Suggested Topics within your search.
Suggested Topics within your search.
-
601
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
602
Dual-context enhanced knowledge representation learning method in hyper-relational knowledge graphs
Published 2025-07-01“…This operation addresses the issue that most methods neglect the learning of relation representations, with these methods typically updating using a parameter matrix without considering the crucial information within HKGs. …”
Get full text
Article -
603
Liver Semantic Segmentation Method Based on Multi-Channel Feature Extraction and Cross Fusion
Published 2025-06-01“…However, due to the complex anatomical structure of the liver and significant inter-patient variability, the current methods exhibit notable limitations in feature extraction and fusion, which pose a major challenge to achieving accurate liver segmentation. …”
Get full text
Article -
604
A Small-Sample Scenario Optimization Scheduling Method Based on Multidimensional Data Expansion
Published 2025-06-01“…Therefore, this paper proposes a small-sample scenario optimization scheduling method based on multidimensional data expansion. Firstly, based on spatial correlation, the daily power curves of PV power plants with measured power are screened, and the meteorological similarity is calculated using multicore maximum mean difference (MK-MMD) to generate new energy output historical data of the target distributed PV system through the capacity conversion method; secondly, based on the existing daily load data of different types, the load historical data are generated using the stochastic and simultaneous sampling methods to construct the full historical dataset; subsequently, for the sample imbalance problem in the small-sample scenario, an oversampling method is used to enhance the data for the scarce samples, and the XGBoost PV output prediction model is established; finally, the optimal scheduling model is transformed into a Markovian decision-making process, which is solved by using the Deep Deterministic Policy Gradient (DDPG) algorithm. …”
Get full text
Article -
605
Application of the generalized point source method for solving boundary value problems of mathematical physics
Published 2017-06-01“…Materials and Methods . The proposed method is based on the transformation of the original mathematical physics equation to a simpler inhomogeneous equation with the known fundamental solution. …”
Get full text
Article -
606
Study on the stability of waste rock filling in goaf based on dynamic comprehensive analysis method
Published 2024-12-01“…It specifically focused on an individual underground metal mine cavity by integrating numerical simulation analysis techniques with onsite displacement monitoring methods. By simulating stress-strain conditions during different stages of cavity formation and subsequent treatments while considering onsite displacement monitoring data, this study extensively analyzed how these treatments impact rock stress levels, strain conditions within rocks themselves, and the stability of the surface riverbed. …”
Get full text
Article -
607
Solving American Option Pricing Models by the Front Fixing Method: Numerical Analysis and Computing
Published 2014-01-01“…This paper presents an explicit finite-difference method for nonlinear partial differential equation appearing as a transformed Black-Scholes equation for American put option under logarithmic front fixing transformation. …”
Get full text
Article -
608
Studying the Effect of Stray Capacitance on the Measurement Accuracy of the CVT Based on the Boundary Element Method
Published 2021-01-01“…The capacitive voltage transformer (CVT) is a special measuring and protecting device, which is commonly applied in high-voltage power systems. …”
Get full text
Article -
609
A method for English paragraph grammar correction based on differential fusion of syntactic features.
Published 2025-01-01“…Firstly, the sentence vector representation is constructed by BERT, and then the syntactic structure is extracted by dependency parsing. Then carry out difference fusion analysis, measure the syntactic differences of adjacent sentences by cosine similarity, identify the significant differences caused by grammatical errors according to the preset threshold, lock the position and type of errors, and input the original sentence vector into the Seq2Seq model based on Transformer. …”
Get full text
Article -
610
A knowledge-embedded lossless image compressing method for high-throughput corrosion experiment
Published 2018-01-01“…The key steps include similarity comparison, edge detection, coordinate transformation, and dictionary encoding. The method has been successfully applied into high-throughput corrosion experiment facility, a typical intelligent cyber-physical system. …”
Get full text
Article -
611
Finite Integration Method with Chebyshev Expansion for Shallow Water Equations over Variable Topography
Published 2025-08-01“…The method transforms partial differential equations into integral equations, approximates spatial terms via Chebyshev polynomials, and uses forward differences for time discretization. …”
Get full text
Article -
612
PECTIN THERAPY IS A METHOD OF PREVENTION OF REPRODUCTIVE LOSSES ASSOCIATED WITH INTRAPLACENTARY ACCUMULATION OF RADIONUCLIDES
Published 2024-12-01“…Statistical data analysis was performed using Microsoft Excel (2016) and Fisher angular transformation. The difference between comparative values was considered significant at p < 0.05 (probability index greater than 95%). …”
Get full text
Article -
613
Multi-Task Image Restoration Algorithm Under Different Weather Influence Factors
Published 2024-01-01Get full text
Article -
614
The Linear Stability of a Power-Law Liquid Film Flowing Down an Inclined Deformable Plane
Published 2025-05-01“…To solve the linearized eigenvalue problem, the Riccati transformation method, which offers advantages over traditional techniques by avoiding the parasitic growth seen in the shooting method and eliminating the need for large-scale matrix eigenvalue computations, was used. …”
Get full text
Article -
615
AN EMPIRICAL ANALYSIS OF TRADITIONAL RECOGNITION METHODS USING EXAMPLES OF IDENTIFYING WORDS SPOKEN BY NATIVE SPEAKERS
Published 2025-02-01“…To implement the task, classical DTW and DDTW methods, as well as methods based on the Fourier transform, discrete and continuous wavelet transforms are used. …”
Get full text
Article -
616
Synthesis and characterization of zeolite obtained from Toraja natural montmorillonite
Published 2025-01-01“…This work aims to synthesize zeolites using the hydrothermal method with aluminosilicate sources from Toraja natural minerals. …”
Get full text
Article -
617
An artificial intelligence and machine learning-driven CFD simulation for optimizing thermal performance of blood-integrated ternary nano-fluid
Published 2025-12-01“…Non-linear, coupled partial differential equations are transformed into ordinary differential equations with similarity scaling to characterize heat transfer and fluid flow, which are then numerically solved using the modified finite difference method (the Keller-Box method). …”
Get full text
Article -
618
A Comparative Study on Multiwavelet Construction Methods and Customized Multiwavelet Library for Mechanical Fault Detection
Published 2015-01-01“…Customized multiwavelet methods and practices have continued to improve over the recent years, focused on two-scale similarity transform (TST), lifting transform (LT), and lifting scheme (LS). …”
Get full text
Article -
619
-
620
A Study on Instantaneous Time-Frequency Methods for Damage Detection of Nonlinear Moment-Resisting Frames
Published 2014-01-01“…First, several instantaneous time-frequency methods including Hilbert-Huang transform, direct quadrature, Teager energy operator, and higher-order energy operator are investigated as signal processing tools and the most appropriate method is selected using an outlier analysis. …”
Get full text
Article