Suggested Topics within your search.
Suggested Topics within your search.
-
21
Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols
Published 2012-01-01“…Sensorimotor cortex is activated similarly during motor execution and motor imagery. The study of functional connectivity networks (FCNs) aims at successfully modeling the dynamics of information flow between cortical areas. …”
Get full text
Article -
22
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
23
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
24
-
25
Grape Seed Powders as a Source of Phenolic Compounds: UHPLC Orbitrap MS4 Characterization
Published 2024-02-01“…Grape seeds represent a rich source of phenolic compounds that exhibit various health benefits. …”
Get full text
Article -
26
Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods
Published 2015-01-01“…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
Get full text
Article -
27
Derivation of pressure distribution models for horizontal well using source function
Published 2019-05-01“…In this work, ten (10) models for pressure distribution for horizontal well under different boundary variation were derived following these steps for each of the models:(i) choosing a boundary condition for each axis (ii) selecting the appropriate source function for each axis and (iii)applying Newman product rule to arrive at the pressure expression. …”
Get full text
Article -
28
Go Source Code Vulnerability Detection Method Based on Graph Neural Network
Published 2025-06-01“…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
Get full text
Article -
29
CASE REPORT OF TWO SUCCESSFUL PREGNANCY OUTCOMES AFTER RADICAL TRACHELECTOMY
Published 2021-10-01Get full text
Article -
30
-
31
Source Type Recognition Algorithm of Radio Emission using Radial Basis Functions
Published 2017-02-01Get full text
Article -
32
Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information
Published 2025-01-01“…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
Get full text
Article -
33
-
34
-
35
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
Get full text
Article -
36
Nitrogen-functionalized modulation of iron nanoparticles promotes selective hydrogenation of carbon dioxide
Published 2025-03-01“…Nitrogen-functionalized iron nanoparticles were prepared using a one-pot hydrothermal process. …”
Get full text
Article -
37
Enhanced Reward Function Design for Source Term Estimation Based on Deep Reinforcement Learning
Published 2025-01-01“…This study investigates the design of reward functions for deep reinforcement learning-based source term estimation (STE). …”
Get full text
Article -
38
Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report
Published 2025-01-01“…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
Get full text
Article -
39
Framework development of continuous non-linear Diophantine fuzzy sets and its application to renewable energy source selection
Published 2025-05-01“…We develop continuous non-linear Diophantine fuzzy algebraic aggregation operators and apply them to a multi-attribute decision-making problem in renewable energy source selection. A case study demonstrates the effectiveness of the proposed CN-LDFS framework using a weighted geometric operator. …”
Get full text
Article -
40
MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection
Published 2025-12-01“…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
Get full text
Article