Skip to Content

446 Results Found

  • Article
  • Open Access
9 Citations
6,532 Views
22 Pages

From Forensics to Clinical Research: Expanding the Variant Calling Pipeline for the Precision ID mtDNA Whole Genome Panel

  • Filipe Cortes-Figueiredo,
  • Filipa S. Carvalho,
  • Ana Catarina Fonseca,
  • Friedemann Paul,
  • José M. Ferro,
  • Sebastian Schönherr,
  • Hansi Weissensteiner and
  • Vanessa A. Morais

6 November 2021

Despite a multitude of methods for the sample preparation, sequencing, and data analysis of mitochondrial DNA (mtDNA), the demand for innovation remains, particularly in comparison with nuclear DNA (nDNA) research. The Applied Biosystems™ Precision I...

  • Review
  • Open Access
11 Citations
4,446 Views
36 Pages

28 August 2024

Short Tandem Repeat (STR) testing via capillary electrophoresis is undoubtedly the most popular forensic genetic testing method. However, its low multiplexing capabilities and limited performance with challenging samples are among the factors pushing...

  • Article
  • Open Access
1,939 Views
21 Pages

Enhancement of the Precision ID Mitochondrial DNA Whole Genome System for Challenging Unidentified Human Remains

  • Lauren C. Canale,
  • Mavis Date-Chong,
  • Jeanette Wallin,
  • Sandra Sheehan,
  • Jessica Battaglia,
  • Michelle Halsing and
  • Daniela Cuenca

22 January 2025

Background: The Precision ID mitochondrial (mt) DNA Whole Genome system is a fully automated massively parallel sequencing (MPS) solution for the whole mitochondrial genome. While extremely sensitive, the Precision ID system is susceptible to inhibit...

  • Article
  • Open Access
31 Citations
5,067 Views
17 Pages

4 November 2020

The advent of massively parallel sequencing (MPS) in the past decade has opened the doors to mitochondrial whole-genome sequencing. Mitochondrial (mt) DNA is used in forensics due to its high copy number per cell and maternal mode of inheritance. Con...

  • Article
  • Open Access
18 Citations
4,875 Views
16 Pages

Interpreting Mixture Profiles: Comparison Between Precision ID GlobalFiler™ NGS STR Panel v2 and Traditional Methods

  • Michele Ragazzo,
  • Stefania Carboni,
  • Valerio Caputo,
  • Carlotta Buttini,
  • Laura Manzo,
  • Valeria Errichiello,
  • Giulio Puleri and
  • Emiliano Giardina

26 May 2020

Forensic investigation for the identification of offenders, recognition of human remains, and verification of family relationships requires the analysis of particular types of highly informative DNA markers, which have high discriminatory power and a...

  • Article
  • Open Access
563 Views
12 Pages

Internal Validation of Mitochondrial DNA Control Region Using the Precision ID mtDNA Control Region Panel

  • Esther Lechuga-Morillas,
  • María Saiz,
  • Diana C. Vinueza-Espinosa,
  • Xiomara Gálvez,
  • María Isabel Medina-Lozano,
  • Rosario Medina-Lozano,
  • Francisco Santisteban,
  • Juan Carlos Álvarez and
  • José Antonio Lorente

16 December 2025

Background/Objectives: The sequencing of mitochondrial DNA is a valuable tool in forensic genetics, particularly in cases involving degraded samples or those with low nuclear DNA content. In this study, we performed an internal validation for an NGS-...

  • Article
  • Open Access
8 Citations
7,971 Views
12 Pages

22 May 2015

The paper presents a new approach in the field of precise electrolytic conductivity measurements with planar thin- and thick-film electrodes. This novel measuring method was developed for measurement with comb-like electrodes called interdigitated el...

  • Article
  • Open Access
6 Citations
4,754 Views
17 Pages

25 February 2022

An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify events either as normal or anomalous and trigger the adequate response. W...

