-
41
Human-Machine Function Allocation Method for Submersible Fault Detection Tasks
Published 2024-11-01Get full text
Article -
42
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
Get full text
Article -
43
-
44
The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1
Published 2025-01-01“…Testing two types of redshift evolution models suggests a likely combination of young and old formation channels. $3{1}_{-21}^{+31}$ % of FRB sources may track star formation, or correspondingly, FRB sources may have delay times of $1.9{4}_{-1.31}^{+1.54}$ Gyr. …”
Get full text
Article -
45
-
46
Sustainable Valorization of Jackfruit Peel Waste: Bio‐Functional and Structural Characterization
Published 2025-03-01“…ABSTRACT The sustainable utilization of agricultural waste holds immense promise in addressing environmental concerns and promoting resource efficiency. In this context, jackfruit (Artocarpus heterophyllus) peel waste emerges as a valuable yet underexplored resource. …”
Get full text
Article -
47
Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection
Published 2025-01-01“…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
Get full text
Article -
48
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
49
Germ Cell Dysfunction is Universal in Adolescent Male Patients with β-thalassemia Following Earlier Successful Hematopoietic Stem Cell Transplantation
Published 2025-06-01“…Objective: To assess gonadal function in adolescent male patients with β-thalassemia who underwent earlier successful hematopoietic stem cell transplantation (HSCT). …”
Get full text
Article -
50
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
51
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
Get full text
Article -
52
Detecting and routing of dust event using remote sensing and numerical modeling in Isfahan Province
Published 2020-03-01“…In addition, numerical weather models alone are not capable of storm detection, which requires the use of dust detection methods based on data remote sensing. …”
Get full text
Article -
53
A powerful molecular marker to detect mutations at sorghum LOW GERMINATION STIMULANT 1
Published 2025-03-01“…The LGS1 marker is useful for both detecting sources of lgs1 and introgressing Striga resistance into new genetic backgrounds.…”
Get full text
Article -
54
-
55
A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps
Published 2024-07-01“…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
Get full text
Article -
56
Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples
Published 2025-06-01“…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
Get full text
Article -
57
Robotic arm target detection algorithm combined with deep learning
Published 2024-12-01“…Existing target detection algorithms deployed on robotic arms would occupy a large amount of system resources, have poor real-time detection performance, and have a large number of model parameters. …”
Get full text
Article -
58
Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis
Published 2025-01-01“…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
Get full text
Article -
59
DIAMOND2GO: rapid Gene Ontology assignment and enrichment detection for functional genomics
Published 2025-08-01Get full text
Article -
60
Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China
Published 2025-05-01“…The large-scale detection of greenhouses and rural buildings is important for natural resource surveys and farmland protection. …”
Get full text
Article