期刊文献+
共找到74,181篇文章
< 1 2 250 >
每页显示 20 50 100
Figma2Code:面向Figma设计稿的自动代码生成方法 被引量:1
1
作者 朱琳 封颖超杰 +8 位作者 朱航 王斯加 朱闽峰 喻晨昊 张钰荟 许达兴 赵德明 冯玉君 陈为 《计算机辅助设计与图形学学报》 北大核心 2025年第2期321-329,共9页
设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Co... 设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Code.首先,通过节点和图层优化提高设计稿元数据质量;其次,采用元数据标注信息的语义理解和图像识别技术识别组件;然后构建一套通用型的中间态数据结构,表示优化后的元数据和识别后的组件属性,以支持多种代码语言的生成;最后,基于模板生成可用代码,并通过函数抽取和元素循环输出提高代码可用性.采用生成代码的复现样式准确度量化评估和基于专家经验的代码可用性定性评估,证明了所提方法的有效性. 展开更多
关键词 设计稿转代码 逆向工程 用户界面 深度学习
在线阅读 下载PDF
Parametric study to implement a water-weakening process in UDEC
2
作者 Fengchang Bu Michel Jaboyedoff +3 位作者 Marc-Henri Derron Lei Xue Yuan Cui Chao Xu 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第3期1378-1386,共9页
Despite the prevalence and validity of the universal distinct element code(UDEC)in simulations in geotechnics domain,water-weakening process of rock models remains elusive.Prior research has made positive contribution... Despite the prevalence and validity of the universal distinct element code(UDEC)in simulations in geotechnics domain,water-weakening process of rock models remains elusive.Prior research has made positive contributions to a presupposed link between modelling parameters and saturation degree,Sr.Nevertheless,this effort presents inaccurate results and limited implications owing to the misleading interpretation,that is,devoid of the basic logic in UDEC that modelling parameters should be calibrated by tested macroscopic properties in contrast to a presupposed relation with Sr.To fill this gap,a new methodology is proposed by coupling a computationally efficient parametric study with the simulation of water-weakening mechanisms.More specifically,tested macroscopic properties with different Sr values are input into parametric relations to acquire initial modelling parameters that are sequentially calibrated and modulated until simulations are in line with geomechanical tests.Illustrative example reveals that numerical water-weakening effects on macroscopic properties,mechanical behaviours,and failure configurations are highly consistent with tested ones with noticeable computational expediency,implying the feasibility and simplicity of this methodology.Furthermore,with compatibility across various numerical models,the proposed methodology substantially extends the applicability of UDEC in simulating water-weakening geotechnical problems. 展开更多
关键词 Parametric analysis Universal distinct element code(udec) Water-weakening Rock strength
在线阅读 下载PDF
基于UDEC的岩脉侵入角度对隧道安全影响分析
3
作者 王毅 李乔 《山西建筑》 2025年第1期164-167,共4页
为探究岩脉侵入角度对隧道开挖的影响,文章以泸石高速石棉隧道开挖时地层遭遇不同角度岩脉侵入为工程背景,通过UDEC离散元计算,总结岩脉侵入角度对隧道开挖的影响,给出有效处理措施,并得出以下结论:岩脉和被侵入岩体界面易发生塑性滑移... 为探究岩脉侵入角度对隧道开挖的影响,文章以泸石高速石棉隧道开挖时地层遭遇不同角度岩脉侵入为工程背景,通过UDEC离散元计算,总结岩脉侵入角度对隧道开挖的影响,给出有效处理措施,并得出以下结论:岩脉和被侵入岩体界面易发生塑性滑移,隧道开挖后岩脉区围岩变形最大,且岩脉区围岩有开裂、滑移和隆起现象,围岩变形随角度的减小而减小。边墙与仰拱连接处轴力、剪力、弯矩均最大,安全系数最小,三种工况均在0.3左右。衬砌轴力、剪力的最大值随角度减小而增大,弯矩受角度的影响较小。岩脉区域的安全系数在向着岩脉倾斜方向更小。岩脉侵入区域隧道开挖应采用岩脉区域局部注浆、封闭仰拱、增大衬砌厚度三种方法来加固围岩和提高衬砌承载能力。 展开更多
关键词 隧道工程 侵入岩脉 udec离散元 处置措施
在线阅读 下载PDF
Correction:Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space
4
作者 Mudassir Khalil Muhammad Imran Sharif +3 位作者 Ahmed Naeem Muhammad Umar Chaudhry Hafiz Tayyab Rauf Adham E.Ragab 《Computers, Materials & Continua》 SCIE EI 2025年第1期1461-1461,共1页
In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab C... In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”. 展开更多
关键词 Deep code CIELAB
在线阅读 下载PDF
基于离散元UDEC数值模拟对切顶卸压留巷的研究与应用
5
作者 韩珂 《晋控科学技术》 2025年第1期1-4,共4页
为研究坚硬顶板条件下工作面巷道切顶卸压留巷技术,以陕西延长石油榆林可可盖煤业有限公司13102工作面运输顺槽为研究背景,采用UDEC数值模拟不同切顶深度和不同切顶角度下的巷道围岩形态。模拟结果表明:切顶卸压方法可以有效解决坚硬顶... 为研究坚硬顶板条件下工作面巷道切顶卸压留巷技术,以陕西延长石油榆林可可盖煤业有限公司13102工作面运输顺槽为研究背景,采用UDEC数值模拟不同切顶深度和不同切顶角度下的巷道围岩形态。模拟结果表明:切顶卸压方法可以有效解决坚硬顶板留巷的问题,确定最佳切顶深度为8 m,最佳切顶角度为10°,并进行了工业性实践,13102工作面运输顺槽按照模拟最佳的切顶深度和角度进行定向爆破,支护加上恒阻锚索。实践表明切顶卸压方式对巷道的控制效果良好。 展开更多
关键词 切顶 留巷 udec 定向爆破
在线阅读 下载PDF
应力波作用下含结构面顺层岩质边坡动力响应UDEC模拟
6
作者 史杰辉 程钊 +2 位作者 柴少波 周英博 宋浪 《沈阳理工大学学报》 2025年第4期85-91,共7页
