-
1
Flickers, Bursts, and Dips: Detecting Rapid Variability with the g(2) Autocorrelation Function
Published 2025-01-01Get full text
Article -
2
ABDviaMSIFAT: Abnormal Crowd Behavior Detection Utilizing a Multi-Source Information Fusion Technique
Published 2025-01-01“…To solve this issue, we suggest a new method that combines data from various sources with different characteristics to enhance the precision of detecting human behavior in crowds. …”
Get full text
Article -
3
Functionalized hydrogel-based colorimetric sensor for Cu2+ detection
Published 2025-01-01“…This functionalized hydrogel matrix sensor highlights a promising potential for environmental safety applications.…”
Get full text
Article -
4
An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R...
Published 2025-06-01“…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
Get full text
Article -
5
DIAMOND2GO: rapid Gene Ontology assignment and enrichment detection for functional genomics
Published 2025-08-01Get full text
Article -
6
Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols
Published 2012-01-01“…Sensorimotor cortex is activated similarly during motor execution and motor imagery. The study of functional connectivity networks (FCNs) aims at successfully modeling the dynamics of information flow between cortical areas. …”
Get full text
Article -
7
Detecting ROM changes using KINOVEA after muscle decontracture technique
Published 2024-06-01Get full text
Article -
8
Potential Source Density Function: A New Tool for Identifying Air Pollution Sources
Published 2022-01-01“…Abstract Potential source density function (PSDF) is developed to identify, that is, locate and quantify, source areas of ambient trace species based on Gaussian process regression (GPR), a machine-learning technique. …”
Get full text
Article -
9
-
10
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
11
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
12
Source Type Recognition Algorithm of Radio Emission using Radial Basis Functions
Published 2017-02-01Get full text
Article -
13
Dual‐Function Ceramic Pigments for Energy‐Efficient and Secure Autonomous Vehicles
Published 2025-07-01“…Consequently, a bi‐function ceramic pigment (BFCP) is fabricated with both superior RC performance and heightened LiDAR detectability compared to commercial pigments. …”
Get full text
Article -
14
Spin-dependent edge detection and imaging enabled by optical circularly polarised states
Published 2025-04-01“…Furthermore, these two independent functions can be easily switched by altering the circular polarisation state of the light source.…”
Get full text
Article -
15
Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods
Published 2015-01-01“…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
Get full text
Article -
16
Go Source Code Vulnerability Detection Method Based on Graph Neural Network
Published 2025-06-01“…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
Get full text
Article -
17
An Attomolar-Level Optical Device for Monitoring Receptor–Analyte Interactions Without Functionalization Steps: A Case Study of Cytokine Detection
Published 2025-02-01“…The POF-based device was proven to be effective for detecting several interleukins at the attomolar level in a few minutes and without functionalization processes.…”
Get full text
Article -
18
Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water
Published 2024-12-01“…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
Get full text
Article -
19
Axial-UNet++ Power Line Detection Network Based on Gated Axial Attention Mechanism
Published 2024-12-01Get full text
Article -
20
Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model
Published 2025-04-01“…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
Get full text
Article