期刊文献+
共找到10,870篇文章
< 1 2 250 >
每页显示 20 50 100
Evaluating the Effect of Tillage on Carbon Sequestration Using the Minimum Detectable Difference Concept 被引量:13
1
作者 X. M. YANG C. F. DRURY +1 位作者 M. M. WANDER B. D. KAY 《Pedosphere》 SCIE CAS CSCD 2008年第4期421-430,共10页
Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow... Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow (MP) corn (Zea mays L.) and soybean (Glycine max L.) production systems. The first trial was conducted on a Maryhill silt loam (Typic Hapludalf) at Elora, Ontario, Canada, the second on a Brookston clay loam (Typic Argiaquoll) at Woodslee, Ontario, Canada, and the third on a Thorp silt loam (Argiaquic Argialboll) at Urbana, Illinois, USA. No-tillage led to significantly higher SOC concentrations in the top 5 cm compared to MP at all 3 sites. However, NT resulted in significantly lower SOC in sub-surface soils as compared to MP at Woodslee (10-20 cm, P = 0.01) and Urbana (20-30 cm, P < 0.10). No-tillage had significantly more SOC storage than MP at the Elora site (3.3 Mg C ha-1) and at the Woodslee site (6.2 Mg C ha-1) on an equivalent mass basis (1350 Mg ha-1 soil equivalent mass). Similarly, NT had greater SOC storage than MP at the Urbana site (2.7 Mg C ha-1) on an equivalent mass basis of 675 Mg ha-1 soil. However, these differences disappeared when the entire plow layer was evaluated for both the Woodslee and Urbana sites as a result of the higher SOC concentrations in MP than in NT at depth. Using the minimum detectable difference technique, we observed that up to 1500 soil sample per tillage treatment comparison will have to be collected and analyzed for the Elora and Woodslee sites and over 40 soil samples per tillage treatment comparison for the Urbana to statistically separate significant differences in the SOC contents of sub-plow depth soils. Therefore, it is impracticable, and at the least prohibitively expensive, to detect tillage-induced differences in soil C beyond the plow layer in various soils. 展开更多
关键词 carbon sequestration minimum detectable difference moldboard plow NO-TILLAGE soil depth
在线阅读 下载PDF
Effective path planning method for low detectable aircraft 被引量:2
2
作者 Wang Lingxiao Zhou Deyun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期784-789,共6页
To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS ch... To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration. 展开更多
关键词 path planning low detectable aircraft radar scattering cross section threat lever cost function
在线阅读 下载PDF
Investigating the minimum detectable activity concentration and contributing factors in airborne gamma-ray spectrometry 被引量:2
3
作者 Yi Gu Kun Sun +6 位作者 Liang-Quan Ge Yuan-Dong Li Qing-Xian Zhang Xuan Guan Wan-Chang Lai Zhong-Xiang Lin Xiao-Zhong Han 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2021年第10期30-38,共9页
In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation cou... In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation counter,volume,and energy res-olution of scintillation crystals,and flight altitude of an aircraft was investigated.To verify this theory,experi-mental devices based on NaI and CeBr 3 scintillation counters were prepared,and the potassium,uranium,and thorium contents in calibration pads obtained via the stripping ratio method and theory were compared.The MDACs of AGS under different conditions were calculated and analyzed using the proposed theory and the Monte Carlo method.The relative errors found via a comparison of the experimental and theoretical results were less than 4%.The theory of MDAC can guide the work of AGS in probing areas with low radioactivity. 展开更多
关键词 Airborne gamma-ray spectrometry(AGS) Minimum detectable activity concentration(MDAC) Sensitivity
在线阅读 下载PDF
A New Solution to Detectable Byzantine Agreement Problem
4
