-
21
Go Source Code Vulnerability Detection Method Based on Graph Neural Network
Published 2025-06-01“…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
Get full text
Article -
22
-
23
Introduction of AI Technology for Objective Physical Function Assessment
Published 2024-11-01“…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
Get full text
Article -
24
Advances in preparation and application of coal-based functional nanomaterials
Published 2025-07-01“…China’s energy resource endowment, characterized by “abundant coal but scarce oil”, establishes coal’s fundamental role in the national energy system. …”
Get full text
Article -
25
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
Get full text
Article -
26
-
27
A fluorescence-enhanced inverse opal sensing film for multi-sources detection of formaldehyde
Published 2025-05-01Get full text
Article -
28
Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information
Published 2025-01-01“…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
Get full text
Article -
29
A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells
Published 2024-01-01“…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
Get full text
Article -
30
-
31
Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression
Published 2025-01-01“…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
Get full text
Article -
32
Functionalized hydrogel-based colorimetric sensor for Cu2+ detection
Published 2025-01-01“…., highly toxic and bioaccumulative contaminants in water sources, has become a critical environmental concern. …”
Get full text
Article -
33
Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report
Published 2025-01-01“…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
Get full text
Article -
34
MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection
Published 2025-12-01“…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
Get full text
Article -
35
PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels
Published 2024-01-01“…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
Get full text
Article -
36
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
37
Sources of uncertainty in DNA metabarcoding of whole communities: Implications for its use in biomonitoring
Published 2025-08-01Get full text
Article -
38
Advances in choroid-glaucoma structural-functional correlations using swept-source optical coherence tomography
Published 2025-08-01“…Understanding the role of the choroid in glaucoma may lead to the development of new therapeutic approaches and thus facilitate the early detection, diagnosis and treatment of glaucoma.…”
Get full text
Article -
39
CASE REPORT OF TWO SUCCESSFUL PREGNANCY OUTCOMES AFTER RADICAL TRACHELECTOMY
Published 2021-10-01Get full text
Article -
40
Conflict Detection of Functional Requirements Based on Clustering and Rule-Based System
Published 2024-01-01“…Functional requirement identification is the initial stage in software development and a crucial step in the success of software development. …”
Get full text
Article