Suggested Topics within your search.
Suggested Topics within your search.
-
1481
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
1482
MAGECODE: Machine-Generated Code Detection Method Using Large Language Models
Published 2024-01-01“…Consequently, various machine-generated text (MGT) detection methods, developed from metric-based and model-based approaches, were proposed and shown to be highly effective. …”
Get full text
Article -
1483
Accelerated active case detection of visceral leishmaniasis patients in endemic villages of Bangladesh.
Published 2014-01-01“…We recommend that the National VL Program should consider AACD to strengthen its early VL case detection strategy.…”
Get full text
Article -
1484
Intelligent vulnerability detection system based on graph structured source code slice
Published 2021-10-01“…For the intelligent vulnerability detection, the system extracts the graph structured source code slices according to the vulnerability characteristics from the program dependency graph of source code, and then presents the graph structured slice information to carry out vulnerability detection by using the graph neural network model.Slice level vulnerability detection was realized and the vulnerability line was located at the code line level.In order to verify the effectiveness of the system, compared with the static vulnerability detection systems, the vulnerability detection system based on serialized text information, and the vulnerability detection system based on graph structured information, the experimental results show that the proposed system has a high accuracy in the vulnerability detection capability and a good performance in the vulnerability code line prediction.…”
Get full text
Article -
1485
Circulating-free DNA: A promising tool for early detection of myocardial infarction
Published 2025-12-01“…Liquid biopsies using cfDNA enable dynamic monitoring of disease progression, but methodological variability and low concentrations limit its standalone use. …”
Get full text
Article -
1486
FPGA implementation of deep learning architecture for ankylosing spondylitis detection from MRI
Published 2025-07-01Get full text
Article -
1487
-
1488
-
1489
Detection of Victimization Patterns and Risk of Gender Violence Through Machine Learning Algorithms
Published 2025-02-01Get full text
Article -
1490
Asumu Fractional Derivative Applied to Edge Detection on SARS-COV2 Images
Published 2022-01-01“…The experimental comparison show that the proposed method outperforms some edge detection methods. In the next paper, we are planning to improve and combine the proposed filters with artificial intelligence algorithm in order to program a training system for SARS-COV2 image classification with the aim of having a supplemental medical diagnostic.…”
Get full text
Article -
1491
RESEARCH ON DEVELOPING A MONITORING SYSTEM FOR DROWSINESS DETECTION BASED ON COMPUTER VISION
Published 2024-09-01“…This article focuses on the research and development of a model for a drowsiness detection and monitoring system while driving based on computer vision. …”
Get full text
Article -
1492
In Situ Raman Spectroscopy for Early Corrosion Detection in Coated AA2024-T3
Published 2024-12-01“…Here we describe the synthesis and evaluation of a molecular corrosion sensor that can be applied in situ in aerospace coatings, then used to detect corrosion after the coating has been applied. …”
Get full text
Article -
1493
SGPLane: Efficient lane detection via sampled grid points for autonomous driving
Published 2025-07-01“…Earlier works revolved around semantic segmentation and object detection with a special program for lanes. However, most methods still suffer from unstable post-processing algorithms which leads to a gap between camera input and downstream applications. …”
Get full text
Article -
1494
Development of alternative models for early detection of religiously legitimated anarchism in Bali Province
Published 2022-05-01Get full text
Article -
1495
Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50
Published 2025-01-01“… In today's rapidly evolving world, where technology is progressing swiftly, there is an increasing demand for facial recognition systems. …”
Get full text
Article -
1496
Deep Embedded Auto-encoder for End-to-End Unsupervised Image Anomaly Detection
Published 2025-06-01“…Abstract Image anomaly detection plays a critical role in industrial quality control, medical diagnostics, and security surveillance, yet existing unsupervised methods often suffer from limited detection accuracy and poor adaptability. …”
Get full text
Article -
1497
SVHAE: Spectral Variability-Aware Hybrid Autoencoder for Hyperspectral Underwater Target Detection
Published 2025-01-01“…These advancements contribute to the progressing field of HUTD, making the way for robust solutions in marine exploration and detecting targets under the water.…”
Get full text
Article -
1498
RGB-to-hyperspectral conversion for accessible melanoma detection: A CNN-based approach
Published 2024-11-01“…Accuracy is significantly increased when spot detection and PCA are combined; Naïve Bayes achieves 76% accuracy in this way. …”
Get full text
Article -
1499
Automated Detection of Connective Tissue by Tissue Counter Analysis and Classification and Regression Trees
Published 2001-01-01Get full text
Article -
1500
Scintillation light in SBND: simulation, reconstruction, and expected performance of the photon detection system
Published 2024-10-01“…This paper describes the expected performance of the SBND photon detection system, using a simulated sample of beam neutrinos and cosmogenic particles. …”
Get full text
Article