作者 QIN Su-Juan WEN Qiao-Yan +1 位作者 MENG Luo-Ming ZHU Fu-Chen 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第12期1013-1015,共3页
We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangleds... We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangledstate instead of singlet states,which shows that singlet states are not necessary to achieve detectable Byzantine agreement. 展开更多
关键词 quantum protocol detectable Byzantine agreement entangled state
在线阅读 下载PDF
Clinical Signifi cance of Angiographically Detectable Neovascularity in Patients with Cardiac Myxoma
5
作者 Xiaofan Peng Yichao Xiao +7 位作者 Yanan Guo Zhaowei Zhu Liyan Liao Xiaobo Liao Xinqun Hu Zhenfei Fang Xuping Li Shenghua Zhou 《Cardiovascular Innovations and Applications》 2021年第4期99-108,共10页
Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect corona... Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect coronary artery disease.However,the clinical signifi cance of these fi ndings is not fully understood.Methods:We enrolled 59 patients with cardiac myxoma who also underwent CAG between January 2013 and October 2018.Patients were followed up for a mean of 28.9 months(range 1-69 months).The clinical features,echocardiography measurements,pathological examination fi ndings,CAG results,and outcomes during follow-up were compared between patients with ADN and patients without ADN.Results:ADN was found in 25 patients(42.4%).The arteries feeding the ADN included the right coronary artery(n=15),the left circumfl ex coronary artery(n=7),and both arteries(n=3).The patients with ADN had a higher proportion of eosinophils(3.2%vs.2.2%,P=0.03)and higher low-density lipoprotein cholesterol level(2.7 mmol/L vs.2.2 mmol/L,P=0.02).Myxoma pedicles were more likely to be located in the interatrial septum in patients with ADN(96%vs.73.5%,P=0.02).No signifi cant correlation was observed between the groups in clinical manifestations,atrial arrhythmia,myxoma size,cardiac chamber size,left ventricular ejection fraction,and the prevalence of complication with coronary artery disease[16%in the ADN group(n=4)vs.20.6%in the non-ADN group(n=7),P=0.66].However,patients with ADN tended to have a lower incidence of major adverse cardiac and cerebrovascular events on long-term follow-up(0%vs.14.7%,P=0.07).Conclusion:CAG-detected ADN in patients with cardiac myxoma is associated with a borderline lower rate of major adverse cardiac and cerebrovascular events. 展开更多
关键词 Cardiac myxomas coronary angiography angiographically detectable neovascularity major adverse cardiac and cerebrovascular events
暂未订购
中国丹顶鹤迁徙路线湿地景观格局演化模式及其驱动因素
6
作者 尹梓烨 那晓东 《生态学报》 北大核心 2026年第4期1800-1814,共15页
探究丹顶鹤迁徙路线上的湿地景观格局演化模式及驱动因素,有利于构建促进物种迁徙的生态廊道、科学制定湿地修复策略、维护湿地生态系统稳定。以丹顶鹤迁徙路线上的湿地为对象,获取1990—2020年共七期土地利用/覆被数据,基于改进过后的... 探究丹顶鹤迁徙路线上的湿地景观格局演化模式及驱动因素,有利于构建促进物种迁徙的生态廊道、科学制定湿地修复策略、维护湿地生态系统稳定。以丹顶鹤迁徙路线上的湿地为对象,获取1990—2020年共七期土地利用/覆被数据,基于改进过后的景观格局状态与演化识别模型(SEDM)研究湿地格局演化模式的时空分布特征,并利用地理探测器分析其驱动因素。结果表明:(1)1990—2015年间湿地面积减少了7994km^(2),湿地萎缩严重,大量湿地转化为耕地、人工表面。2015—2020年湿地面积增加,而转入湿地的主要类型为耕地、水域和林地。(2)湿地景观格局的演化具有明显的阶段性特征,1990—2000年间湿地格局演化以破碎类型为主,收缩与减少模式占主导;2000—2015年湿地面积减少趋势放缓,发生演化的格网数量显著减少,湿地格局演化模式由减少模式向新增模式过渡;2015—2020年湿地景观格局演化以扩张类型为主,增加与新增演化模式为主导,湿地得到有效恢复。(3)湿地格局演化频数较高的区域集中在东北松嫩平原、三江平原、黄河三角洲与盐城滨海地区,气温、降水和耕地对湿地格局演化影响最为显著。其中在东北地区的松嫩和三江平原湿地格局演化频繁主要受气候变化、耕地扩张影响,而黄河三角洲和盐城湿地格局演化主要受人类活动的影响。总体来看,气候变化虽然是湿地格局演化的关键因素,但湿地格局演化从破碎转向扩张模式,主要是受人为因素的驱动。 展开更多
关键词 湿地 the state-and-evolution detection models(SEDM)模型 景观格局演化模式 地理探测器 丹顶鹤
在线阅读 下载PDF
Minimum detectable activity for NaI(Tl) airborne γ-ray spectrometry based on Monte Carlo simulation 被引量:3
7
作者 GONG ChunHui ZENG GuoQiang +2 位作者 GE LiangQuan TANG Xiaobin TAN ChengJun 《Science China(Technological Sciences)》 SCIE EI CAS 2014年第9期1840-1845,共6页
