Showing 281 - 300 results of 1,843 for search '((( success OR source) detection function ) OR ( sources detection function ))', query time: 0.30s Refine Results
  1. 281
  2. 282

    THE SUCCESS OF SATELLITE GRAVIMETRY IN GEOPHYSICAL INVESTIGATIONS by Ahmad Alhassan, Okoro Ernest chidi, Mohammed Auwal Adamu, Salisu Tata, Muhammad Shettima Nur, Auwal Aliyu, Yusuf Abdulhameed

    Published 2024-03-01
    “…The successful geophysical researches carried out using satellite acquired gravity data from existing literature were also discussed. …”
    Get full text
    Article
  3. 283

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  4. 284
  5. 285
  6. 286

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  7. 287

    Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging by Shengyong Xu, Rongsheng Xu, Pan Ma, Zhenhao Huang, Shaodong Wang, Zhe Yang, Qingxi Liao

    Published 2024-12-01
    “…Human–machine interaction software based on PyQt5 was developed, integrating functions such as communication between upper and lower machines, image acquisition, storage, and processing. …”
    Get full text
    Article
  8. 288

    Enhanced YOLOv7-Tiny for Small-Scale Fire Detection via Multi-Scale Channel Spatial Attention and Dynamic Upsampling by Shihao Wu, Yi Xia

    Published 2025-01-01
    “…Furthermore, the Focaler-IoU loss function is employed to focus the model on hard samples, enhancing the accuracy of small fire detection. …”
    Get full text
    Article
  9. 289

    Leveraging Multimodal Large Language Models (MLLMs) for Enhanced Object Detection and Scene Understanding in Thermal Images for Autonomous Driving Systems by Huthaifa I. Ashqar, Taqwa I. Alhadidi, Mohammed Elhenawy, Nour O. Khanfar

    Published 2024-10-01
    “…Two primary research questions are addressed: the capacity of these models to detect and enumerate objects within thermal images, and to determine whether pairs of image sources represent the same scene. …”
    Get full text
    Article
  10. 290
  11. 291

    Conscious and unconscious perception of pitch shifts in auditory feedback during vocalization: Behavioral functions and event-related potential correlates by Daniel Suchý, Roozbeh Behroozmand, Henry Railo

    Published 2025-07-01
    “…Source localization of the ERPs suggested that conscious pitch shift detection was associated with increased neural activity within the temporal, frontal and parietal cortical networks known to be involved in speech motor control. …”
    Get full text
    Article
  12. 292

    A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm by Hongwei Yang, Mehdi Effatparvar

    Published 2025-06-01
    “…Within the initial phase, the major features have been extracted, and TAN functions as a descriptor of feature. Then, the discriminating categorizer classifies the current features. …”
    Get full text
    Article
  13. 293

    A Method for Extracting Features of the Intrinsic Mode Function’s Energy Arrangement Entropy in the Shaft Frequency Electric Field of Vessels by Xiaoguang Ma, Zhaolong Sun, Runxiang Jiang, Xinquan Yue, Qi Liu

    Published 2025-05-01
    “…To address the challenge of detecting low-frequency electric field signals from vessels in complex marine environments, a vessel shaft frequency electric field feature extraction method based on intrinsic mode function energy arrangement entropy values is proposed, building upon a scaled model. …”
    Get full text
    Article
  14. 294

    Innovative Sandia Frequency Shift Islanding Detection for Microgrids Using Interval Type-II Fuzzy Logic and VP-PSO Optimization by Mehrdad Ahmadi Kamarposhti, Hassan Shokouhandeh, Yeonwoo Lee, Sun-Kyoung Kang, Ilhami Colak, El Manaa Barhoumi, Kei Eguchi

    Published 2025-01-01
    “…The proposed approach further integrates a variable-parameter PSO (VP-PSO) algorithm to optimize both fuzzy membership functions and controller parameters. Comprehensive simulations demonstrate 100% detection accuracy for both PV and wind farm islanding scenarios, significantly outperforming conventional methods: standard SFS (84-86%), type-1 fuzzy SFS (89-91%), and neural network approaches (94-95%). …”
    Get full text
    Article
  15. 295
  16. 296

    A diagnosis method based on graph neural networks embedded with multirelationships of intrinsic mode functions for multiple mechanical faults by Bin Wang, Manyi Wang, Yadong Xu, Liangkuan Wang, Shiyu Chen, Xuanshi Chen

    Published 2025-08-01
    “…Additionally, a graph-level based fault diagnosis network model is designed to enhance feature learning capabilities for graph samples and enable flexible application across diverse signal sources and devices. Experimental validation with datasets including independent vibration signals for gear fault detection, mixed vibration signals for concurrent gear and bearing faults, and pressure signals for hydraulic cylinder leakage characterization demonstrates the model's adaptability and superior diagnostic accuracy across various types of signals and mechanical systems.…”
    Get full text
    Article
  17. 297

    The accuracy of a novel stunting risk detection application based on nutrition and sanitation indicators in children aged under five years by Tria Astika Endah Permatasari, Yudi Chadirin, Ernirita Ernirita, Anisa Nurul Syafitri, Devina Alifia Fadhilah

    Published 2025-05-01
    “…This study aimed to develop and evaluate the accuracy of a stunting risk detection application based on nutrition and sanitation indicators in children aged under five years. …”
    Get full text
    Article
  18. 298

    Sheath Voltage Limiter Defects Detection Method Based on Harmonic Phasor Differences of Sheath Current for Cross-Bonded HV Cable by Hao Hu, Jing Tu, Yongheng Ai, Zhanran Xia, Ruoxin Song, Bin Yang, Xinyun Gao, Zhi Li, Fuyuan Liu, Hang Wang

    Published 2025-01-01
    “…By establishing a frequency-domain equivalent model of cross-bonded HV cables combined with SVL nonlinear resistance characteristics, harmonic currents under defect conditions are treated as harmonic sources injected into the sheath loop. Transfer functions analyze the impacts of SVL defects on sheath currents, revealing that harmonic content during SVL defects is significantly higher than under normal conditions and other defect types. …”
    Get full text
    Article
  19. 299

    Industrial production and functional profiling of probiotic Pediococcus acidilactici 72 N for potential use as a swine feed additive by Nay Zin Myo, Ratchnida Kamwa, Benjamas Khurajog, Pawiya Pupa, Wandee Sirichokchatchawan, David J. Hampson, Nuvee Prapasarakul

    Published 2025-04-01
    “…Abstract This study aimed to achieve industrial-scale production of the Thai native swine-derived probiotic strain Pediococcus acidilactici 72 N (P72N) using a cost-effective, food-grade modified medium, and to assess the efficacy of this medium by evaluating the probiotic’s functional characteristics and metabolomic profile. …”
    Get full text
    Article
  20. 300

    Saponins from <i>Solanum nigrum</i> L. Fruit: Extraction Optimization, Structural Characterization, and Dual-Functional Efficacy by Shuyuan Chen, Weiyun Guo, Tonghe Zhang, Jianfang Chen, Li Huang, Jihong Huang, Ruqiang Huang

    Published 2025-07-01
    “…., a widely consumed Asian medicinal edible plant, is a promising source of bioactive saponins for functional food applications. …”
    Get full text
    Article