GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hindawi Limited  (9)
  • 2020-2024  (9)
Material
Publisher
  • Hindawi Limited  (9)
Language
Years
  • 2020-2024  (9)
Year
  • 1
    In: Journal of Food Biochemistry, Hindawi Limited, Vol. 44, No. 10 ( 2020-10)
    Type of Medium: Online Resource
    ISSN: 0145-8884 , 1745-4514
    URL: Issue
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2174913-9
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    In: Journal of Food Biochemistry, Hindawi Limited, Vol. 46, No. 12 ( 2022-12)
    Type of Medium: Online Resource
    ISSN: 0145-8884 , 1745-4514
    URL: Issue
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2174913-9
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Security and Communication Networks Vol. 2022 ( 2022-7-15), p. 1-17
    In: Security and Communication Networks, Hindawi Limited, Vol. 2022 ( 2022-7-15), p. 1-17
    Abstract: Mutation-based fuzzing is currently one of the most effective techniques to discover software vulnerabilities. It relies on mutation strategies to generate interesting seeds. As a state-of-the-art mutation-based fuzzer, AFL follows a mutation strategy with high randomization, which uses randomly selected mutation operators to mutate seeds at random offsets. Its strategy may ignore some efficient mutation operators and mutation positions. Therefore, in this paper, we propose a solution named GSA-Fuzz to improve the efficiency of seed mutation strategy with the gravitational search algorithm (GSA). GSA-Fuzz uses GSA to learn the optimal selection probability distributions of operators and mutation positions and designs a position-sensitive strategy to guide seed mutation with learned distributions. Besides, GSA-Fuzz also provides a flip mode to calculate the efficiencies of the deterministic stage and indeterministic stage and implements switching between the two stages to further improve the efficiency of seed mutation. We compare GSA-Fuzz with the state-of-the-art fuzzers AFL, MOPT-AFL, and EcoFuzz on 10 open-source programs. GSA-Fuzz finds 145% more paths than AFL, 66% more paths than EcoFuzz, and 43% more paths than MOPT-AFL. In addition, GSA-Fuzz also outperforms other fuzzers in bug detection and line coverage.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Disease Markers, Hindawi Limited, Vol. 2022 ( 2022-5-20), p. 1-12
    Abstract: Objective. To observe the morphological changes of corneal endothelial cells in healthy Chinese children and youngsters and analyze the sensitive and specificity of the endothelial assessments. Methods. 14,670 Chinese healthy volunteers enrolled were examined by specular microscopy, and the endothelial descriptive indexes: the central corneal thickness (CCT), endothelial cell density (ECD), coefficient of variation in average cell size (CV), the percentage of regular hexagonal cells (hexagonality, HEX), cell size of minimal cell ( S min ), cell size of maximal cell ( S max ), average cell size ( S avg ), and size of standard deviation of cell area ( S sd ) as well as sex and age were analyzed. Results. The average age of this study is 17.36 ± 7.58  (4–30) years. There is no sex predominance: 7,260 male (49.5%) and 7,410 female (50.5%). The mean CCT, ECD, CV, HEX, S min / max , S avg , and S sd are 529.94 ± 31.53 (437–644) μm, 3,051.28 ± 375.49 (2,031–4,074) cells/mm2, 28.34 ± 4.36 (18–40) %, 61.21 ± 10.29 (17–89) %, ( 147.79 ± 21.94  to 678.29 ± 120.96 ) μm2, 332.74 ± 44.62  μm2, and 95.02 ± 23.17  μm2, respectively. The CCTs keep consistency. The ECD decreased rate is 1.02%/year. The curve of ECD and hexagonality expresses the same linear tender. The CCT and endothelial evaluation indexes have no sex predominant ( p 〉 0.05 ); the quantitative indicators: CCT, ECD, and HEX are significant negative associated with age ( p = 0.001 or p 〈 0.001 ); the variability indexes: the CV, S min , S max , S avg , and S sd are positive correlation ( p 〈 0.001 ). The coefficients of CCT, HE, and S min are -0.35, -0.59, and 1.17, respectively. Conclusions. The ECD decrease rate is 1.02%/year of the normal Chinese Han childhood to the earlier adulthood. The ages 4 to 12, 13 to 20, and 21 to 30 can be named as the childhood, puberty and adulthood from endothelial biologic identity. The HEX is the sensitivity marks for the polymorphisms while the S min is the specificity indicator CVs upon the Topcon Noncon Specular microscopy results.