The determination of the effective minimum detectable activity (MDA) of radionuclides by a detection system plays an im- portant role in environmental radiation monitoring. In this study, the responses of an NaI(TI... The determination of the effective minimum detectable activity (MDA) of radionuclides by a detection system plays an im- portant role in environmental radiation monitoring. In this study, the responses of an NaI(TI) airborne γ ray spectrometry (AGRS) system to different radionuclides (137Cs and 131I) were investigated using the Monte Carlo technique. The MDA values were determined under different conditions according to the counting spectra obtained from the Monte Carlo simulation. The equivalent mass thickness method was applied to the Monte Carlo modeling for monitoring ground radiation to reduce sta- tistical uncertainty. The secondary source method was used to monitor both air and ground radiation. A quadratic relationship was found between the MDA and activity concentration. An exponential relationship was found between the MDA and altitude The MDA of a specific radionuclide from external detectors was found to be superior to that obtained from internal detectors under the same conditions. The MDA values in an NaI(Tl) AGRS system under different conditions can be estimated based on the results of this study. 展开更多
关键词 NaI(TI) airborne γ-ray spectrometry minimum detectable activity Monte Carlo simulation
原文传递
Improved Minimum Detectable Velocity in Bistatic Space-Based Radar 被引量:1
8
作者 李华 汤俊 彭应宁 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第1期30-34,共5页
Single orbit bistatic space-based radar (SBR) is composed of two radars in the same orbit. The characteristics of the clutter Doppler-angle spectrum of a single orbit bistatic SBR show that the slope of the mainbeam... Single orbit bistatic space-based radar (SBR) is composed of two radars in the same orbit. The characteristics of the clutter Doppler-angle spectrum of a single orbit bistatic SBR show that the slope of the mainbeam clutter spectrum is highly sensitive to the cone angles. Therefore, the minimum detectable velocity of the bistatic system is dependent on the cone angle. Then a new combined working mode of singleorbit bistatic SBR system was developed in which one radar will act as the transmitter and another as the receiver to improve detection performance for all angles. Simulation results by space-time adaptive processing verify the improved detection performance. The new design also reduces the average power of each radar system and the size and weight of the on-board solar array-battery system. 展开更多
关键词 bistatic space based radar minimum detectable velocity CLUTTER space-time adaptive processing
原文传递
Global-local feature optimization based RGB-IR fusion object detection on drone view 被引量:1
9
作者 Zhaodong CHEN Hongbing JI Yongquan ZHANG 《Chinese Journal of Aeronautics》 2026年第1期436-453,共18页
Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still st... Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still struggle to deal with the complex and changing scenarios captured by drones,mainly due to two reasons:(A)RGB-IR fusion detectors are susceptible to inferior inputs that degrade performance and stability.(B)RGB-IR fusion detectors are susceptible to redundant features that reduce accuracy and efficiency.In this paper,an innovative RGB-IR fusion detection framework based on global-local feature optimization,named GLFDet,is proposed to improve the detection performance and efficiency of drone-captured objects.The key components of GLFDet include a Global Feature Optimization(GFO)module,a Local Feature Optimization(LFO)module and a Channel Separation Fusion(CSF)module.Specifically,GFO calculates the information content of the input image from the frequency domain and optimizes the features holistically.Then,LFO dynamically selects high-value features and filters out low-value features before fusion,which significantly improves the efficiency of fusion.Finally,CSF fuses the RGB and IR features across the corresponding channels,which avoids the rearrangement of the channel relationships and enhances the model stability.Extensive experimental results show that the proposed method achieves the best performance on three popular RGB-IR datasets Drone Vehicle,VEDAI,and LLVIP.In addition,GLFDet is more lightweight than other comparable models,making it more appealing to edge devices such as drones.The code is available at https://github.com/lao chen330/GLFDet. 展开更多
