of hexane, taken in this order, leads to a purplish-pink coloration attesting to the presence of Cl2. The same test was carried out with NaBr and NaI giving pale and very pale pink colourations, respectively, showing that the intensity of the colouration depends on the strength of the oxidant present. In addition, oxidants were detected during the electrooxidation of metronidazole (MNZ). The results showed the participation of electrogenerated hydroxyl radicals. The generation of chlorine has also been proven. Furthermore, the degradation leads to a chemical oxygen demand (COD) removal rate of 83.48% and the process is diffusion-controlled. 展开更多
关键词 ELECTROOXIDATION Hydroxyl Radicals CHLORINE detection
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部