-
41
-
42
-
43
The FAST Ursa Major Supergroup H i Survey (FUMaS): Catalog and H i Mass Function
Published 2025-01-01“…Among them, 55 H i sources were detected for the first time, of which 32 do not have known optical redshifts. …”
Get full text
Article -
44
-
45
Toward Compliance and Transparency in Raw Material Sourcing With Blockchain and Edge AI
Published 2025-01-01“…Our fully functional prototype achieves high performance (94% F1-score, 98% recall), with minimal resource usage (8.45KB RAM, 407KB flash) and fast inference (5.25 ms), making it well-suited for deployment at the network edge. …”
Get full text
Article -
46
-
47
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01“…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
Get full text
Article -
48
-
49
Research on multi-sensor fusion detection and tracking technology for autonomous-rail rapid transit tram
Published 2022-07-01“…Firstly, a millimeter-wave radar and LiDAR are used to perceive by single sensor, and the sensing results were merged by using a multi-source fusion algorithm, to generate more accurate detection results. …”
Get full text
Article -
50
SegTrackDetect: A window-based framework for tiny object detection via semantic segmentation and tracking
Published 2025-05-01“…This work introduces SegTrackDetect, an open-source, window-based framework for small and tiny object detection. …”
Get full text
Article -
51
Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems
Published 2024-01-01“…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
Get full text
Article -
52
-
53
Analytical method for determining coordinates of the radiation source in a homogeneous medium
Published 2015-12-01“…The problem is reduced to finding the minimum of a nonlinear function of five variables. This function is the sum of the squares of the differences of the calculated and the actual time of the wave front passing through the sensor for each of the sensors. …”
Get full text
Article -
54
A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm
Published 2025-06-01“…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
Get full text
Article -
55
ENDOCRINE PANCREATIC FUNCTION IN ACUTE PANCREATITIS
Published 2014-02-01“…In a significant proportion of patients who recovered from acute pancreatitis, exocrine and endocrine functional impairments were found. This finding was not detected only in patients after severe acute pancreatitis. …”
Get full text
Article -
56
Sustainable Materials Enabled Terahertz Functional Devices
Published 2025-04-01“…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
Get full text
Article -
57
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
58
Decoding methane concentration in Alberta oil sands: A machine learning exploration
Published 2025-01-01Get full text
Article -
59
Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia
Published 2025-01-01“…Information on the frequency of a given detection limit, and the cumulative probability of detection, are provided as a function of instrument spectral resolution and noise. …”
Get full text
Article -
60
Merging Surface Plasmon Optical Detection with Electronic Sensing
Published 2024-04-01Get full text
Article