关键词 Object detection Deep learning RGB-IR fusion DRONES Global feature Local feature
原文传递
基于DETR的视频时刻检索方法综述
10
作者 高杜娟 吴媛媛 +3 位作者 林文龙 谢天圻 嘉昊阳 冯昭天 《计算机工程与应用》 北大核心 2026年第5期18-38,共21页
视频时刻检索旨在根据自然语言查询精确定位视频中的特定片段,是视频理解下的重要任务之一。传统方法依赖冗余候选生成和手工特征设计,难以兼顾检索精度与计算效率。近年来,基于Detection Transformer(DETR)的端到端方法借助可学习查询... 视频时刻检索旨在根据自然语言查询精确定位视频中的特定片段,是视频理解下的重要任务之一。传统方法依赖冗余候选生成和手工特征设计,难以兼顾检索精度与计算效率。近年来,基于Detection Transformer(DETR)的端到端方法借助可学习查询机制和直接回归预测策略,简化了框架的同时提升了检索性能。对DETR在视频时刻检索中的关键技术进展进行了系统综述,回顾了DETR模型的基础原理及其在该任务中的适配改进;对DETR的模型框架结构的优化研究方法进行了分类,细分为基于输入建模的特征增强、基于跨模态对齐的交互机制优化以及基于解码器结构与时刻回归机制这三个优化方向。对主流方法进行了系统梳理与检索精度比较;结合实验结果,分析了不同优化策略对模型性能的影响,并总结了各方法在主流数据集上的表现差异。最后,针对面向真实应用场景的泛化、跨模态交互走向语义整合机制以及面向开放领域与个性化检索的扩展这三个未来发展方向进行了讨论展望,为后续研究提供理论参考与实践指导。 展开更多
关键词 视频时刻检索 Detection Transformer(DETR) 深度学习
在线阅读 下载PDF
Deep Feature-Driven Hybrid Temporal Learning and Instance-Based Classification for DDoS Detection in Industrial Control Networks
11
作者 Haohui Su Xuan Zhang +2 位作者 Lvjun Zheng Xiaojie Shen Hua Liao 《Computers, Materials & Continua》 2026年第3期708-733,共26页
Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods... Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure. 展开更多
关键词 DDoS detection transformer BiLSTM K-Nearest Neighbor representation learning network security intrusion detection real-time classification
在线阅读 下载PDF
A Comprehensive Literature Review on YOLO-Based Small Object Detection:Methods,Challenges,and Future Trends
12
作者 Hui Yu Jun Liu Mingwei Lin 《Computers, Materials & Continua》 2026年第4期258-309,共52页
Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of... Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of object detection,there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes.In particular,the YOLO(You Only Look Once)series of detection models,renowned for their real-time performance,have undergone numerous adaptations aimed at improving the detection of small targets.In this survey,we summarize the state-of-the-art YOLO-based small object detection methods.This review presents a systematic categorization of YOLO-based approaches for small-object detection,organized into four methodological avenues,namely attention-based feature enhancement,detection-head optimization,loss function,and multi-scale feature fusion strategies.We then examine the principal challenges addressed by each category.Finally,we analyze the performance of thesemethods on public benchmarks and,by comparing current approaches,identify limitations and outline directions for future research. 展开更多
关键词 Small object detection YOLO real-time detection feature fusion deep learning
在线阅读 下载PDF
AI-Powered Anomaly Detection and Cybersecurity in Healthcare IoT with Fog-Edge
13
作者 Fatima Al-Quayed 《Computer Modeling in Engineering & Sciences》 2026年第1期1339-1372,共34页
The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.Thi... The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats. 展开更多
关键词 AI-powered anomaly detection healthcare IoT fog computing CYBERSECURITY intrusion detection
在线阅读 下载PDF
A Comparative Benchmark of Deep Learning Architectures for AI-Assisted Breast Cancer Detection in Mammography Using the MammosighTR Dataset:A Nationwide Turkish Screening Study(2016–2022)
14
作者 Nuh Azginoglu 《Computer Modeling in Engineering & Sciences》 2026年第1期1151-1173,共23页
Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional comp... Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional computer-aided detection systems.Recent advances in deep learning have enabled more robust and scalable solutions for large-scale screening,yet a systematic comparison of modern object detection architectures on nationally representative datasets remains limited.This study presents a comprehensive quantitative comparison of prominent deep learning–based object detection architectures for Artificial Intelligence-assisted mammography analysis using the MammosighTR dataset,developed within the Turkish National Breast Cancer Screening Program.The dataset comprises 12,740 patient cases collected between 2016 and 2022,annotated with BI-RADS categories,breast density levels,and lesion localization labels.A total of 31 models were evaluated,including One-Stage,Two-Stage,and Transformer-based architectures,under a unified experimental framework at both patient and breast levels.The results demonstrate that Two-Stage architectures consistently outperform One-Stage models,achieving approximately 2%–4%higher Macro F1-Scores and more balanced precision–recall trade-offs,with Double-Head R-CNN and Dynamic R-CNN yielding the highest overall performance(Macro F1≈0.84–0.86).This advantage is primarily attributed to the region proposal mechanism and improved class balance inherent to Two-Stage designs.One-Stage detectors exhibited higher sensitivity and faster inference,reaching Recall values above 0.88,but experienced minor reductions in Precision and overall accuracy(≈1%–2%)compared with Two-Stage models.Among Transformer-based architectures,Deformable DEtection TRansformer demonstrated strong robustness and consistency across datasets,achieving Macro F1-Scores comparable to CNN-based detectors(≈0.83–0.85)while exhibiting minimal performance degradation under distributional shifts.Breast density–based analysis revealed increased misclassification rates in medium-density categories(types B and C),whereas Transformer-based architectures maintained more stable performance in high-density type D tissue.These findings quantitatively confirm that both architectural design and tissue characteristics play a decisive role in diagnostic accuracy.Overall,the study provides a reproducible benchmark and highlights the potential of hybrid approaches that combine the accuracy of Two-Stage detectors with the contextual modeling capability of Transformer architectures for clinically reliable breast cancer screening systems. 展开更多
关键词 Deep learning MAMMOGRAPHY breast cancer detection object detection BI-RADS classification
在线阅读 下载PDF
A State-of-the-Art Survey of Adversarial Reinforcement Learning for IoT Intrusion Detection
15
作者 Qasem Abu Al-Haija Shahad Al Tamimi 《Computers, Materials & Continua》 2026年第4期26-94,共69页
Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Tr... Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation. 展开更多
关键词 Reinforcement learning network intrusion detection adversarial training deep learning cybersecurity defense intrusion detection system and machine learning
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
16
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
CoPt graphitic nanozyme enabled naked-eye identification and colorimetric/fluorescent dual-mode detection of phenylenediamine isomers
17
作者 Luyao Guan Zhaoxin Wang +2 位作者 Shengkai Li Phouphien Keoingthong Zhuo Chen 《Chinese Chemical Letters》 2026年第2期407-414,共8页
Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessm... Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessment and human health protection.However,current visual detection methods can only distinguish individual PDA isomers and failed to identify binary or ternary mixtures.Herein,a highly active and ultrastable peroxidase(POD)-like CoPt graphitic nanozyme was used for naked-eye identification and colorimetric/fluorescent(FL)dual-mode quantitative detection of PDA isomers.The CoPt@G nanozyme effectively catalyzed the oxidation of OPD,MPD,PPD,OPD+PPD,OPD+MPD,MPD+PPD and OPD+MPD+PPD into yellow,colorless,lilac,yellow,yellow,wine red and reddish-brown products,respectively,in the presence of H_(2)O_(2).Thus,the MPD,PPD,MPD+PPD and OPD+MPD+PPD were easily identified based on the distinct color of their oxidation products,and the OPD,OPD+PPD,OPD+MPD could be further identified by the additional addition of MPD or PPD.Subsequently,CoPt@G/H_(2)O_(2)-,a 3,3′,5,5′-tetramethylbenzidine(TMB)/CoPt@G/H_(2)O_(2)-,and MPD/CoPt@G/H_(2)O_(2)-enabled colorimetric/FL dual-mode platforms for the quantitative detection of OPD,MPD and PPD were proposed.The experimental results illustrated that the constructed sensing platforms exhibit satisfactory sensitivity,comparable to that reported in previous studies.Finally,the evaluation of PDAs in water samples was realized,yielding satisfactory recoveries.This work expanded the application prospects of nanozymes in assessing environmental risks and protection of human security. 展开更多
关键词 Copt graphitic nanozyme Phenylenediamine isomers Naked-eye identification Colorimetric detection Fluorescent detection
原文传递
Non-Euclidean Models for Fraud Detection in Irregular Temporal Data Environments
18
作者 Boram Kim Guebin Choi 《Computers, Materials & Continua》 2026年第4期1771-1787,共17页
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen... Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios. 展开更多
关键词 Anomaly detection credit card transactions fraud detection graph convolutional networks non-euclidean data
在线阅读 下载PDF
A Hybrid Deep Learning Approach for Real-Time Cheating Behaviour Detection in Online Exams Using Video Captured Analysis
19
作者 Dao Phuc Minh Huy Gia Nhu Nguyen Dac-Nhuong Le 《Computers, Materials & Continua》 2026年第3期1179-1198,共20页
Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning appr... Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning approach that combines visual detection and temporal behaviour classification.The methodology utilises object detection models—You Only Look Once(YOLOv12),Faster Region-based Convolutional Neural Network(RCNN),and Single Shot Detector(SSD)MobileNet—integrated with classification models such as Convolutional Neural Networks(CNN),Bidirectional Gated Recurrent Unit(Bi-GRU),and CNN-LSTM(Long Short-Term Memory).Two distinct datasets were used:the Online Exam Proctoring(EOP)dataset from Michigan State University and the School of Computer Science,Duy Tan Unievrsity(SCS-DTU)dataset collected in a controlled classroom setting.A diverse set of cheating behaviours,including book usage,unauthorised interaction,internet access,and mobile phone use,was categorised.Comprehensive experiments evaluated the models based on accuracy,precision,recall,training time,inference speed,and memory usage.We evaluate nine detector-classifier pairings under a unified budget and score them via a calibrated harmonic mean of detection and classification accuracies,enabling deployment-oriented selection under latency and memory constraints.Macro-Precision/Recall/F1 and Receiver Operating Characteristic-Area Under the Curve(ROC-AUC)are reported for the top configurations,revealing consistent advantages of object-centric pipelines for fine-grained cheating cues.The highest overall score is achieved by YOLOv12+CNN(97.15%accuracy),while SSD-MobileNet+CNN provides the best speed-efficiency trade-off for edge devices.This research provides valuable insights into selecting and deploying appropriate deep learning models for maintaining exam integrity under varying resource constraints. 展开更多
关键词 Online exam proctoring cheating behavior detection deep learning real-time monitoring object detection human behavior recognition
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部