期刊文献+
共找到282,971篇文章
< 1 2 250 >
每页显示 20 50 100
Handwriting Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection
1
作者 Jason Slaughter Carole E. Chaski Kellep Charles 《Journal of Information Security》 2024年第3期308-319,共12页
The Unintentional Insider Threat (UIT) concept highlights that insider threats might not always stem from malicious intent and can occur across various domains. This research examines how individuals with medical or p... The Unintentional Insider Threat (UIT) concept highlights that insider threats might not always stem from malicious intent and can occur across various domains. This research examines how individuals with medical or psychological issues might unintentionally become insider threats due to their perception of being targeted. Insights from the survey A Survey of Unintentional Medical Insider Threat Category indicate that such perceptions can be linked to underlying health conditions. The study Emotion Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection reveals that anger is a common emotion among these individuals. The findings suggest that UITs are often linked to medical or psychological issues, with anger being prevalent. To mitigate these risks, it is recommended that Insider Threat programs integrate expertise from medicine, psychology, and cybersecurity. Additionally, handwriting analysis is proposed as a potential tool for detecting insider threats, reflecting the evolving nature of threat assessment methodologies. 展开更多
关键词 INsideR THREAT detection TARGETED Medical
下载PDF
Revisiting the standards of cancer detection and therapy alongside their comparison to modern methods
2
作者 Piotr Gromek Zuzanna Senkowska +7 位作者 Elzbieta Pluciennik Zbigniew Pasieka Lin-Yong Zhao Adrianna Gielecinska Mateusz Kciuk Karol Klosinski Zaneta Kaluzinska-Kolat Damian Kolat 《World Journal of Methodology》 2024年第2期17-37,共21页
In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developi... In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developing detection and treatment methods should continue.The diagnostic path typically begins with learning the medical history of a patient;this is followed by basic blood tests and imaging tests to indicate where cancer may be located to schedule a needle biopsy.Prompt initiation of diagnosis is crucial since delayed cancer detection entails higher costs of treatment and hospitalization.Thus,there is a need for novel cancer detection methods such as liquid biopsy,elastography,synthetic biosensors,fluorescence imaging,and reflectance confocal microscopy.Conventional therapeutic methods,although still common in clinical practice,pose many limitations and are unsatisfactory.Nowadays,there is a dynamic advancement of clinical research and the development of more precise and effective methods such as oncolytic virotherapy,exosome-based therapy,nanotechnology,dendritic cells,chimeric antigen receptors,immune checkpoint inhibitors,natural product-based therapy,tumor-treating fields,and photodynamic therapy.The present paper compares available data on conventional and modern methods of cancer detection and therapy to facilitate an understanding of this rapidly advancing field and its future directions.As evidenced,modern methods are not without drawbacks;there is still a need to develop new detection strategies and therapeutic approaches to improve sensitivity,specificity,safety,and efficacy.Nevertheless,an appropriate route has been taken,as confirmed by the approval of some modern methods by the Food and Drug Administration. 展开更多
关键词 Cancer detection Liquid biopsy Synthetic biosensors Fluorescence imaging Reflectance confocal microscopy ELASTOGRAPHY Cancer therapy Tumor-treating fields Oncolytic virotherapy NANOTECHNOLOGY
下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
3
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
A core-satellite self-assembled SERS aptasensor containing a“biological-silent region”Raman tag for the accurate and ultrasensitive detection of histamine 被引量:1
4
作者 Chen Chen Yingfang Zhang +3 位作者 Ximo Wang Xuguang Qiao Geoffrey I.N.Waterhouse Zhixiang Xu 《Food Science and Human Wellness》 SCIE CSCD 2024年第2期1029-1039,共11页
Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-s... Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-satellite SERS aptasensor was constructed by combining aptamer-decorated Fe_(3)O_(4)@Au MNPs(as the recognize probe for histamine)and complementary DNA-modified silver nanoparticles carrying 4-mercaptobenzonitrile(4-MBN)(Ag@4-MBN@Ag-c-DNA)as the SERS signal probe for the indirect detection of histamine.Under an applied magnetic field in the absence of histamine,the assembly gave an intense Raman signal at“Raman biological-silent”region due to 4-MBN.In the presence of histamine,the Ag@4-MBN@Ag-c-DNA SERS-tag was released from the Fe_(3)O_(4)@Au MNPs,thus decreasing the SERS signal.Under optimal conditions,an ultra-low limit of detection of 0.65×10^(-3)ng/mL and a linear range 10^(-2)-10^5 ng/mL on the SERS aptasensor were obtained.The histamine content in four food samples were analyzed using the SERS aptasensor,with the results consistent with those determined by high performance liquid chromatography.The present work highlights the merits of indirect strategies for the ultrasensitive and highly selective SERS detection of small biological molecules in complex matrices. 展开更多
关键词 Surface-enhanced Raman spectroscopy Raman biological-silent region APTAMER Histamine detection Universal SERS-tag
下载PDF
Automatic detection of small bowel lesions with different bleeding risks based on deep learning models 被引量:1
5
作者 Rui-Ya Zhang Peng-Peng Qiang +5 位作者 Ling-Jun Cai Tao Li Yan Qin Yu Zhang Yi-Qing Zhao Jun-Ping Wang 《World Journal of Gastroenterology》 SCIE CAS 2024年第2期170-183,共14页
BACKGROUND Deep learning provides an efficient automatic image recognition method for small bowel(SB)capsule endoscopy(CE)that can assist physicians in diagnosis.However,the existing deep learning models present some ... BACKGROUND Deep learning provides an efficient automatic image recognition method for small bowel(SB)capsule endoscopy(CE)that can assist physicians in diagnosis.However,the existing deep learning models present some unresolved challenges.AIM To propose a novel and effective classification and detection model to automatically identify various SB lesions and their bleeding risks,and label the lesions accurately so as to enhance the diagnostic efficiency of physicians and the ability to identify high-risk bleeding groups.METHODS The proposed model represents a two-stage method that combined image classification with object detection.First,we utilized the improved ResNet-50 classification model to classify endoscopic images into SB lesion images,normal SB mucosa images,and invalid images.Then,the improved YOLO-V5 detection model was utilized to detect the type of lesion and its risk of bleeding,and the location of the lesion was marked.We constructed training and testing sets and compared model-assisted reading with physician reading.RESULTS The accuracy of the model constructed in this study reached 98.96%,which was higher than the accuracy of other systems using only a single module.The sensitivity,specificity,and accuracy of the model-assisted reading detection of all images were 99.17%,99.92%,and 99.86%,which were significantly higher than those of the endoscopists’diagnoses.The image processing time of the model was 48 ms/image,and the image processing time of the physicians was 0.40±0.24 s/image(P<0.001).CONCLUSION The deep learning model of image classification combined with object detection exhibits a satisfactory diagnostic effect on a variety of SB lesions and their bleeding risks in CE images,which enhances the diagnostic efficiency of physicians and improves the ability of physicians to identify high-risk bleeding groups. 展开更多
关键词 Artificial intelligence Deep learning Capsule endoscopy Image classification Object detection Bleeding risk
下载PDF
A dual-RPA based lateral flow strip for sensitive,on-site detection of CP4-EPSPS and Cry1Ab/Ac genes in genetically modified crops 被引量:1
6
作者 Jinbin Wang Yu Wang +7 位作者 Xiuwen Hu Yifan Chen Wei Jiang Xiaofeng Liu Juan Liu Lemei Zhu Haijuan Zeng Hua Liu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期183-190,共8页
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSP... Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field. 展开更多
关键词 Genetically modifi ed crops On-site detection Lateral fl ow test strips Dual recombinase polymerase amplification (RPA)
下载PDF
Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections 被引量:1
7
作者 Dmitry Gura Bo Dong +1 位作者 Duaa Mehiar Nidal Al Said 《Computers, Materials & Continua》 SCIE EI 2024年第5期1995-2014,共20页