当应力波在含结构面岩质边坡中传播时,会在坡面和结构面之间产生多重反射波,使坡面振动响应变得十分复杂。本文基于UDEC离散元数值方法对P波入射含顺层结构面岩质边坡引起的振动展开研究,通过对不同工况下坡面处质点振动放大系数的变化... 当应力波在含结构面岩质边坡中传播时,会在坡面和结构面之间产生多重反射波,使坡面振动响应变得十分复杂。本文基于UDEC离散元数值方法对P波入射含顺层结构面岩质边坡引起的振动展开研究,通过对不同工况下坡面处质点振动放大系数的变化分析顺层结构面刚度、结构面分布角及结构面间距等对边坡动力响应的影响。结果表明:坡面振动速度放大系数随结构面刚度的增大逐渐增大,随入射波频率增大逐渐减小;坡面振动放大系数随结构面分布角变化呈V形变化;当结构面成组出现时,结构面的个数与间距共同影响坡面振动效应。此外,结合结构面附近塑性应力分布区的特征,分析应力波引起含结构面顺层岩质边坡滑动的发生机理。 展开更多
关键词 顺层岩质边坡 动力响应 地表振动 udec模拟
在线阅读 下载PDF
Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR
7
作者 Hailong Wang Junchao Shi 《Computers, Materials & Continua》 SCIE EI 2025年第1期1109-1128,共20页
A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can ... A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition.In the coding number detection stage,Differentiable Binarization Network is used as the backbone network,combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect.In terms of text recognition,using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate the problem of coding recognition errors caused by image color distortion due to variations in lighting and background noise.In addition,model pruning and quantization are used to reduce the number ofmodel parameters to meet deployment requirements in resource-constrained environments.A comparative experiment was conducted using the dataset of tank bottom spray code numbers collected on-site,and a transfer experiment was conducted using the dataset of packaging box production date.The experimental results show that the algorithm proposed in this study can effectively locate the coding of cans at different positions on the roller conveyor,and can accurately identify the coding numbers at high production line speeds.The Hmean value of the coding number detection is 97.32%,and the accuracy of the coding number recognition is 98.21%.This verifies that the algorithm proposed in this paper has high accuracy in coding number detection and recognition. 展开更多
关键词 Can coding recognition differentiable binarization network scene visual text recognition model pruning and quantification transport model
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
8
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol code crimson HAEMORRHAGE Trauma
暂未订购
一套实用的企业应用分析框架CODE
9
作者 姚富士 《信息技术与标准化》 2025年第1期53-57,共5页
随着企业信息化的深入,众多应用不再是“孤岛”,而是形成体系,应用间集成度越来越高,与业务的融合不断加深。在这种大趋势下,企业信息化在具体应用落地时要充分考虑其在企业体系中的定位,基于业务和技术环境找准发力点,才能最大化应用... 随着企业信息化的深入,众多应用不再是“孤岛”,而是形成体系,应用间集成度越来越高,与业务的融合不断加深。在这种大趋势下,企业信息化在具体应用落地时要充分考虑其在企业体系中的定位,基于业务和技术环境找准发力点,才能最大化应用的价值。提出一套用于企业应用分析框架CODE,该分析框架由目标、业务上下文、系统上下文、领域、数据、分布、发展、接口、交互等要素构成,并充分考虑了企业环境的复杂性。经验证,该应用框架能够较好地完成应用分析,助力企业更好地进行应用建设。 展开更多
关键词 企业信息化 复杂性 分析框架 code
在线阅读 下载PDF
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
10
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
Design of Serially Concatenated Two-Level Polar Coded Modulation System with Low-Complexity
11
作者 Zhou Lin Liao Guojun +3 位作者 Xu Lei An Ran Xie Xianzhong Wang Xi 《China Communications》 2025年第1期102-110,共9页
Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitat... Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%. 展开更多
关键词 bit-interleaved coded modulation high-order modulation multilevel coding polar codes
在线阅读 下载PDF
Quick Response Code在手术室新护士及实习生临床培训考核中的应用
12
作者 叶文婕 金鑫 《中国药物经济学》 2025年第9期125-128,共4页
目的探讨Quick Response Code在手术室新护士及实习生临床培训考核中的应用效果。方法选取2023年12月至2024年11月九江市第一人民医院手术室的新护士及实习生共100名,按随机数字表法分为观察组和对照组,每组50名。对照组采用常规培训与... 目的探讨Quick Response Code在手术室新护士及实习生临床培训考核中的应用效果。方法选取2023年12月至2024年11月九江市第一人民医院手术室的新护士及实习生共100名,按随机数字表法分为观察组和对照组,每组50名。对照组采用常规培训与管理,观察组在对照组基础上增加Quick Response Code培训,比较两组的培训效果。结果观察组理论考核评分和操作考核评分分别为(92.37±4.69)分和(91.16±4.31)分,均高于对照组的(85.12±3.86)分和(86.43±3.85)分(P<0.05)。观察组培训总满意度为96.00%,高于对照组的82.00%(P<0.05)。观察组仪器设备损耗率和不良事件发生率分别为0.00%和2.00%,均低于对照组的8.00%和14.00%(P<0.05)。观察组各项核心胜任力评分及总分均高于对照组(P<0.05)。结论Quick Response Code在手术室新护士及实习生临床培训考核中的应用效果显著,可提高新护士及实习生的考核成绩与满意度,降低仪器设备损耗率及不良事件发生率,同时可提升核心胜任力。 展开更多
关键词 新护士 实习生 手术室 Quick Response code 培训考核
原文传递
Construction of Constant Rank and Orbit Codes over Finite Chain Rings
13
作者 GUO Ye LIU Xiusheng 《Wuhan University Journal of Natural Sciences》 2025年第3期289-301,共13页
