Showing 1 - 20 results of 228 for search '"detection effect"', query time: 0.18s Refine Results
  1. 1
  2. 2

    ASB3 ablation has no detectable effects on spermatogenesis and fertility in male mice by Changtong Xu, Xiya Qiu, Aiyan Zheng, Yan Pu, Tiantian Wu, Jie Ding, Bo Zheng

    Published 2025-07-01
    “…Hence, we demonstrated that ASB3 ablation has no detectable effects on spermatogenesis and fertility in male mice.…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Multiobject Detection Algorithm Based on Adaptive Default Box Mechanism by Jinling Li, Qingshan Hou, Jinsheng Xing

    Published 2020-01-01
    “…Considering the defects of the traditional single shot multibox detector (SSD) algorithm, such as poor small object detection effect, reliance on manual setting for default box generation, and insufficient semantic information of the low detection layer, the detection effect in complex scenes was not ideal. …”
    Get full text
    Article
  13. 13

    Related and independent variable fault detection method based on KPCA-SVM by GUO Jinyu, YU Huan, LI Yuan

    Published 2023-01-01
    “…The results show that the proposed KPCA-SVM method has a good detection effect and improves the detection effect of multiple faults, among which the detection effect of minor fault 5 is significantly improved, which further verifies the effectiveness of the KPCA-SVM method.…”
    Get full text
    Article
  14. 14

    Optical Fiber Multiparameter Detection and Numerical Simulation and Characteristics of Water Quality Particulate Matter Based on Single-Photon Detection Technology by Quan Xu, Cuiyun Gao, Chun Zhou

    Published 2022-01-01
    “…The experimental results showed that for the transmission optical fiber turbidity detection system, the detection effect of the system was the best under the incident light intensity of 11 wm, and the fitting value was 0.99; for the scattering optical fiber turbidity detection system, the detection effect of the system was the best under the incident light intensity of 4 wm, and the fitting value was 0.99.…”
    Get full text
    Article
  15. 15

    Application of EEG Signal Recognition Method Based on Duffing Equation in Psychological Stress Analysis by Min Chai, Lei Ba

    Published 2021-01-01
    “…From the relationship between the parameters and the initial values, the influence of different parameters on the detection effect is analyzed to verify the superiority of the current equation parameters. …”
    Get full text
    Article
  16. 16

    An optimization method of multiscale storage tank target detection introducing an attention mechanism by Wenjia Sun, Chunchun Hu, Nianxue Luo, Qiansheng Zhao

    Published 2024-01-01
    “…Second, to improve the detection effect of small targets, the model adds a small target detection head and performs multiscale target detection. …”
    Get full text
    Article
  17. 17

    Refining features for underwater object detection at the frequency level by Wenling Wang, Zhibin Yu, Zhibin Yu, Mengxing Huang

    Published 2025-04-01
    “…The blurring problem caused by water scattering on underwater images makes the high-frequency texture edge less obvious, affecting the detection effect of objects in the image. To address this issue, we design a multi-scale high-frequency information enhancement module to enhance the high frequency features extracted by the backbone network and improve the detection effect of the network on underwater objects. …”
    Get full text
    Article
  18. 18

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  19. 19

    Hyperspectral Target Detection Based on Prior Spectral Perception and Local Graph Fusion by Xiaobin Zhao, Jun Huang, Yunquan Gao, Qingwang Wang

    Published 2024-01-01
    “…It can make full use of spectral and spatial structure information to improve the target detection effect. Publicly available datasets and real collected datasets are adopted to check the validity of the proposed method. …”
    Get full text
    Article
  20. 20

    Intrusion Detection Technology for Wireless Sensor Networks Based on Autoregressive Moving Average by Ju-zhen Yu

    Published 2022-01-01
    “…Firstly, the technology uses the autoregressive moving average model ARMA (autoregressive moving average) to establish the ARMA traffic prediction model for the node and then uses the predicted traffic value to obtain the traffic reception rate range through the node. Finally, the detection effect is achieved by comparing whether the actual service reception rate exceeds the prediction range. …”
    Get full text
    Article