The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method in... The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection,which is then used as input to the CNN.The customized Convolutional Neural Network method is the date augmented-based CNN model to generate‘fake data’or‘fake images’.This study was carried out using Python and its libraries.We used 242 films from the dataset gathered by the Deep Fake Detection Challenge,of which 199 were made up and the remaining 53 were real.Ten seconds were allotted for each video.There were 318 videos used in all,199 of which were fake and 119 of which were real.Our proposedmethod achieved a testing accuracy of 91.47%,loss of 0.342,and AUC score of 0.92,outperforming two alternative approaches,CNN and MLP-CNN.Furthermore,our method succeeded in greater accuracy than contemporary models such as XceptionNet,Meso-4,EfficientNet-BO,MesoInception-4,VGG-16,and DST-Net.The novelty of this investigation is the development of a new Convolutional Neural Network(CNN)learning model that can accurately detect deep fake face photos. 展开更多
关键词 Deep fake detection video analysis convolutional neural network machine learning video dataset collection facial landmark prediction accuracy models
下载PDF
GHz photon-number resolving detection with high detection efficiency and low noise by ultra-narrowband interference circuits
8
作者 Tingting Shi Yuanbin Fan +3 位作者 Zhengyu Yan Lai Zhou Yang Ji Zhiliang Yuan 《Journal of Semiconductors》 EI CAS CSCD 2024年第3期71-75,共5页
We demonstrate the photon-number resolution(PNR)capability of a 1.25 GHz gated InGaAs single-photon avalanche photodiode(APD)that is equipped with a simple,low-distortion ultra-narrowband interference circuit for the ... We demonstrate the photon-number resolution(PNR)capability of a 1.25 GHz gated InGaAs single-photon avalanche photodiode(APD)that is equipped with a simple,low-distortion ultra-narrowband interference circuit for the rejection of its background capacitive response.Through discriminating the avalanche current amplitude,we are able to resolve up to four detected photons in a single detection gate with a detection efficiency as high as 45%.The PNR capability is limited by the avalanche current saturation,and can be increased to five photons at a lower detection efficiency of 34%.The PNR capability,combined with high efficiency and low noise,will find applications in quantum information processing technique based on photonic qubits. 展开更多
关键词 single photon avalanche diode(APD) photon number resolution(PNR) detection efficiency
下载PDF
Detection method of forward-scatter signal based on Rényi entropy 被引量:1
9
作者 ZHENG Yuqing AI Xiaofeng +2 位作者 YANG Yong ZHAO Feng XIAO Shunping 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期865-873,共9页
The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the targe... The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the target crosses the baseline is constructed.Then,the detection method of the for-ward-scatter signal based on the Rényi entropy of time-fre-quency distribution is proposed and the detection performance with different time-frequency distributions is compared.Simula-tion results show that the method based on the smooth pseudo Wigner-Ville distribution(SPWVD)can achieve the best perfor-mance.Next,combined with the geometry of FSR,the influence on detection performance of the relative distance between the target and the baseline is analyzed.Finally,the proposed method is validated by the anechoic chamber measurements and the results show that the detection ability has a 10 dB improvement compared with the common constant false alarm rate(CFAR)detection. 展开更多
关键词 forward scatter radar(FSR) Global Navigation Satellite System(GNSS) time-frequency distribution Rényi entropy signal detection
下载PDF
Origin of Sexy Prime Numbers, Origin of Cousin Prime Numbers, Equations from Supposedly Prime Numbers, Origin of the Mersenne Number, Origin of the Fermat Number
10
作者 Mady Ndiaye 《Advances in Pure Mathematics》 2024年第5期321-332,共12页
