-
121
Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model
Published 2025-04-01“…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
Get full text
Article -
122
Loss Function Optimization Method and Unsupervised Extraction Approach D-DBSCAN for Improving the Moving Target Perception of 3D Imaging Sonar
Published 2025-03-01“…Compared to 2D sonar images, 3D sonar images offer superior spatial positioning capabilities, although the data acquisition cost is higher and lacks open source references for data annotation, target detection, and semantic segmentation. …”
Get full text
Article -
123
An Embodied Intelligence System for Coal Mine Safety Assessment Based on Multi-Level Large Language Models
Published 2025-01-01“…By leveraging the tool invocation and reasoning capabilities of LLM in conjunction with a coal mine safety knowledge base, the system achieves logical inference, anomalous data detection, and potential safety risk prediction. Furthermore, its memory functionality ensures the learning and utilization of historical experiences, providing a solid foundation for continuous assessment processes. …”
Get full text
Article -
124
The Impact of Differences in Renovation Models of Abandoned Boiler Rooms on Community Vitality—A Case Study of Shenyang, China
Published 2025-05-01“…Unlike prior studies that rely on single data sources or unidimensional metrics, our multi-source approach enhances spatiotemporal resolution, improves the accuracy of subjective perceptions, and enables cross-validation between objective behavioral trajectories and residents’ self-reports, thereby significantly strengthening the comprehensiveness and reliability of community vitality measurement. …”
Get full text
Article -
125
QPPLab: A generally applicable software package for detecting, analyzing, and visualizing large-scale quasiperiodic spatiotemporal patterns (QPPs) of brain activity
Published 2025-02-01“…To address these challenges, we present QPPLab, an open-source MATLAB-based toolbox for detecting, analyzing, and visualizing QPPs from fMRI time series. …”
Get full text
Article -
126
Neural network for step anomaly detection in head motion during fMRI using meta-learning adaptation
Published 2023-12-01“…Quality assessment and artifact detection in functional magnetic resonance imaging (fMRI) data is essential for clinical applications and brain research. …”
Get full text
Article -
127
Urban Traffic State Sensing and Analysis Based on ETC Data: A Survey
Published 2025-06-01“…The construction of multi-source data fusion frameworks enables effective complementarity between ETC data, floating car data, and video detection data, significantly improving traffic state estimation accuracy. …”
Get full text
Article -
128
Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning
Published 2025-03-01“…In this work, we propose a geometry-aware semi-supervised method for fine-grained building function recognition, which effectively uses multi-source geoinformation data to achieve accurate function recognition in both single-city and cross-city scenarios. …”
Get full text
Article -
129
MTAHG and MTBHG: Modified Approaches for Interpreting Gravity Data
Published 2025-04-01“…This paper proposes two effective edge detection tools: one combining the balanced total horizontal gradient (BHG), and the hyperbolic tangent function, abbreviated as “MTBHG”; and the other combining the tilt angle of the total horizontal gradient (TAHG) and the hyperbolic tangent function, abbreviated as “MTAHG.” …”
Get full text
Article -
130
Nitrate Nitrogen Quantification via Ultraviolet Absorbance: A Case Study in Agricultural and Horticultural Regions in Central China
Published 2025-05-01“…Soil nitrate nitrogen (NO<sub>3</sub><sup>−</sup>-N) is a key indicator of agricultural non-point source pollution. The ultraviolet (UV) dual-wavelength method is widely used for NO<sub>3</sub><sup>−</sup>-N detection, but interference from complex soil organic matter affects its accuracy. …”
Get full text
Article -
131
-
132
Non-Line-of-Sight Location With Gauss Filtering Algorithm Based on a Model of Photon Flight
Published 2020-01-01“…Recently, non-line-of-sight (NLOS) detection based on time of flight (TOF) has been investigated. …”
Get full text
Article -
133
Remote Sensing Extraction of Damaged Buildings in the Shigatse Earthquake, 2025: A Hybrid YOLO-E and SAM2 Approach
Published 2025-07-01“…Subsequently, SAM2 follows as a refinement step, incorporating shapefile information from pre-disaster sources to apply precise, pixel-level segmentation. …”
Get full text
Article -
134
CdZnTe- and TlBr-detectors response simulation for registration of the mixed beta- and gamma-radiation
Published 2015-02-01Get full text
Article -
135
SegTrackDetect: A window-based framework for tiny object detection via semantic segmentation and tracking
Published 2025-05-01“…This work introduces SegTrackDetect, an open-source, window-based framework for small and tiny object detection. …”
Get full text
Article -
136
ENDOCRINE PANCREATIC FUNCTION IN ACUTE PANCREATITIS
Published 2014-02-01“…In a significant proportion of patients who recovered from acute pancreatitis, exocrine and endocrine functional impairments were found. This finding was not detected only in patients after severe acute pancreatitis. …”
Get full text
Article -
137
Systematic investigation of photon strength functions with monochromatic γ-ray beams
Published 2025-01-01“…Following the main objective of the IAEA Coordinated Research Project on Photonuclear Data and Photon Strength Functions (Code F41032; Duration 2016-2019), new measurements of photoneutron and photofission cross sections in the Giant Dipole Resonance energy region have been performed at the laser Compton-scattering γ-ray source of the NewSUBARU synchrotron radiation facility. …”
Get full text
Article -
138
Sustainable Materials Enabled Terahertz Functional Devices
Published 2025-04-01“…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
Get full text
Article -
139
-
140
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article