-
101
-
102
Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs
Published 2025-06-01“…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
Get full text
Article -
103
Phenotypic variation of Thenus spp. (Decapoda, Scyllaridae) in the waters of southern Thailand and Malaysia using multivariate morphometric analysis
Published 2025-01-01“… Thenus spp. are slipper lobsters which are commercially significant as a food source with good aquaculture potential. This study focuses on collecting population information on Thenus orientalis and Thenus indicus from selected sites in southern Thailand and Malaysia to inform sustainable fisheries management about the resources. …”
Get full text
Article -
104
Software with artificial intelligence-derived algorithms for detecting and analysing lung nodules in CT scans: systematic review and economic evaluation
Published 2025-05-01“…Information required to populate the models included the prevalence of lung nodules, risk of lung cancer with different nodule sizes, sensitivity and specificity for nodule detection, nodule type and size distributions in different population, resource use, costs and utilities. …”
Get full text
Article -
105
Vehicle detection method based on multi-layer selective feature for UAV aerial images
Published 2025-07-01“…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
Get full text
Article -
106
-
107
Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water
Published 2024-12-01“…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
Get full text
Article -
108
Axial-UNet++ Power Line Detection Network Based on Gated Axial Attention Mechanism
Published 2024-12-01Get full text
Article -
109
THE SUCCESS OF SATELLITE GRAVIMETRY IN GEOPHYSICAL INVESTIGATIONS
Published 2024-03-01“…The successful geophysical researches carried out using satellite acquired gravity data from existing literature were also discussed. …”
Get full text
Article -
110
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
111
Segmentation-Based Detection for Luffa Seedling Grading Using the Seg-FL Model
Published 2024-10-01Get full text
Article -
112
An Improved Diagnosis Approach for Short-Circuit Fault Diagnosis in MPC-Based Current Source Inverter System
Published 2025-01-01“…It then leverages the cost function results from the MPC algorithm as the key diagnostic parameter derived through a comparative analysis of predicted system behavior under normal and fault conditions. …”
Get full text
Article -
113
DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model
Published 2024-11-01“…Achieving real-time detection with high accuracy, while accommodating the limited resources of edge-computing devices poses a significant challenge for anti-UAV detection. …”
Get full text
Article -
114
Leveraging Multimodal Large Language Models (MLLMs) for Enhanced Object Detection and Scene Understanding in Thermal Images for Autonomous Driving Systems
Published 2024-10-01“…Two primary research questions are addressed: the capacity of these models to detect and enumerate objects within thermal images, and to determine whether pairs of image sources represent the same scene. …”
Get full text
Article -
115
Attraction and aversion of noctuid moths to fermented food sources coordinated by olfactory receptors from distinct gene families
Published 2025-01-01“…Conclusions Our findings suggest that this functional conservation is an olfactory adaptation that has allowed noctuid moths to extend their diet to fermented food sources.…”
Get full text
Article -
116
-
117
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01“…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
Get full text
Article -
118
Dual‐Function Ceramic Pigments for Energy‐Efficient and Secure Autonomous Vehicles
Published 2025-07-01“…Consequently, a bi‐function ceramic pigment (BFCP) is fabricated with both superior RC performance and heightened LiDAR detectability compared to commercial pigments. …”
Get full text
Article -
119
-
120
YOLOGX: an improved forest fire detection algorithm based on YOLOv8
Published 2025-01-01“…To tackle issues, including environmental sensitivity, inadequate fire source recognition, and inefficient feature extraction in existing forest fire detection algorithms, we developed a high-precision algorithm, YOLOGX. …”
Get full text
Article