We have found through calculations that the differences between the closest supposed prime numbers other than 2 and 3 defined in the articles are: 2;4: and 6. For those whose difference is equal to 6, we showed their ... We have found through calculations that the differences between the closest supposed prime numbers other than 2 and 3 defined in the articles are: 2;4: and 6. For those whose difference is equal to 6, we showed their origin then we classified them into two categories according to their classes, we showed in which context two prime numbers which differ from 6 are called sexy and in what context they are said real sexy prime. For those whose difference is equal to 4, we showed their origin then we showed that two prime numbers which differ from 4, that is to say two cousin prime numbers, are successive. We made an observation on the supposed prime numbers then we established two pairs of equations from this observation and deduced the origin of the Mersenne number and that of the Fermat number. 展开更多
关键词 Cousin Prime numbers Sexy Prime numbers Real Sexy Prime numbers Equations from Supposed Prime numbers Mersenne number Fermat number Supposed Prime numbers Prime numbers
下载PDF
Preliminary Identification of a Prime Number Other Than 2 and 3, the Origin of Twin Prime Numbers, the Structure of the Chain of Prime Numbers and the Set of Prime Numbers Less Than a Given Integer
11
作者 Mady Ndiaye 《Advances in Pure Mathematics》 2024年第1期30-48,共19页
The application of the Euclidean division theorem for the positive integers allowed us to establish a set which contains all the prime numbers and this set we called it set of supposedly prime numbers and we noted it ... The application of the Euclidean division theorem for the positive integers allowed us to establish a set which contains all the prime numbers and this set we called it set of supposedly prime numbers and we noted it E<sub>sp</sub>. We subsequently established from the previous set the set of non-prime numbers (the set of numbers belonging to this set and which are not prime) denoted E<sub>np</sub>. We then extracted from the set of supposedly prime numbers the numbers which are not prime and the set of remaining number constitutes the set of prime numbers denoted E<sub>p</sub>. We have deduced from the previous set, the set of prime numbers between two natural numbers. We have explained during our demonstrations the origin of the twin prime numbers and the structure of the chain of prime numbers. 展开更多
关键词 Supposedly Prime numbers Non-Prime numbers Prime numbers Prime numbers Less Than a Given Integer Prime numbers between Two Given Integers
下载PDF
On the Number of Primes in the Interval (x, 2x) by an Elementary Method
12
作者 Sudhindra B. Kittur 《Advances in Pure Mathematics》 2024年第1期16-29,共14页
An elementary formula to know the number of primes in the interval (x, 2x) close to the exact figure for a fixed x is given here. A new elementary equation is derived (a relation between prime numbers and composite nu... An elementary formula to know the number of primes in the interval (x, 2x) close to the exact figure for a fixed x is given here. A new elementary equation is derived (a relation between prime numbers and composite numbers distributed in the interval [1, 2x]). An elementary method to know the number of primes in a given magnitude is suitably placed in the form of a general formula, and we have proved it. The general formula is applied to the terms of the equation, and a tactical simplification of the terms gives rise to an expression whose verification envisages scope for its further studies. 展开更多
关键词 Prime numbers Composite numbers EXPRESSION INTEGERS
下载PDF
Analysis of the joint detection capability of the SMILE satellite and EISCAT-3D radar 被引量:2
13
作者 JiaoJiao Zhang TianRan Sun +7 位作者 XiZheng Yu DaLin Li Hang Li JiaQi Guo ZongHua Ding Tao Chen Jian Wu Chi Wang 《Earth and Planetary Physics》 EI CSCD 2024年第1期299-306,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite European Incoherent Scatter Sciences Association(EISCAT)-3D radar joint detection
下载PDF
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment
14
作者 Abdulrahman Alzahrani 《Computers, Materials & Continua》 SCIE EI 2024年第8期2331-2349,共19页