In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over ... In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over finite chain rings and constant dimension codes over the residue fields.In particular,we prove that an orbit submodule code over a finite chain ring is a constant rank code.Finally,for special finite chain ring F_(q)+γF_(q),we define a Gray mapφfrom(F_(q)+γF_(q))^(n)to F^(2n)_(q),and by using cyclic codes over F_(q)+γF_(q),we obtain a method of constructing an optimum distance constant dimension code over F_(q). 展开更多
关键词 finite chain ring rank of linear codes constant rank codes orbit codes
原文传递
Neural Codes Constructs Based on Combinatorial Design
14
作者 Jin Huang 《Applied Mathematics》 2025年第1期42-60,共19页
Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into... Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into neuroscience, proposing the concept of combinatorial neural codes. And it was further studied in depth using algebraic methods by C. Curto. In this paper, we construct a class of combinatorial neural codes with special properties based on classical combinatorial structures such as orthogonal Latin rectangle, disjoint Steiner systems, groupable designs and transversal designs. These neural codes have significant weight distribution properties and large minimum distances, and are thus valuable for potential applications in information representation and neuroscience. This study provides new ideas for the construction method and property analysis of combinatorial neural codes, and enriches the study of algebraic coding theory. 展开更多
关键词 Combinatorial Neural codes Orthogonal Latin Rectangle Steiner System Group Divisible Design Transversal Design
在线阅读 下载PDF
Shift in Translation:A Case Study of Translating NFPA 1 Fire Code into Chinese
15
作者 Fang Chen Xinlu Xing Huili Wang 《Journal of Contemporary Educational Research》 2025年第2期1-15,共15页
National Fire codes,mandated by government authorities to tackle technical challenges in fire prevention and control,establish fundamental standards for construction practices.International collaboration in fire prote... National Fire codes,mandated by government authorities to tackle technical challenges in fire prevention and control,establish fundamental standards for construction practices.International collaboration in fire protection technologies has opened avenues for China to access a wealth of documents and codes,which are crucial in crafting regulations and developing a robust,scientific framework for fire code formulation.However,the translation of these codes into Chinese has been inadequate,thereby diminishing the benefits of technological exchange and collaborative learning.This underscores the necessity for comprehensive research into code translation,striving for higher-quality translations guided by established translation theories.In this study,we translated the initial segment of the NFPA 1 Fire Code into Chinese and examined both the source text and target text through the lens of Translation Shift Theory,a concept introduced by Catford.The conclusion culminated in identifying four key shifts across various linguistic levels:lexis,sentences,and groups,to ensure an accurate and precise translation of fire codes.This study offers a through and lucid explanation of how the translator integrates Catford’s theories to solve technical challenges in NFPA 1 Fire Code translation,and establish essential standards for construction translation practices. 展开更多
关键词 Fire code code document JC Catford Translation shift theory
在线阅读 下载PDF
Blind recognition of polar code parameters based on log-likelihood ratio
16
作者 ZHONG Zhaogen XIE Cunxiang JIN Kun 《Journal of Systems Engineering and Electronics》 2025年第3期642-658,共17页