  • Systematic Review
  • Open Access
4 Citations
2,492 Views
21 Pages

Methods for Overcoming Chemoresistance in Head and Neck Squamous Cell Carcinoma: Keeping the Focus on Cancer Stem Cells, a Systematic Review

  • Maria Eleonora Bizzoca,
  • Vito Carlo Alberto Caponio,
  • Lorenzo Lo Muzio,
  • Pier Paolo Claudio and
  • Antonio Cortese

29 August 2024

According to the “cancer stem cell” (CSCs) theory, tumors are a diverse and expanding group of malignant cells that originate from a small number of CSCs. Despite treatment, these cells can still become active and proliferate, which can r...

  • Brief Report
  • Open Access
5 Citations
2,733 Views
7 Pages

18 May 2023

Examination of STR markers using the MPS technology is becoming more common in forensic genetics, but scientists still have insufficient experience in dealing with ambiguous results. However, it is always essential to resolve discordant data if we wa...

  • Article
  • Open Access
3 Citations
3,690 Views
16 Pages

15 May 2022

Single nucleotide polymorphisms (SNPs) support robust analysis on degraded DNA samples. However, the development of a systematic method to interpret the profiles derived from the mixtures is less studied, and it remains a challenge due to the bi-alle...

  • Proceeding Paper
  • Open Access
2 Citations
2,043 Views
9 Pages

Plant and fruit diseases significantly impact agricultural economies by diminishing crop quality and yield. Developing precise, automated detection techniques is crucial to minimize losses and drive economic growth. We introduce YOLO-AppleScab, integ...

  • Article
  • Open Access
14 Citations
4,078 Views
20 Pages

Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems

  • Ivan Babić,
  • Aleksandar Miljković,
  • Milan Čabarkapa,
  • Vojkan Nikolić,
  • Aleksandar Đorđević,
  • Milan Ranđelović and
  • Dragan Ranđelović

27 March 2021

This paper presents a novel approach for an Intrusion Detection System (IDS) based on one kind of asymmetric optimization which use any three already well-known IDS algorithms and Triple Modular Redundancy (TMR) algorithm together. Namely, a variable...

  • Article
  • Open Access
10 Citations
3,360 Views
27 Pages

ID-Det: Insulator Burst Defect Detection from UAV Inspection Imagery of Power Transmission Facilities

  • Shangzhe Sun,
  • Chi Chen,
  • Bisheng Yang,
  • Zhengfei Yan,
  • Zhiye Wang,
  • Yong He,
  • Shaolong Wu,
  • Liuchun Li and
  • Jing Fu

5 July 2024

The global rise in electricity demand necessitates extensive transmission infrastructure, where insulators play a critical role in ensuring the safe operation of power transmission systems. However, insulators are susceptible to burst defects, which...

  • Article
  • Open Access
6 Citations
3,923 Views
31 Pages

A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network

  • Khoa Dinh Nguyen Dang,
  • Peppino Fazio and
  • Miroslav Voznak

In modern network security setups, Intrusion Detection Systems (IDS) are crucial elements that play a key role in protecting against unauthorized access, malicious actions, and policy breaches. Despite significant progress in IDS technology, two of t...

  • Article
  • Open Access
2 Citations
2,468 Views
17 Pages

A Maximum-Entropy Fuzzy Clustering Approach for Cancer Detection When Data Are Uncertain

  • Mario Fordellone,
  • Ilaria De Benedictis,
  • Dario Bruzzese and
  • Paolo Chiodini

8 February 2023

(1) Background: Cancer is a leading cause of death worldwide and each year, approximately 400,000 children develop cancer. Early detection of cancer greatly increases the chances for successful treatment, while screening aims to identify individuals...

  • Article
  • Open Access
1 Citations
2,914 Views
43 Pages

CORE-ReID V2: Advancing the Domain Adaptation for Object Re-Identification with Optimized Training and Ensemble Fusion

  • Trinh Quoc Nguyen,
  • Oky Dicky Ardiansyah Prima,
  • Syahid Al Irfan,
  • Hindriyanto Dwi Purnomo and
  • Radius Tanone

This study presents CORE-ReID V2, an enhanced framework built upon CORE-ReID V1. The new framework extends its predecessor by addressing unsupervised domain adaptation (UDA) challenges in person ReID and vehicle ReID, with further applicability to ob...

