-
121
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
122
LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model
Published 2025-06-01“…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
Get full text
Article -
123
Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin
Published 2025-08-01“…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
Get full text
Article -
124
The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping
Published 2025-03-01“…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
Get full text
Article -
125
PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels
Published 2024-01-01“…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
Get full text
Article -
126
Enhanced object detection in low-visibility haze conditions with YOLOv9s.
Published 2025-01-01“…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
Get full text
Article -
127
Realizing depth measurement and edge detection based on a single metasurface
Published 2023-07-01“…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
Get full text
Article -
128
A DFT insight into the potential of cycloparaphenylenes as efficient sensors for detecting Paracetamol
Published 2025-03-01“…This study presents a computational investigation into the sensing capabilities of methylene-bridged [n]cycloparaphenylene ([n]MCPP, where n= 6, 8, and 10) nanorings for the detection of paracetamol using density functional theory (DFT) calculations. …”
Get full text
Article -
129
Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report
Published 2025-01-01“…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
Get full text
Article -
130
-
131
Assessing the stability of indoor farming systems using data outlier detection
Published 2025-03-01Get full text
Article -
132
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
133
Ti3C2Tx@Pt nanocomposite based colorimetric and electrochemical dual-mode platform for glucose detection
Published 2025-06-01“…Glucose is the main source of energy in cellular metabolism and is essential for normal cellular function and growth. …”
Get full text
Article -
134
CASE REPORT OF TWO SUCCESSFUL PREGNANCY OUTCOMES AFTER RADICAL TRACHELECTOMY
Published 2021-10-01Get full text
Article -
135
Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features
Published 2025-03-01“…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
Get full text
Article -
136
ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides
Published 2025-01-01“…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
Get full text
Article -
137
Conflict Detection of Functional Requirements Based on Clustering and Rule-Based System
Published 2024-01-01“…Functional requirement identification is the initial stage in software development and a crucial step in the success of software development. …”
Get full text
Article -
138
A Feature-Selective Independent Component Analysis Method for Functional MRI
Published 2007-01-01“…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
Get full text
Article -
139
High SERS performance of functionalized carbon dots in the detection of dye contaminants
Published 2025-02-01“…Methods: The enhanced substrate used for the detection of MG has been successfully constructed using PBA modulated Ag-CDs on a structured surface with rich binding sites. …”
Get full text
Article -
140
Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection
Published 2025-05-01“…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
Get full text
Article