-
1241
Influence of Geometry and Boundary Conditions in Area of Cohesion between Materials on the Reflection of an Ultrasonic Beam. Part 1. Theoretical research
Published 2021-06-01“…The improvement of efficiency, reliability and productivity of ultrasonic testing of objects with cohesion between materials connected by welding, soldering, gluing, etc. is 'an important problem of the modern production technologies. The purpose of the paper is to determine in 3D space the conditions for increasing the sensitivity and reliability of the flaw detection in the cohesion zone between materials when the form of defect interface can be different.In the first part of the theoretical study the features of the formation of the acoustic fields of ultrasonic waves scattered from solid's interface when spot of an acoustic beam crosses the boundary of the defective region in the shape of an ellipse or a long strip have been investigated. …”
Get full text
Article -
1242
Hardware and Software Complex for the Study of the Joint Use of Technical Means Based on Various Physical Principles
Published 2023-04-01“…This hardware and software complex is a set of jointly functioning security equipment (optoelectronic system, seismic sensors, fiber-optic sensors) that solve the problem of automatic detection of moving objects in a given area of space. …”
Get full text
Article -
1243
Rapid acquisition and surface defects recognition based on panoramic image of small-section hydraulic tunnel
Published 2025-04-01“…The proposed YOLOv5-DECA has great detection performance for targets with variable shapes and can solve the problem of classification imbalance in surface defects. …”
Get full text
Article -
1244
Practical Malware Analysis
Published 2023-10-01“…Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches. …”
Get full text
Article -
1245
Systematically constructing the likelihood for boosted $H\to gg$ decays
Published 2025-04-01“…Though this decay mode of the Higgs is unlikely to be discovered at the LHC, we analytically demonstrate several features of the likelihood ratio for this problem through explicit analysis of signal and background matrix elements. …”
Get full text
Article -
1246
Optimizing cervical cancer diagnosis with accurate cell classification using modified HDFF
Published 2025-01-01“…By enhancing the feature extraction process and combining multiple layers of deep learning models, the Modified HDFF method improves classification performance across various tasks, ranging from binary to multi-class problems. …”
Get full text
Article -
1247
Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
Published 2024-09-01“…The key element of the GenClass method is that it can generate classification rules programmatically and detect the hidden associations that exist between the problem features and the desired classes. …”
Get full text
Article -
1248
Temporal Analysis of Multispectral Satellite Data for the Purpose of Urbanization Monitoring
Published 2025-07-01“…Monitoring the urbanization process and early detection of illegal construction should enable meaningful urban planning and the protection of natural and cultural features of the community. …”
Get full text
Article -
1249
FocusDet: an efficient object detector for small object
Published 2024-05-01“…It consists of three parts: backbone, feature fusion structure, and detection head. STCF-EANet was used as the backbone for feature extraction, the Bottom Focus-PAN for feature fusion, and the detection head for object localization and recognition.To maintain sufficient global context information and extract multi-scale features, the STCF-EANet network backbone is used as the feature extraction network.PAN is a feature fusion module used in general object detectors. …”
Get full text
Article -
1250
Development of methods for neutralizing «Zero-day» threats
Published 2024-01-01“…The actual problem of information systems security - the threat of «zero-day» is considered. …”
Get full text
Article -
1251
Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation
Published 2025-08-01“…The DFRC waveform design problem is formulated based on minimizing cross- and auto-correlation Peak Sidelobe Levels (PSL), while considering constant envelope and SHM constraints. …”
Get full text
Article -
1252
Diversities between pediatric extra-pulmonary and pulmonary tuberculosis: a warning sign for the future
Published 2014-08-01“…Background: Tuberculosis(TB) remains a major global health problem. The childhood tuberculosis has some unique features different which makes the diagnosis more complicated. …”
Get full text
Article -
1253
Attack traffic allocation and load balancing mechanism for SDN
Published 2025-03-01“…To tackle the problem of traditional traffic allocation methods in software-defined networks (SDN) potentially failing to effectively detect distributed denial of service (DDoS) attacks, a traffic allocation and load balancing mechanism for attack traffic was proposed. …”
Get full text
Article -
1254
Robust screening of atrial fibrillation with distribution classification
Published 2025-07-01“…It achieves state-of-the-art performance and unprecedented robustness on the screening problem while only leveraging one interpretable feature and little training data. …”
Get full text
Article -
1255
Conceptual Approaches аnd the Program of Polimas-Stability Study of Migration of Foreign Students in Russia
Published 2023-01-01“…An analysis of the state of the theoretical and methodological base on the problem of migration of foreign students made it possible to establish the lack of elaboration of aspects related to the spatial features of their transformation and, in particular, the adaptation of foreign students in host countries. …”
Get full text
Article -
1256
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01“…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
Get full text
Article -
1257
Reliable identification method of intrusion personnel in front of underground moving equipment
Published 2025-08-01“…By introducing the Sobel residual block structure, a fusion model of infrared and visible images based on improved STDFusionNet network architecture is constructed to enhance the feature representation of the fused image. Then, a reliable identification method of underground personnel based on YOLOv5s is proposed, and the visible light and infrared dual-modal features are combined to fuse and complement each other, and an end-to-end single-stage detection model of intrusive personnel in front of underground moving equipment is constructed, which realizes the reliable detection of intrusive personnel in front of underground moving equipment. …”
Get full text
Article -
1258
On the Equilibrium State Stability of a Neural Network Model
Published 2014-06-01“…In the paper, a neural network model based on three McCulloch–Pitts adder neurons is considered. Previously, the features of the model dynamics were numerically analyzed and the stability of various dynamic modes of the network with small changes of the current state was studied, including the detection of parameters specific for the chaotic system dynamics. …”
Get full text
Article -
1259
Method for reconstructing safety and arming motion process by integrating Kalman filter and KCF
Published 2025-03-01“…Abstract This paper addresses the challenge of reconstructing the motion process of the safety and arming (S&A) mechanism in fuze by transforming the problem into a target detection and tracking problem. …”
Get full text
Article -
1260
Design of Enhanced License Plate Information Recognition Algorithm Based on Environment Perception
Published 2025-01-01“…Aiming at the problem of difficulty in completely and accurately identifying number plate information in bad weather, this study proposes an algorithm based on environmental perception and the enhanced recognition of number plate information. …”
Get full text
Article