  • Article
  • Open Access
13 Citations
3,466 Views
24 Pages

Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm

  • Sunil Kaushik,
  • Akashdeep Bhardwaj,
  • Abdullah Alomari,
  • Salil Bharany,
  • Amjad Alsirhani and
  • Mohammed Mujib Alshahrani

20 September 2022

The increase in internet connectivity has led to an increased usage of the Internet of Things (IoT) and devices on the internet. These IoT devices are becoming the backbone of Industry 4.0. The dependence on IoT devices has made them vulnerable to cy...

  • Article
  • Open Access
29 Citations
5,325 Views
34 Pages

24 December 2024

The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in indus...

  • Article
  • Open Access
13 Citations
8,488 Views
13 Pages

31 December 2016

Interdigitated dielectrometry sensors (IDS) are capacitive sensors investigated to precisely measure the relative permittivity ( ϵ r ) of insulating liquids. Such liquids used in the power industry exhibit a change in ϵ r as they de...

  • Article
  • Open Access
2 Citations
3,907 Views
10 Pages

New Faecal Calprotectin Assay by IDS: Validation and Comparison to DiaSorin Method

  • Vincent Castiglione,
  • Maëlle Berodes,
  • Pierre Lukas,
  • Edouard Louis,
  • Etienne Cavalier and
  • Laurence Lutteri

27 September 2022

Background: The faecal calprotectin (FC) measurement is used for inflammatory bowel disease (IBD) diagnosis and follow-up. The aim of this study was to validate for the first time the new IDS FC extraction device and immunoassay kit, and to compare i...

  • Article
  • Open Access
485 Views
28 Pages

Influence of Relative Density of Sands on Their Oedometric Moduli

  • Giang Nguyen,
  • Roman Bulko,
  • Veronika Adamová and
  • Ján Mihalík

6 December 2025

In laboratory testing, analyzing the influence of various factors on oedometer test results is essential, since the oedometric modulus (Eoed) directly affects e. g. footwear impressions in forensic engineering. This study focused on incremental loadi...

  • Article
  • Open Access
4 Citations
3,797 Views
12 Pages

30 April 2022

The global mean sea level (GMSL) has been measured precisely by the space geodetic remote-sensing technique of radar altimetry since the 1990s. Aside from the well-studied seasonality and secular sea level rise, here we focus on GMSL variation on the...

  • Opinion
  • Open Access
23 Citations
5,279 Views
10 Pages

16 September 2021

More than seven decades have passed since the discovery of a proteolytic activity within crude tissue extracts that would become known as insulin-degrading enzyme (IDE). Certainly much has been learned about this atypical zinc-metallopeptidase; at th...

  • Article
  • Open Access
53 Citations
5,639 Views
20 Pages

Automated Behavior Recognition and Tracking of Group-Housed Pigs with an Improved DeepSORT Method

  • Shuqin Tu,
  • Qiantao Zeng,
  • Yun Liang,
  • Xiaolong Liu,
  • Lei Huang,
  • Shitong Weng and
  • Qiong Huang

12 November 2022

Pig behavior recognition and tracking in group-housed livestock are effective aids for health and welfare monitoring in commercial settings. However, due to demanding farm conditions, the targets in the pig videos are heavily occluded and overlapped,...

  • Article
  • Open Access
4 Citations
2,405 Views
17 Pages

22 October 2023

The objective of vehicle search is to locate and identify vehicles in uncropped, real-world images, which is the combination of two tasks: vehicle detection and re-identification (Re-ID). As an emerging research topic, vehicle search plays a signific...

  • Review
  • Open Access
5 Citations
12,078 Views
9 Pages

Iron deficiency (ID) is a critical public health issue globally and the most prevalent cause of anemia. Iron deficiency anemia (IDA) affects approximately 1.2 billion individuals worldwide, and it is estimated that non-anemic iron deficiency (NAID) i...

  • Article
  • Open Access
29 Citations
11,751 Views
21 Pages

27 October 2021

As part of research on technology for automatic conversion of image-format piping and instrumentation diagram (P&ID) into digital P&ID, the present study proposes a method for recognizing various types of lines and flow arrows in image-format...

