-
121
Non-Line-of-Sight Location With Gauss Filtering Algorithm Based on a Model of Photon Flight
Published 2020-01-01“…Recently, non-line-of-sight (NLOS) detection based on time of flight (TOF) has been investigated. …”
Get full text
Article -
122
-
123
Spin-dependent edge detection and imaging enabled by optical circularly polarised states
Published 2025-04-01“…Furthermore, these two independent functions can be easily switched by altering the circular polarisation state of the light source.…”
Get full text
Article -
124
Loss Function Optimization Method and Unsupervised Extraction Approach D-DBSCAN for Improving the Moving Target Perception of 3D Imaging Sonar
Published 2025-03-01“…Compared to 2D sonar images, 3D sonar images offer superior spatial positioning capabilities, although the data acquisition cost is higher and lacks open source references for data annotation, target detection, and semantic segmentation. …”
Get full text
Article -
125
An Embodied Intelligence System for Coal Mine Safety Assessment Based on Multi-Level Large Language Models
Published 2025-01-01“…By leveraging the tool invocation and reasoning capabilities of LLM in conjunction with a coal mine safety knowledge base, the system achieves logical inference, anomalous data detection, and potential safety risk prediction. Furthermore, its memory functionality ensures the learning and utilization of historical experiences, providing a solid foundation for continuous assessment processes. …”
Get full text
Article -
126
The Impact of Differences in Renovation Models of Abandoned Boiler Rooms on Community Vitality—A Case Study of Shenyang, China
Published 2025-05-01“…Unlike prior studies that rely on single data sources or unidimensional metrics, our multi-source approach enhances spatiotemporal resolution, improves the accuracy of subjective perceptions, and enables cross-validation between objective behavioral trajectories and residents’ self-reports, thereby significantly strengthening the comprehensiveness and reliability of community vitality measurement. …”
Get full text
Article -
127
QPPLab: A generally applicable software package for detecting, analyzing, and visualizing large-scale quasiperiodic spatiotemporal patterns (QPPs) of brain activity
Published 2025-02-01“…To address these challenges, we present QPPLab, an open-source MATLAB-based toolbox for detecting, analyzing, and visualizing QPPs from fMRI time series. …”
Get full text
Article -
128
Neural network for step anomaly detection in head motion during fMRI using meta-learning adaptation
Published 2023-12-01“…Quality assessment and artifact detection in functional magnetic resonance imaging (fMRI) data is essential for clinical applications and brain research. …”
Get full text
Article -
129
Urban Traffic State Sensing and Analysis Based on ETC Data: A Survey
Published 2025-06-01“…The construction of multi-source data fusion frameworks enables effective complementarity between ETC data, floating car data, and video detection data, significantly improving traffic state estimation accuracy. …”
Get full text
Article -
130
Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning
Published 2025-03-01“…In this work, we propose a geometry-aware semi-supervised method for fine-grained building function recognition, which effectively uses multi-source geoinformation data to achieve accurate function recognition in both single-city and cross-city scenarios. …”
Get full text
Article -
131
Nitrate Nitrogen Quantification via Ultraviolet Absorbance: A Case Study in Agricultural and Horticultural Regions in Central China
Published 2025-05-01“…Soil nitrate nitrogen (NO<sub>3</sub><sup>−</sup>-N) is a key indicator of agricultural non-point source pollution. The ultraviolet (UV) dual-wavelength method is widely used for NO<sub>3</sub><sup>−</sup>-N detection, but interference from complex soil organic matter affects its accuracy. …”
Get full text
Article -
132
-
133
Remote Sensing Extraction of Damaged Buildings in the Shigatse Earthquake, 2025: A Hybrid YOLO-E and SAM2 Approach
Published 2025-07-01“…In this hybrid approach, YOLO-E functions as the preliminary segmentation module for initial segmentation. …”
Get full text
Article -
134
CdZnTe- and TlBr-detectors response simulation for registration of the mixed beta- and gamma-radiation
Published 2015-02-01Get full text
Article -
135
SegTrackDetect: A window-based framework for tiny object detection via semantic segmentation and tracking
Published 2025-05-01“…This work introduces SegTrackDetect, an open-source, window-based framework for small and tiny object detection. …”
Get full text
Article -
136
ENDOCRINE PANCREATIC FUNCTION IN ACUTE PANCREATITIS
Published 2014-02-01“…In a significant proportion of patients who recovered from acute pancreatitis, exocrine and endocrine functional impairments were found. This finding was not detected only in patients after severe acute pancreatitis. …”
Get full text
Article -
137
Sustainable Materials Enabled Terahertz Functional Devices
Published 2025-04-01“…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
Get full text
Article -
138
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
139
Merging Surface Plasmon Optical Detection with Electronic Sensing
Published 2024-04-01Get full text
Article -
140
Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia
Published 2025-01-01“…Information on the frequency of a given detection limit, and the cumulative probability of detection, are provided as a function of instrument spectral resolution and noise. …”
Get full text
Article