Search alternatives:
source » sources (Expand Search)
resourcess » resourcesss (Expand Search)
resource » resources (Expand Search)
Showing 21 - 40 results of 2,583 for search '((\ source detection functions\ ) OR (( resourcess OR resource) selection function\ ))', query time: 0.30s Refine Results
  1. 21

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  2. 22

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  3. 23
  4. 24

    Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods by Petro E. Mabeyo, Mkabwa L. K. Manoko, Amra Gruhonjic, Paul A. Fitzpatrick, Göran Landberg, Máté Erdélyi, Stephen S. Nyandoro

    Published 2015-01-01
    “…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
    Get full text
    Article
  5. 25
  6. 26
  7. 27

    Go Source Code Vulnerability Detection Method Based on Graph Neural Network by Lisha Yuan, Yong Fang, Qiang Zhang, Zhonglin Liu, Yijia Xu

    Published 2025-06-01
    “…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
    Get full text
    Article
  8. 28
  9. 29

    Unraveling the Reshaping of Human Resource Management Function: the mediating role of artificial intelligence by Samuel Bangura, Anos Chitamba Chitamba, Lucia Zithobile Ngidi, Sizwe Mbona

    Published 2025-06-01
    “…This shift is predominantly driven by advanced technologies that are transforming human resource management functions within organizations. …”
    Get full text
    Article
  10. 30
  11. 31
  12. 32

    Seasonal resource selection of a grassland bird in a dynamic landscape: Importance of a heterogeneous landscape by Sprih Harsh, Robert C. Lonsinger, Hilary R. Kauth, Andrew J. Gregory

    Published 2024-12-01
    “…We quantified landscape features within radii of 250, 500, and 1000 m (i.e., local to broader spatial scales) from the home‐range center. We also used resource selection functions to predict the home‐range placement (second order) and resource selection within home ranges (third order) of pheasants during winter, pre‐nesting, and nesting seasons. …”
    Get full text
    Article
  13. 33
  14. 34

    Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information by Wenqing Zhou, Chaoqiang Chen, Qin Yan, Bin Li, Kang Liu, Yingjun Zheng, Hongming Yang, Hui Xiao, Sheng Su

    Published 2025-01-01
    “…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
    Get full text
    Article
  15. 35

    Model of the resource allocation system structure based on the functional-network principle of representing indicators by Roman A. Khalturin, Igor Yu. Kashtanov, Vladimir D. Kutkov, Nikita S. Akinshin

    Published 2025-01-01
    “…To develop a model of the resource allocation system structure based on the functional-network principle for integrating various public transport modes into a unified transport network. …”
    Get full text
    Article
  16. 36

    Outage Performance and Novel Loss Function for an ML-Assisted Resource Allocation: An Exact Analytical Framework by Nidhi Simmons, David E. Simmons, Michel Daoud Yacoub

    Published 2024-01-01
    “…Specifically, we introduce a novel loss function to minimize the outage probability of an ML-based resource allocation system. …”
    Get full text
    Article
  17. 37

    Functionalized hydrogel-based colorimetric sensor for Cu2+ detection by Minh-Kha Nguyen, Chau-Nha-Trang Nguyen, Khanh-Binh Vo

    Published 2025-01-01
    “…., highly toxic and bioaccumulative contaminants in water sources, has become a critical environmental concern. …”
    Get full text
    Article
  18. 38

    Improved UAV Target Detection Model for RT-DETR by Yong He, Yufan Pang, Guolin Ou, Renfeng Xiao, Yifan Tang

    Published 2025-01-01
    “…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
    Get full text
    Article
  19. 39
  20. 40