Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
361
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
362
Prevalence of transcription promoters within archaeal operons and coding sequences
Published 2009-06-01“…Here, we have investigated the prevalence of alternate regulatory mechanisms through genome‐wide characterization of transcript structures of ∼64% of all genes, including putative non‐coding RNAs in Halobacterium salinarum NRC‐1. Our integrative analysis of transcriptome dynamics and protein–DNA interaction data sets showed widespread environment‐dependent modulation of operon architectures, transcription initiation and termination inside coding sequences, and extensive overlap in 3′ ends of transcripts for many convergently transcribed genes. …”
Get full text
Article -
363
Long-Duration Optical Pulse Shaping and Complex Coding on SOI
Published 2016-01-01Get full text
Article -
364
Mutually Orthogonal Complementary Golay Coded Sequences: An In-vivo Study
Published 2024-08-01“…In the experimental study we have shown that MOCGCS offers advantages over conventional CGS by enabling two times faster data acquisition and image reconstruction without compromising image quality.…”
Get full text
Article -
365
Spatial Linear Coding in Joint Radar and Multicast Communication Systems
Published 2022-02-01“…This paper presents optimization methods for the amplitude-phase distribution in a transmitting antenna array in a system with a common signal for multicast data transmission and radar sensing in a given sector of space. …”
Get full text
Article -
366
Development of A Qr Code System for Tree Species Identification
Published 2023-01-01“…For the Client tier, HTML, CSS and Javascript were used. The QR code generator was developed using PHP 8.1. The PHP script used a QR code library to generate the QR code image. …”
Get full text
Article -
367
Point-Kernel Code Development for Gamma-Ray Shielding Applications
Published 2025-07-01“…The specific computational modules are unified with a graphical user interface (GUI), assisting users with input/output data and visualization, developed for the fast radiological characterization of simple shielding problems. …”
Get full text
Article -
368
Study of the corrective ability of sync codes for the matched processing decoder
Published 2018-12-01“…However, with the increase in the length of the sync code, a conflict arises between the corrective ability and the speed of data transfer. …”
Get full text
Article -
369
Progress in Research on the Long Non-coding RNAs in Chinese Cabbage
Published 2025-01-01“…Long non-coding RNAs (lncRNAs) are functional non-coding RNA molecules that are at least 200 nucleotides in length and lack significant coding ability, having important regulation effects on plant growth and development and response to stress. …”
Get full text
Article -
370
Channel Coding Toward 6G: Technical Overview and Outlook
Published 2024-01-01“…In this paper, after considering the potential impact of channel coding on key performance indicators (KPIs) of wireless networks, we review the evolution of mobile communication standards and the organizations involved in the standardization, from the first generation (1G) to the current 5G, highlighting the technologies integral to achieving targeted KPIs such as reliability, data rate, latency, energy efficiency, spectral efficiency, connection density, and traffic capacity. …”
Get full text
Article -
371
Identification of functional non-coding variants associated with orofacial cleft
Published 2025-07-01Get full text
Article -
372
Recent Developments to the ANSWERS® Monte Carlo Codes MONK® and MCBEND®
Published 2024-01-01“…These codes continue to be actively developed to meet the needs of their users. …”
Get full text
Article -
373
Contribution of rare coding variants to microcephaly in individuals with neurodevelopmental disorders
Published 2025-08-01“…Methods We investigated the relationships between head circumference and rare coding variants in 418 individuals with microcephaly, analyzing data from 1050 exomes (312 trios and 106 proband-only samples). …”
Get full text
Article -
374
-
375
Method for Using Rubric Ratings on Fishbone Diagrams to Compare Case Studies
Published 2020-04-01Subjects: Get full text
Article -
376
Annotation of protein-coding genes in 49 diatom genomes from the Bacillariophyta clade
Published 2025-06-01Get full text
Article -
377
Scaling hermeneutics: a guide to qualitative coding with LLMs for reflexive content analysis
Published 2025-04-01“…In this paper, we present a hybrid approach that preserves hermeneutic value while incorporating LLMs to scale the application of codes to large data sets that are impractical for manual coding. …”
Get full text
Article -
378
Research and implementation of one-hop transmission framework in wireless network based on network coding
Published 2010-01-01“…Inspired by the network coding,a transmission model based on coding group (TCG) was proposed. …”
Get full text
Article -
379
-
380
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01“…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
Get full text
Article