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent ... The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices.Anomaly detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual activities.Machine learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device behaviour.In addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to botnets.Various ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT systems.To overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)technique.The GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT environment.For data preprocessing,the min-max data normalization approach is primarily used.The GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature subsets.Moreover,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet detection.Finally,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM method.The experimental validation of the GTODL-BADC technique can be tested on a benchmark dataset.The simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process. 展开更多
关键词 Botnet detection internet of things gorilla troops optimizer hyperparameter tuning intrusion detection system
下载PDF
Establishment and performance analysis of a new multiplex detection method for influenza an and B virus antigen
15
作者 Cheng-Jing Xia Bao-Hua Li +3 位作者 Yan-Ni Guo Xiao-He Zhou Run-Ling Zhang Ying-No Niu 《World Journal of Clinical Cases》 SCIE 2024年第23期5338-5345,共8页
BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevent... BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevention.Quantum dot-encoded microspheres have been widely used in immunodetection.The integration of quantum dot-encoded microspheres with flow cytometry is a well-established technique that enables rapid analysis.Thus,establishing a multiplex detection method for influenza A and B virus antigens based on flow cytometry quantum dot microspheres will help in disease diagnosis.AIM To establish a codetection method of influenza A and B virus antigens based on flow cytometry quantum dot-encoded microsphere technology,which forms the foundation for the assays of multiple respiratory virus biomarkers.METHODS Different quantum dot-encoded microspheres were used to couple the monoclonal antibodies against influenza A and B.The known influenza A and B antigens were detected both separately and simultaneously on a flow cytometer,and the detection conditions were optimized to establish the influenza A and B antigen codetection method,which was utilized for their detection in clinical samples.The results were compared with the fluorescence quantitative polymerase chain reaction(PCR)method to validate the clinical performance of this method.RESULTS The limits of detection of this method were 26.1 and 10.7 pg/mL for influenza A and B antigens,respectively,which both ranged from 15.6 to 250000 pg/mL.In the clinical sample evaluation,the proposed method well correlated with the fluorescent quantitative PCR method,with positive,negative,and overall compliance rates of 57.4%,100%,and 71.6%,respectively.CONCLUSION A multiplex assay for quantitative detection of influenza A and B virus antigens has been established,which is characterized by high sensitivity,good specificity,and a wide detection range and is promising for clinical applications. 展开更多
关键词 Influenza A Influenza B Quantum dot microspheres Antigen detection Multiplex detection
下载PDF
The wheat sucrose synthase gene TaSus1 is a determinant of grain number per spike
16
作者 Liping Shen Lili Zhang +20 位作者 Changbin Yin Xiaowan Xu Yangyang Liu Kuocheng Shen He Wu Zhiwen Sun Ke Wang Zhonghu He Xueyong Zhang Chenyang Hao Jian Hou Aoyue Bi Xuebo Zhao Daxing Xu Botao Ye Xuchang Yu Ziying Wang Danni Liu Yuanfeng Hao Fei Lu Zifeng Guo 《The Crop Journal》 SCIE CSCD 2024年第1期295-300,共6页
Some haplotypes of the sucrose synthase gene TaSus1 are associated with thousand-grain weight(TGW)in wheat(Triticum aestivum L.).However,no mutations have been identified within the gene to test this association.The e... Some haplotypes of the sucrose synthase gene TaSus1 are associated with thousand-grain weight(TGW)in wheat(Triticum aestivum L.).However,no mutations have been identified within the gene to test this association.The effects of TaSus1 on grain number per spike(GNS)also are largely unknown.Our previous genome-wide association study identified TaSus-A1 as a candidate gene controlling fertile spikelet number per spike(FSN).In the present study,we generated two independent mutants for the three TaSus1 homoeologs by CRISPR/Cas9-mediated genome editing.The triple mutants displayed lower FSN,GNS,grain number per spikelet(GNST),and TGW than wild-type plants.In 306 hexaploid wheat accessions,two single-nucleotide polymorphisms in TaSus-A1 contributed differently to GNS.Introgression of the two alleles into a wheat genetic background confirmed their effects.The alleles differed in geographical distribution among the accessions. 展开更多
