Suggested Topics within your search.
Suggested Topics within your search.
-
81
-
82
Hybrid Islanding Detection of an Inverter-Based High-Noise Microgrid
Published 2025-01-01Get full text
Article -
83
-
84
-
85
Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs
Published 2025-06-01“…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
Get full text
Article -
86
Vehicle detection method based on multi-layer selective feature for UAV aerial images
Published 2025-07-01“…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
Get full text
Article -
87
THE SUCCESS OF SATELLITE GRAVIMETRY IN GEOPHYSICAL INVESTIGATIONS
Published 2024-03-01“…The successful geophysical researches carried out using satellite acquired gravity data from existing literature were also discussed. …”
Get full text
Article -
88
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
89
Segmentation-Based Detection for Luffa Seedling Grading Using the Seg-FL Model
Published 2024-10-01Get full text
Article -
90
Affinity selection mass spectrometry (AS-MS) for prospecting ligands in natural product libraries
Published 2025-05-01“…Natural product libraries are a source of diverse 3D molecular features furnishing an array of biological functions in drug discovery research. …”
Get full text
Article -
91
-
92
DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model
Published 2024-11-01“…Achieving real-time detection with high accuracy, while accommodating the limited resources of edge-computing devices poses a significant challenge for anti-UAV detection. …”
Get full text
Article -
93
Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model
Published 2025-04-01“…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
Get full text
Article -
94
Economic and functional changes in the largest villages in Poland at the end of the 20th and the beginning of the 21st century
Published 2019-12-01“…The article deals with selected aspects of the economic structure and functions of the largest villages in Poland. …”
Get full text
Article -
95
-
96
Research on site selection and capacity determination problem based on improved particle swarm algorithm
Published 2025-07-01Get full text
Article -
97
-
98
Adaptive integrated weight unsupervised multi-source domain adaptation without source data
Published 2025-04-01“…Because target samples with low entropy measured from the pre-trained source model achieve high accuracy, the trust center samples are selected first using the entropy function. …”
Get full text
Article -
99
Physiological and biochemical aspects of using black lion fly larvae as a source of biologically active and nutrient substances
Published 2025-02-01“…Introduction. Functional foods are products that, in addition to taste and nutritional value, have a physiological effect on the human body. ω-6 and ω-3 fatty acids, when consumed in the form of triglycerides from various food sources, undergo digestion in the small intestine, allowing absorption and transport into the blood and subsequent assimilation into the body, including the brain, retina, heart and other tissues. …”
Get full text
Article -
100