Search alternatives:
resource » source (Expand Search)
Showing 81 - 100 results of 3,214 for search '((\ sources selection functions\ ) OR (( resource OR success) detection function\ ))', query time: 0.38s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
    Get full text
    Article
  6. 86

    Vehicle detection method based on multi-layer selective feature for UAV aerial images by Yinbao Ma, Yuyu Meng, Jiuyuan Huo

    Published 2025-07-01
    “…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
    Get full text
    Article
  7. 87

    THE SUCCESS OF SATELLITE GRAVIMETRY IN GEOPHYSICAL INVESTIGATIONS by Ahmad Alhassan, Okoro Ernest chidi, Mohammed Auwal Adamu, Salisu Tata, Muhammad Shettima Nur, Auwal Aliyu, Yusuf Abdulhameed

    Published 2024-03-01
    “…The successful geophysical researches carried out using satellite acquired gravity data from existing literature were also discussed. …”
    Get full text
    Article
  8. 88

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  9. 89
  10. 90

    Affinity selection mass spectrometry (AS-MS) for prospecting ligands in natural product libraries by Bruno S. do Amaral, Marcela C. de Moraes, Carmen L. Cardoso, Quezia B. Cass

    Published 2025-05-01
    “…Natural product libraries are a source of diverse 3D molecular features furnishing an array of biological functions in drug discovery research. …”
    Get full text
    Article
  11. 91
  12. 92

    DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Zhenghai Liu

    Published 2024-11-01
    “…Achieving real-time detection with high accuracy, while accommodating the limited resources of edge-computing devices poses a significant challenge for anti-UAV detection. …”
    Get full text
    Article
  13. 93

    Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model by Yuan Liu, Yilong Liu, Xiaoyan Guo, Xi Ling, Qingyi Geng

    Published 2025-04-01
    “…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
    Get full text
    Article
  14. 94

    Economic and functional changes in the largest villages in Poland at the end of the 20th and the beginning of the 21st century by Sokołowski Dariusz

    Published 2019-12-01
    “…The article deals with selected aspects of the economic structure and functions of the largest villages in Poland. …”
    Get full text
    Article
  15. 95
  16. 96
  17. 97
  18. 98

    Adaptive integrated weight unsupervised multi-source domain adaptation without source data by Zhirui Wang, Liu Yang, Yahong Han

    Published 2025-04-01
    “…Because target samples with low entropy measured from the pre-trained source model achieve high accuracy, the trust center samples are selected first using the entropy function. …”
    Get full text
    Article
  19. 99

    Physiological and biochemical aspects of using black lion fly larvae as a source of biologically active and nutrient substances by M. S. Talan, I. S. Dokuchaeva, M. A. Mukhamed'yarov

    Published 2025-02-01
    “…Introduction. Functional foods are products that, in addition to taste and nutritional value, have a physiological effect on the human body. ω-6 and ω-3 fatty acids, when consumed in the form of triglycerides from various food sources, undergo digestion in the small intestine, allowing absorption and transport into the blood and subsequent assimilation into the body, including the brain, retina, heart and other tissues. …”
    Get full text
    Article
  20. 100