  • Article
  • Open Access
381 Views
40 Pages

Estimation of Fractal Dimension and Super-Resolution Reconstruction for Person Re-Identification in Images from Infrared Surveillance Camera

  • Seung Yong Jung,
  • Dong Chan Lee,
  • Min Su Jeong,
  • Seong In Jeong,
  • Hyun Woo Song,
  • Ho Won Lee and
  • Kang Ryoung Park

Person re-identification (Re-ID) using infrared surveillance cameras has attracted increasing attention due to its robustness under low-light conditions. However, infrared images generally suffer from a low spatial resolution, which degrades Re-ID pe...

  • Review
  • Open Access
31 Citations
6,279 Views
11 Pages

20 April 2018

Nucleoside analogs have been frequently identified as antiviral agents. In recent years, gemcitabine, a cytidine analog in clinical use for the treatment of many solid tumors, was also shown to have antiviral activity against a broad range of viruses...

  • Article
  • Open Access
7 Citations
4,041 Views
20 Pages

11 October 2021

In recent years, many imaging systems have been developed to monitor the physiological and behavioral status of dairy cows. However, most of these systems do not have the ability to identify individual cows because the systems need to cooperate with...

  • Article
  • Open Access
8 Citations
4,519 Views
20 Pages

28 April 2024

The Controller Area Network (CAN), widely used for vehicular communication, is vulnerable to multiple types of cyber-threats. Attackers can inject malicious messages into the CAN bus through various channels, including wireless methods, entertainment...

  • Feature Paper
  • Article
  • Open Access
33 Citations
4,644 Views
12 Pages

6 January 2022

The development of a rapid analytical approach for determining levels of antibacterial agents, plasticizers, and ultraviolet filters in biosamples is crucial for individual exposure assessment. We developed an analytical method to determine the level...

  • Article
  • Open Access
11 Citations
5,388 Views
14 Pages

Precise Fabrication of Porous Microspheres by Iso-Density Emulsion Combined with Microfluidics

  • Yuxiao Shi,
  • Xin Zhang,
  • Ketao Mu,
  • Yifan Wang,
  • Ting Jiang,
  • Shangtong Jiang,
  • Shengmin Zhang and
  • Yingying Du

30 June 2022

Polymer porous microspheres with large specific surface areas and good fluidity have promising important applications in the biomedical field. However, controllable fabrication of porous microspheres with precise size, morphology, and pore structure...

  • Article
  • Open Access
5 Citations
1,942 Views
18 Pages

A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks

  • Anubhav Kumar,
  • Rajamani Radhakrishnan,
  • Mani Sumithra,
  • Prabu Kaliyaperumal,
  • Balamurugan Balusamy and
  • Francesco Benedetto

The rapid expansion of network environments has introduced significant cybersecurity challenges, particularly in handling high-dimensional traffic and detecting sophisticated threats. This study presents a novel, scalable Hybrid Autoencoder–Ext...

  • Article
  • Open Access
2,267 Views
14 Pages

Microfabricated rGO/PANI Interdigitated Electrodes for Reference-Free, Label-Free pH Sensing on Flexible Substrates

  • Maryam Sepehri Gohar,
  • Ekin Asim Ozek,
  • Melih Can Tasdelen,
  • Burcu Arman Kuzubasoglu,
  • Yaser Vaheb and
  • Murat Kaya Yapici

27 November 2025

We present a flexible pH sensor which leverages the unique properties of reduced graphene oxide/polyaniline (rGO/PANI) composite films through an efficient and scalable hybrid microfabrication approach, wherein the rGO/PANI films are conformally coat...

  • Article
  • Open Access
9 Citations
3,513 Views
29 Pages

Intrusion Detection System Based on Multi-Level Feature Extraction and Inductive Network

  • Junyi Mao,
  • Xiaoyu Yang,
  • Bo Hu,
  • Yizhen Lu and
  • Guangqiang Yin

With the rapid development of the internet, network security threats are becoming increasingly complex and diverse, making traditional intrusion detection systems (IDSs) inadequate for handling the growing variety of sophisticated attacks. In particu...

  • Article
  • Open Access
15 Citations
3,675 Views
19 Pages

Reduced Tilting Effect of Smartphone CMOS Image Sensor in Visible Light Indoor Positioning

  • Md Habibur Rahman,
  • Mohammad Abrar Shakil Sejan,
  • Jong-Jin Kim and
  • Wan-Young Chung

Visible light positioning (VLP) using complementary metal–oxide–semiconductor (CMOS) image sensors is a cost-effective solution to the increasing demand for an indoor positioning system. However, in most of the existing VLP systems with a...

