-
1
Pitot Tube-Based Icing Detection: Effect of Ice Blocking on Pressure
Published 2020-01-01Get full text
Article -
2
ASB3 ablation has no detectable effects on spermatogenesis and fertility in male mice
Published 2025-07-01“…Hence, we demonstrated that ASB3 ablation has no detectable effects on spermatogenesis and fertility in male mice.…”
Get full text
Article -
3
-
4
-
5
Probiotics reduce negative mood over time: the value of daily self-reports in detecting effects
Published 2025-04-01Get full text
Article -
6
Investigation of ZnO thin-film sensing properties for CO2 detection: effect of Mn doping
Published 2018-09-01Get full text
Article -
7
-
8
Pretreatment of epithelial cells with live Streptococcus pneumoniae has no detectable effect on influenza A virus replication in vitro.
Published 2014-01-01“…But, pretreatment of cell lines with 7.5×10(5) and lower CFUs of S. pneumoniae had no detectable effect on either the morphology of cells or on the IAV replication. …”
Get full text
Article -
9
-
10
-
11
-
12
Multiobject Detection Algorithm Based on Adaptive Default Box Mechanism
Published 2020-01-01“…Considering the defects of the traditional single shot multibox detector (SSD) algorithm, such as poor small object detection effect, reliance on manual setting for default box generation, and insufficient semantic information of the low detection layer, the detection effect in complex scenes was not ideal. …”
Get full text
Article -
13
Related and independent variable fault detection method based on KPCA-SVM
Published 2023-01-01“…The results show that the proposed KPCA-SVM method has a good detection effect and improves the detection effect of multiple faults, among which the detection effect of minor fault 5 is significantly improved, which further verifies the effectiveness of the KPCA-SVM method.…”
Get full text
Article -
14
Optical Fiber Multiparameter Detection and Numerical Simulation and Characteristics of Water Quality Particulate Matter Based on Single-Photon Detection Technology
Published 2022-01-01“…The experimental results showed that for the transmission optical fiber turbidity detection system, the detection effect of the system was the best under the incident light intensity of 11 wm, and the fitting value was 0.99; for the scattering optical fiber turbidity detection system, the detection effect of the system was the best under the incident light intensity of 4 wm, and the fitting value was 0.99.…”
Get full text
Article -
15
Application of EEG Signal Recognition Method Based on Duffing Equation in Psychological Stress Analysis
Published 2021-01-01“…From the relationship between the parameters and the initial values, the influence of different parameters on the detection effect is analyzed to verify the superiority of the current equation parameters. …”
Get full text
Article -
16
An optimization method of multiscale storage tank target detection introducing an attention mechanism
Published 2024-01-01“…Second, to improve the detection effect of small targets, the model adds a small target detection head and performs multiscale target detection. …”
Get full text
Article -
17
Refining features for underwater object detection at the frequency level
Published 2025-04-01“…The blurring problem caused by water scattering on underwater images makes the high-frequency texture edge less obvious, affecting the detection effect of objects in the image. To address this issue, we design a multi-scale high-frequency information enhancement module to enhance the high frequency features extracted by the backbone network and improve the detection effect of the network on underwater objects. …”
Get full text
Article -
18
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
19
Hyperspectral Target Detection Based on Prior Spectral Perception and Local Graph Fusion
Published 2024-01-01“…It can make full use of spectral and spatial structure information to improve the target detection effect. Publicly available datasets and real collected datasets are adopted to check the validity of the proposed method. …”
Get full text
Article -
20
Intrusion Detection Technology for Wireless Sensor Networks Based on Autoregressive Moving Average
Published 2022-01-01“…Firstly, the technology uses the autoregressive moving average model ARMA (autoregressive moving average) to establish the ARMA traffic prediction model for the node and then uses the predicted traffic value to obtain the traffic reception rate range through the node. Finally, the detection effect is achieved by comparing whether the actual service reception rate exceeds the prediction range. …”
Get full text
Article