Suggested Topics within your search.
Suggested Topics within your search.
-
41
Framework development of continuous non-linear Diophantine fuzzy sets and its application to renewable energy source selection
Published 2025-05-01“…We develop continuous non-linear Diophantine fuzzy algebraic aggregation operators and apply them to a multi-attribute decision-making problem in renewable energy source selection. A case study demonstrates the effectiveness of the proposed CN-LDFS framework using a weighted geometric operator. …”
Get full text
Article -
42
Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report
Published 2025-01-01“…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
Get full text
Article -
43
Crashing Fault Residence Prediction Using a Hybrid Feature Selection Framework from Multi-Source Data
Published 2025-02-01“…This study introduces SCM, a two-stage composite feature selection framework designed to address this challenge. …”
Get full text
Article -
44
MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection
Published 2025-12-01“…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
Get full text
Article -
45
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
46
SELECTION OF CRITERIA FOR ASSESSING THE EFFECTIVENESS OF RENEWABLE ENERGY SUPPORT POLICIES
Published 2018-09-01“…The purpose of the article is to research and develop scientific and economic decisions on the assessment of the efficiency of the use of renewable energy sources, and to justify the selection of criteria for assessing renewable energy support policies. …”
Get full text
Article -
47
Sources of uncertainty in DNA metabarcoding of whole communities: Implications for its use in biomonitoring
Published 2025-08-01Get full text
Article -
48
Forms of financing the cultural sector in Poland against the background of solutions from selected European countries
Published 2016-02-01“…Although the cultural sector is very important, state budgets contribute only a little to the financing of culture and its functioning depends on various sources of financing. …”
Get full text
Article -
49
Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features
Published 2025-03-01“…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
Get full text
Article -
50
QPPLab: A generally applicable software package for detecting, analyzing, and visualizing large-scale quasiperiodic spatiotemporal patterns (QPPs) of brain activity
Published 2025-02-01“…To address these challenges, we present QPPLab, an open-source MATLAB-based toolbox for detecting, analyzing, and visualizing QPPs from fMRI time series. …”
Get full text
Article -
51
-
52
Advances in choroid-glaucoma structural-functional correlations using swept-source optical coherence tomography
Published 2025-08-01“…Understanding the role of the choroid in glaucoma may lead to the development of new therapeutic approaches and thus facilitate the early detection, diagnosis and treatment of glaucoma.…”
Get full text
Article -
53
CASE REPORT OF TWO SUCCESSFUL PREGNANCY OUTCOMES AFTER RADICAL TRACHELECTOMY
Published 2021-10-01Get full text
Article -
54
Conflict Detection of Functional Requirements Based on Clustering and Rule-Based System
Published 2024-01-01“…Functional requirement identification is the initial stage in software development and a crucial step in the success of software development. …”
Get full text
Article -
55
A functional selection model explains evolutionary robustness despite plasticity in regulatory networks
Published 2012-10-01“…We explain these trends using a model with a strong selection to conserve the overall function of a transcription factor, and a much weaker selection over the specific genes it targets. …”
Get full text
Article -
56
-
57
Characterization of analog rice produced from various carbohydrate sources and their functional components: a review
Published 2025-06-01“…The information summarized in this review can be a reference for selecting the carbohydrate sources and ingredients for further development of analog rice based on its resulting characteristics and health benefits.…”
Get full text
Article -
58
High SERS performance of functionalized carbon dots in the detection of dye contaminants
Published 2025-02-01“…Methods: The enhanced substrate used for the detection of MG has been successfully constructed using PBA modulated Ag-CDs on a structured surface with rich binding sites. …”
Get full text
Article -
59
-
60