  • Article
  • Open Access
1 Citations
1,170 Views
29 Pages

25 September 2025

As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has involved the us...

  • Article
  • Open Access
10 Citations
3,837 Views
14 Pages

The rapidly increasing use of the internet has led to an increase in new devices and technologies; however, attack and security violations have grown exponentially as well. In order to detect and prevent attacks, an Intrusion Detection System (IDS) i...

  • Article
  • Open Access
14 Citations
3,310 Views
21 Pages

13 October 2023

Intrusion detection systems (IDSs) play a pivotal role in safeguarding networks and systems against malicious activities. However, the challenge of imbalanced datasets significantly impacts IDS research, skewing learning models towards the majority c...

  • Article
  • Open Access
18 Citations
8,063 Views
19 Pages

20 February 2024

This research work highlights significant achievements in the domain of intrusion detection systems (IDSs) for autonomous vehicles, which are crucial in enhancing their safety, reliability, and cybersecurity. This study introduces an approach that le...

  • Review
  • Open Access
1,461 Views
24 Pages

3 December 2025

Background: Antibodies have the unique ability to recognize antigens and to be recognized as antigens by other antibodies, creating a balanced network that regulates the humoral part of the immune system. An antibody that uniquely identifies another...

  • Article
  • Open Access
4 Citations
1,974 Views
17 Pages

On the Study of Joint YOLOv5-DeepSort Detection and Tracking Algorithm for Rhynchophorus ferrugineus

  • Shuai Wu,
  • Jianping Wang,
  • Wei Wei,
  • Xiangchuan Ji,
  • Bin Yang,
  • Danyang Chen,
  • Huimin Lu and
  • Li Liu

17 February 2025

The Red Palm Weevil (RPW, Rhynchophorus ferrugineus) is a destructive pest of palm plants that can cause the death of the entire plant when infested. To enhance the efficiency of RPW control, a novel detection and tracking algorithm based on the join...

  • Article
  • Open Access
700 Views
15 Pages

Person Re-Identification Under Non-Overlapping Cameras Based on Advanced Contextual Embeddings

  • Chi-Hung Chuang,
  • Tz-Chian Huang,
  • Chong-Wei Wang,
  • Jung-Hua Lo and
  • Chih-Lung Lin

12 November 2025

Person Re-identification (ReID), a critical technology in intelligent surveillance, aims to accurately match specific individuals across non-overlapping camera networks. However, factors in real-world scenarios such as variations in illumination, vie...

  • Article
  • Open Access
26 Citations
4,499 Views
23 Pages

28 October 2023

The Internet of Vehicles(IoV) employs vehicle-to-everything (V2X) technology to establish intricate interconnections among the Internet, the IoT network, and the Vehicle Networks (IVNs), forming a complex vehicle communication network. However, the v...

  • Article
  • Open Access
3 Citations
2,139 Views
21 Pages

22 March 2025

Building information modeling (BIM) relies on well-defined information requirements to ensure data availability, accurate data exchange, and model consistency. The information delivery specification (IDS) schema has emerged as a standard for structur...

  • Article
  • Open Access
10 Citations
5,059 Views
25 Pages

Deep neural networks (DNNs) are highly effective for intrusion detection systems (IDS) due to their ability to learn complex patterns and detect potential anomalies within the systems. However, their high resource consumption requirements including m...

  • Article
  • Open Access
3 Citations
2,505 Views
26 Pages

26 September 2022

Recently, research on the methods that use images captured during day and night times has been actively conducted in the field of person re-identification (ReID). In particular, ReID has been increasingly performed using infrared (IR) images captured...

  • Article
  • Open Access
2 Citations
2,614 Views
25 Pages

Echo-ID: Smartphone Placement Region Identification for Context-Aware Computing

  • Xueting Jiang,
  • Zhongning Zhao,
  • Zhiyuan Li and
  • Feng Hong

26 April 2023

Region-function combinations are essential for smartphones to be intelligent and context-aware. The prerequisite for providing intelligent services is that the device can recognize the contextual region in which it resides. The existing region recogn...

of 9