-
81
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…Third, cyclomatic complexity wrappers were used to encapsulate path elements, thereby simulating the intricate structures of real-world code. Experimental results demonstrate that the generated benchmarks more closely resemble the complexity of real software, effectively exposing biases and deficiencies in vulnerability detection tools across different code paths. …”
Get full text
Article -
82
Acoustic signatures of bulbar ALS: Predictive modeling with sustained vowels and LightGBM
Published 2025-09-01Get full text
Article -
83
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
Published 2025-06-01“…For example, software and hardware have become highly susceptible to various threats, like reverse engineering, cloning, tampering, and IP piracy. While various techniques exist to enhance software and hardware security, including encryption, native code, and secure server-side execution, obfuscation emerges as a preeminent and cost-efficient solution to address these challenges. …”
Get full text
Article -
84
Dimensionality reduction method based on spatial-spectral preservation and minimum noise fraction for hyperspectral images
Published 2025-01-01“…The code of the proposed method is available at https://github.com/aosilu/spatial-spectral-preservation-MNF.…”
Get full text
Article -
85
Differential Chaos Shift Keying for FSO Systems: A Novel Approach Under Turbulence and Boresight Pointing Errors
Published 2024-01-01“…Therefore, we propose two approximations for ABER of the proposed system which show a tight match with the exact analysis and are also valid for the homodyne detection (HMD), heterodyne detection (HD), and intensity modulation/direct detection (IM/DD) techniques. …”
Get full text
Article -
86
Epidemiology and patient characteristics of the US myasthenia gravis population: real-world evidence from a large insurance claims database
Published 2025-06-01“…This retrospective claims analysis assessed the epidemiologic rates of MG in the USA and the characteristics of the incident and prevalent MG populations.Methods Patients with MG were identified using Inovalon closed claims data; those with ≥2 International Classification of Diseases, 10th Revision (ICD-10) codes for MG from 2016 to 2019, separated by ≥30 days, were eligible. …”
Get full text
Article -
87
Cross- analyzing the opinions and experiences of nurses, physiotherapists, dentists, midwives, and pharmacists with respect to addictive disorder screening in primary care: A quali...
Published 2025-01-01“…Thirteen semi-structured individual interviews and four focus groups were recorded and coded. The paramedics described the advantages of their professions for the detection of addictions: home visits, prescription history, habit of intimate subjects, close consultations, etc. …”
Get full text
Article -
88
Emergence of ceftazidime resistance in Burkholderia pseudomallei during therapy: Clinical, phenotypic and genotypic insights from paired isolates
Published 2025-06-01“…WGS revealed no known CAZ-resistance mutations in penA coding sequences but identified a G(-78)A mutation upstream of penA, associated with increased promoter activity and β-lactam resistance. …”
Get full text
Article -
89
Using large language models for extracting stressful life events to assess their impact on preventive colon cancer screening adherence
Published 2025-01-01“…We used pattern-matching regular expressions to detect a possible signal in social histories and ran LLM four times on each social history to achieve self-consistency and then used logistic regression to estimate the impact of life events on the probability of having a code in health records related to colorectal cancer screening. …”
Get full text
Article -
90
Visuospatial sequence learning without seeing.
Published 2010-07-01“…<h4>Background</h4>The ability to detect and integrate associations between unrelated items that are close in space and time is a key feature of human learning and memory. …”
Get full text
Article -
91
Orthogonal-state-based measurement device independent quantum communication: a noise-resilient approach
Published 2025-07-01“…., Bell basis as decoy qubits for eavesdropping detection. Orthogonal-state-based protocols are inherently distinct from conventional conjugate-coding protocols, offering unconditional security derived from the duality and monogamy of entanglement. …”
Get full text
Article -
92
Analysis of retinal markers and incident amyotrophic lateral sclerosis: An optical coherence tomography-based cohort study.
Published 2025-06-01“…Among them, retina markers may hold promise due to the close retina-brain connection and non-invasive, portable detection methods. …”
Get full text
Article -
93
Flat U-Net: An Efficient Ultralightweight Model for Solar Filament Segmentation in Full-disk Hα Images
Published 2025-01-01“…Introducing a certain number of CSA blocks improves the DSC and recall rates to 0.82 and 0.74, respectively, which demonstrates a pronounced advantage, particularly concerning model weight size and detection effectiveness. The data set, models, and code are available as open-source resources.…”
Get full text
Article -
94
Failure Fraction Calculation of the TRISO-Coated Particle Using X-Ray Computed Tomography
Published 2021-01-01“…TRISO is simplified as a pressure vessel model, and micro X-ray CT was employed to detect the real geometrical shape. Key geometrical parameters, thickness and volume of the real particle, were then obtained with the 3D measurement method and input into PANAMA code (a German code for fuel performance simulation). …”
Get full text
Article -
95
UBC Mediated by SEPT6 Inhibited the Progression of Prostate Cancer
Published 2021-01-01“…The ubiquitin-protein and the ubiquitin coding gene UBA52, UBA80, UBB, and UBC expressions were detected in clinical tissues and cells. …”
Get full text
Article -
96
Phylogenetic analysis blaTEM gene of Escherichia coli isolated from cave bats in West Nusa Tenggara Province, Indonesia
Published 2024-12-01“…Between samples from Lawah and Saung Pengembur cave, we found there was a closeness of 86% to the E. coli strain A2-2 sample from Thailand with the code OR680712.1. at GenBank. …”
Get full text
Article -
97
-
98
A sedução libertina como arte do equívoco em Crébillon e Laclos
Published 2010-01-01“…Considering all literary texts about libertinage, from Ovid to nowadays, Claude Crébillon and Laclos are surely amongst those who treated with more wit the issue of Eros’ ambiguous language. Within the closed and policed universe where theirs characters circulate, a vanity fair as refined as cruel, words’ double meaning, when not detected in time or when misinterpreted, can lead the incautious victim to a mise à mort, even when it is merely a moral and social death. …”
Get full text
Article -
99
Efficient Signal Quality Monitoring of GNSS Signals Disturbed by Evil Waveforms
Published 2024-11-01“…Closed-form expressions are offered in terms of sine integral functions for TM-A. …”
Get full text
Article -
100