-
141
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Under the conditions of a priori uncertainty and low signal-to-noise ratios, the detection of periodic pulse signals, estimation of their parameters, and direction finding of the source is a non-trivial task.Aim. …”
Get full text
Article -
142
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
143
Fast detection method for radionuclides based on Sequential Bayesian approach
Published 2025-01-01“…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
Get full text
Article -
144
Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection
Published 2025-02-01“…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
Get full text
Article -
145
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…Research has been sourced from multiple databases and screened using predefined inclusion criteria. …”
Get full text
Article -
146
A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells
Published 2024-01-01“…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
Get full text
Article -
147
Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions
Published 2025-01-01“…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
Get full text
Article -
148
The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping
Published 2025-03-01“…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
Get full text
Article -
149
An Embodied Intelligence System for Coal Mine Safety Assessment Based on Multi-Level Large Language Models
Published 2025-01-01“…By leveraging the tool invocation and reasoning capabilities of LLM in conjunction with a coal mine safety knowledge base, the system achieves logical inference, anomalous data detection, and potential safety risk prediction. Furthermore, its memory functionality ensures the learning and utilization of historical experiences, providing a solid foundation for continuous assessment processes. …”
Get full text
Article -
150
The Impact of Differences in Renovation Models of Abandoned Boiler Rooms on Community Vitality—A Case Study of Shenyang, China
Published 2025-05-01“…Unlike prior studies that rely on single data sources or unidimensional metrics, our multi-source approach enhances spatiotemporal resolution, improves the accuracy of subjective perceptions, and enables cross-validation between objective behavioral trajectories and residents’ self-reports, thereby significantly strengthening the comprehensiveness and reliability of community vitality measurement. …”
Get full text
Article -
151
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
152
Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin
Published 2025-08-01“…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
Get full text
Article -
153
Automated quantification reveals hyperglycemia inhibits endothelial angiogenic function.
Published 2014-01-01Get full text
Article -
154
An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions
Published 2018-06-01“…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
Get full text
Article -
155
LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model
Published 2025-06-01“…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
Get full text
Article -
156
A DFT insight into the potential of cycloparaphenylenes as efficient sensors for detecting Paracetamol
Published 2025-03-01“…This study presents a computational investigation into the sensing capabilities of methylene-bridged [n]cycloparaphenylene ([n]MCPP, where n= 6, 8, and 10) nanorings for the detection of paracetamol using density functional theory (DFT) calculations. …”
Get full text
Article -
157
Assessing the stability of indoor farming systems using data outlier detection
Published 2025-03-01Get full text
Article -
158
Enhanced object detection in low-visibility haze conditions with YOLOv9s.
Published 2025-01-01“…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
Get full text
Article -
159
PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels
Published 2024-01-01“…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
Get full text
Article -
160
Realizing depth measurement and edge detection based on a single metasurface
Published 2023-07-01“…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
Get full text
Article