关键词 Domestication selection Fertile spikelet number per spike(FSN) Geographical differentiation Grain number per spike(GNS) TaSus1
下载PDF
Phenotypic Detection of Enterobacterales Strains Susceptible of Producing OXA-48 Carbapenemase
17
作者 Abdoulaye Seck Abdou Diop +5 位作者 Babacar Ndiaye Assane Dieng Awa Ba Amadou Diop Chantal Mahou Douala-Djemba Thierno Abdoulaye Diallo 《Advances in Microbiology》 CAS 2024年第2期115-121,共7页
Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type O... Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type OXA-48 (Ambler class D) have been identified in Dakar. The aim of this study was to evaluate the phenotypic detection of OXA-48 CPE using a temocillin disc (30 μg). Methodology: A retrospective study was carried out at Medical Biology Laboratory of Pasteur Institute in Dakar on Ertapenem-Resistant Enterobacterales (ERE) strains isolated from 2015 to 2017. These strains were then tested with a 30 μg temocillin disc. Any strain resistant to temocillin (inhibition diameter Results: Forty-one ERE isolated during the study period were tested, of which 34 (82.9%) were OXA-48 based on phenotypic detection using temocillin disc and confirmed by PCR (100%). OXA-48 CPE strains detected were composed of Klebsiella pneumoniae (n = 14;41.2%), Enterobacter cloacae (n = 8;23.5%), Escherichia coli (n = 7, 20.5%), Citrobacter freundii (n = 3;8.8%), Cronobacter sakazakii (n = 1;3%) and Morganella morganii (n = 1;3%). Conclusion: Temocillin resistance has a good positive predictive value for detecting OXA-48 CPE by phenotypic method, confirmed by PCR. Temocillin is therefore a good marker for detection of OXA-48 CPE except Hafnia alvei. 展开更多
关键词 ERTAPENEM Temocillin Phenotypic detection Carbapenemase-Producing Enterobacterales OXA-48
下载PDF
Automated Vulnerability Detection of Blockchain Smart Contacts Based on BERT Artificial Intelligent Model
18
作者 Feng Yiting Ma Zhaofeng +1 位作者 Duan Pengfei Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期237-251,共15页
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De... The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy. 展开更多
关键词 BERT blockchain smart contract vulnerability detection
下载PDF
Improvement of High-Speed Detection Algorithm for Nonwoven Material Defects Based on Machine Vision
19
作者 LI Chengzu WEI Kehan +4 位作者 ZHAO Yingbo TIAN Xuehui QIAN Yang ZHANG Lu WANG Rongwu 《Journal of Donghua University(English Edition)》 CAS 2024年第4期416-427,共12页
Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,maki... Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,making it a widely adopted approach in various industrial fields.This paper mainly studied the defect detection method for nonwoven materials based on the improved Nano Det-Plus model.Using the constructed samples of defects in nonwoven materials as the research objects,transfer learning experiments were conducted based on the Nano DetPlus object detection framework.Within this framework,the Backbone,path aggregation feature pyramid network(PAFPN)and Head network models were compared and trained through a process of freezing,with the ultimate aim of bolstering the model's feature extraction abilities and elevating detection accuracy.The half-precision quantization method was used to optimize the model after transfer learning experiments,reducing model weights and computational complexity to improve the detection speed.Performance comparisons were conducted between the improved model and the original Nano Det-Plus model,YOLO,SSD and other common industrial defect detection algorithms,validating that the improved methods based on transfer learning and semi-precision quantization enabled the model to meet the practical requirements of industrial production. 展开更多
关键词 defect detection nonwoven materials deep learning object detection algorithm transfer learning halfprecision quantization
下载PDF
Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention
20
作者 Yifan Gao Jieming Zhang +1 位作者 Zhanchen Chen Xianchao Chen 《Computers, Materials & Continua》 SCIE EI 2024年第4期493-507,共15页
In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower s... In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection. 展开更多
关键词 Anomaly detection TRANSFORMER graph structure
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部