Showing 121 - 140 results of 1,843 for search '((( success OR source) detection functions ) OR ( sources detection function ))', query time: 0.32s Refine Results
  1. 121

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  2. 122

    LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model by Syahrul Munir, Huei-Yung Lin

    Published 2025-06-01
    “…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
    Get full text
    Article
  3. 123

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  4. 124

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  5. 125

    PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels by Wang Yin, Zhao Jingyong, Xie Gang, Zhao Zhicheng, Hu Xiao

    Published 2024-01-01
    “…For the occlusion problem of dense targets in the dataset, we introduce a repulsive loss function, which successfully reduces the occurrence of false detection situations. …”
    Get full text
    Article
  6. 126

    Enhanced object detection in low-visibility haze conditions with YOLOv9s. by Yang Zhang, Bin Zhou, Xue Zhao, Xiaomeng Song

    Published 2025-01-01
    “…Furthermore, the implementation of a nonmonotonic strategy for dynamically adjusting the loss function weights significantly boosts the model's detection precision and training efficiency. …”
    Get full text
    Article
  7. 127

    Realizing depth measurement and edge detection based on a single metasurface by Yang Siwen, Wei Qunshuo, Zhao Ruizhe, Li Xin, Zhang Xue, Li Yao, Li Junjie, Jing Xiaoli, Li Xiaowei, Wang Yongtian, Huang Lingling

    Published 2023-07-01
    “…Double helix point source function is utilized, and three verification experiments are carried out, including double-helix beam calibration, 2D object and 3D object detection, respectively. …”
    Get full text
    Article
  8. 128

    A DFT insight into the potential of cycloparaphenylenes as efficient sensors for detecting Paracetamol by Wael A. Mahdi, Adel Alhowyan, Ahmad J. Obaidullah

    Published 2025-03-01
    “…This study presents a computational investigation into the sensing capabilities of methylene-bridged [n]cycloparaphenylene ([n]MCPP, where n= 6, 8, and 10) nanorings for the detection of paracetamol using density functional theory (DFT) calculations. …”
    Get full text
    Article
  9. 129

    Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report by Zhihui Yang, Xiaojie Huang, Danting Zhou, Tao Tang, Hengxing Liang, Wenliang Liu, Fenglei Yu, Chen Chen

    Published 2025-01-01
    “…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
    Get full text
    Article
  10. 130
  11. 131
  12. 132

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  13. 133

    Ti3C2Tx@Pt nanocomposite based colorimetric and electrochemical dual-mode platform for glucose detection by Xuming Sun, Mingyan Zhang, Jinlong Chang, Linyan Xie, Qiongqiong Ren, Wenshuai Jiang, Zhen Jin, Shiqi Pan, Xiuli Yang, Wu Ren

    Published 2025-06-01
    “…Glucose is the main source of energy in cellular metabolism and is essential for normal cellular function and growth. …”
    Get full text
    Article
  14. 134
  15. 135

    Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features by Daniel Hilário da Silva, Caio Tonus Ribeiro, Leandro Rodrigues da Silva Souza, Adriano Alves Pereira

    Published 2025-03-01
    “…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
    Get full text
    Article
  16. 136

    ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides by Umut Çakır, Noujoud Gabed, Ali Yurtseven, Igor Kryvoruchko

    Published 2025-01-01
    “…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
    Get full text
    Article
  17. 137

    Conflict Detection of Functional Requirements Based on Clustering and Rule-Based System by Sarwosri, Umi Laili Yuhana, Siti Rochimah

    Published 2024-01-01
    “…Functional requirement identification is the initial stage in software development and a crucial step in the success of software development. …”
    Get full text
    Article
  18. 138

    A Feature-Selective Independent Component Analysis Method for Functional MRI by Yi-Ou Li, Tülay Adali, Vince D. Calhoun

    Published 2007-01-01
    “…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
    Get full text
    Article
  19. 139

    High SERS performance of functionalized carbon dots in the detection of dye contaminants by Yanqiu Yang, Lingru Kong, Yong Ding, Lixin Xia, Shuo Cao, Peng Song

    Published 2025-02-01
    “…Methods: The enhanced substrate used for the detection of MG has been successfully constructed using PBA modulated Ag-CDs on a structured surface with rich binding sites. …”
    Get full text
    Article
  20. 140

    Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection by Fahim Sufi, Musleh Alsulami

    Published 2025-05-01
    “…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
    Get full text
    Article