The syndrome a posteriori probability of the log-likelihood ratio of intercepted codewords is used to develop an algorithm that recognizes the polar code length and generator matrix of the underlying polar code.Based ... The syndrome a posteriori probability of the log-likelihood ratio of intercepted codewords is used to develop an algorithm that recognizes the polar code length and generator matrix of the underlying polar code.Based on the encoding structure,three theorems are proved,two related to the relationship between the length and rate of the polar code,and one related to the relationship between frozen-bit positions,information-bit positions,and codewords.With these three theorems,polar codes can be quickly reconstruced.In addition,to detect the dual vectors of codewords,the statistical characteristics of the log-likelihood ratio are analyzed,and then the information-and frozen-bit positions are distinguished based on the minimumerror decision criterion.The bit rate is obtained.The correctness of the theorems and effectiveness of the proposed algorithm are validated through simulations.The proposed algorithm exhibits robustness to noise and a reasonable computational complexity. 展开更多
关键词 code length frozen-bit position information-bit position log-likelihood ratio polar code
在线阅读 下载PDF
Research on deep learning decoding method for polar codes in ACO-OFDM spatial optical communication system
17
作者 LIU Kangrui LI Ming +2 位作者 CHEN Sizhe QU Jiashun ZHOU Ming’ou 《Optoelectronics Letters》 2025年第7期427-433,共7页
Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbule... Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder. 展开更多
关键词 frequency conduction polar codes deep learning signal demodulation deep learning technique DECODING ACO OFDM polarization code decoding
原文传递
Lightweight Deep Learning Model and Novel Dataset for Restoring Damaged Barcodes and QR Codes in Logistics Applications
18
作者 Tarek Muallim Haluk Kucuk +1 位作者 Muhammet Bareket Metin Kahraman 《Computer Modeling in Engineering & Sciences》 2025年第6期3557-3581,共25页
This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional(1D)barcodes and Quick Response(QR)codes,addressing critical challenges in logistics ope... This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional(1D)barcodes and Quick Response(QR)codes,addressing critical challenges in logistics operations.The proposed solution leverages an efficient Pix2Pix-based framework,a type of conditional Generative Adversarial Network(GAN)optimized for image-to-image translation tasks,enabling the recovery of degraded barcodes and QR codes with minimal computational overhead.A core contribution of this work is the development of a synthetic dataset that simulates realistic damage scenarios frequently encountered in logistics environments,such as low contrast,misalignment,physical wear,and environmental interference.By training on this diverse and realistic dataset,the model demonstrates exceptional performance in restoring readability and decoding accuracy.The lightweight architecture,featuring a U-Net-based encoder-decoder with separable convolutions,ensures computational efficiency,making the approach suitable for real-time deployment on embedded and resource-constrained devices commonly used in logistics systems.Experimental results reveal significant improvements:QR code decoding ratios increased from 14%to 99%on training data and from 15%to 68%on validation data,while 1D barcode decoding ratios improved from 7%to 73%on training data and from 9%to 44%on validation data.By providing a robust,resource-efficient solution for restoring damaged barcodes and QR codes,this study offers practical advancements for enhancing the reliability of automated scanning systems in logistics operations,particularly under challenging conditions. 展开更多
关键词 BARcode quick response code RESTORATION applied deep learning
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
19
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Minimal Binary Codes over a Ring
20
作者 PAN Yang GUO Yuxin YE Chang 《湖州师范学院学报》 2025年第2期1-7,共7页
We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh t... We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh transformation.By Gray mapping,we obtain a family of minimal binary linear codes from a generic construction,which have prominent applications in secret sharing and secure two-party computation. 展开更多
关键词 Boolean function trace function minimal code secret sharing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部