    Type of Medium: Online Resource
    ISSN: 1875-8630 , 0278-0240
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2033253-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Modelling and Simulation in Engineering Vol. 2022 ( 2022-8-31), p. 1-12
    In: Modelling and Simulation in Engineering, Hindawi Limited, Vol. 2022 ( 2022-8-31), p. 1-12
    Abstract: People who sit incorrectly can have musculoskeletal disorders like cervical spondylosis and lumbar vertebra disease, but without the guidance of a health care professional, it is difficult for people to evaluate their posture and adopt a more appropriate posture. Therefore, to solve this problem, we established a multilevel sitting posture evaluation system by analyzing the parameters such as joint angle, joint torque, joint force, and muscle force. Use the analytic hierarchy process and entropy comprehensive weighting method to weight evaluation indicators. According to their evaluation standards, each parameter is given weight after quantization and normalization. Firstly, take several sitting postures that often appear in office work as examples and use the lower back analysis and joint and static pressure analysis tools in JACK software for simulation analysis. Then, the weights of various parameters such as joints and muscles of the human body were calculated using the hierarchy analysis and entropy weight method, and the quantitative evaluation system of office sitting comfort was constructed. We recruited 50 subjects for an office simulation experiment to verify the feasibility of the evaluation index. Finally, we classified the sitting posture and selected those commonly used in life for evaluation. The proposed sitting posture evaluation system can objectively and comprehensively reflect the quality of sitting posture and guide people to adopt what kind of sitting posture.
    Type of Medium: Online Resource
    ISSN: 1687-5605 , 1687-5591
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2401601-9
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-12-13), p. 1-16
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-12-13), p. 1-16
    Abstract: Data obfuscation is usually used by malicious software to avoid detection and reverse analysis. When analyzing the malware, such obfuscations have to be removed to restore the program into an easier understandable form (deobfuscation). The deobfuscation based on program synthesis provides a good solution for treating the target program as a black box. Thus, deobfuscation becomes a problem of finding the shortest instruction sequence to synthesize a program with the same input-output behavior as the target program. Existing work has two limitations: assuming that obfuscated code snippets in the target program are known and using a stochastic search algorithm resulting in low efficiency. In this paper, we propose fine-grained obfuscation detection for locating obfuscated code snippets by machine learning. Besides, we also combine the program synthesis and a heuristic search algorithm of Nested Monte Carlo Search. We have applied a prototype implementation of our ideas to data obfuscation in different tools, including OLLVM and Tigress. Our experimental results suggest that this approach is highly effective in locating and deobfuscating the binaries with data obfuscation, with an accuracy of at least 90.34%. Compared with the state-of-the-art deobfuscation technique, our approach’s efficiency has increased by 75%, with the success rate increasing by 5%.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    In: Security and Communication Networks, Hindawi Limited, Vol. 2022 ( 2022-5-17), p. 1-16
    Abstract: The research on virus propagation process and control method in wireless sensor networks (WSNs) is one of the essential challenges of network security. This paper proposes a virus control mechanism of degree, betweenness centrality, and k-core-based analytical hierarchy process (DBC-AHP) for WSNs. According to the topology of WSNs, the virus control mechanism uses the DBC-AHP to identify the crucial nodes of the network. It uses the way of crucial nodes’ self-disconnection to suppress the spread of the virus, to improve the network security. In this paper, the effectiveness of the virus control mechanism based on the DBC-AHP is verified by comparing and analyzing the effect of four different crucial node recognition algorithms. With the research of virus control mechanisms in various network environments, it is found that the average degree of nodes, the communication radius of nodes, and the probability of virus infection can affect the inhibition effect of the virus control mechanism. Furthermore, the inhibition effect of virus control mechanisms is studied under the condition with/without MAC mechanism.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    In: Scanning, Hindawi Limited, Vol. 2020 ( 2020-10-21), p. 1-8
    Abstract: The corrosion behavior of an ultralow iron nickel-based alloy Inconel 625 under high-temperature water has been evaluated. The results show that surface oxidation and pitting were the principal corrosion mechanisms of Inconel 625 during the initial immersion period. The surface layer of the oxide film is first Ni-enriched and then Fe-enriched as immersion time increases. The iron ions dissolved from the autoclave could lead to the formation of NiFe2O4 and have a great influence on the oxidation behavior of Inconel 625. The oxides nucleated by solid-state reactions with selective dissolution of Fe and Ni and then grew up through precipitation of cations from solution.
    Type of Medium: Online Resource
    ISSN: 1932-8745 , 0161-0457
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 1497198-7
    SSG: 11
    SSG: 12
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    In: Geofluids, Hindawi Limited, Vol. 2021 ( 2021-9-14), p. 1-12
    Abstract: With low porosity and low permeability, shale reservoirs cannot be mined economically without large-scale hydraulic fracturing operation. However, abundant fracturing fluid will enter the reservoirs during the process of fracture. Nevertheless, there have not been specific research findings on the imbibition law of Fuling shale gas reservoir in China. In this study, an imbibition experiment was carried out on the shale core of Jiaoshiba block of Fuling shale gas reservoir to learn spontaneous imbibition characteristic of Fuling shale gas reservoir. Based on the experimental results, the imbibition process of Fuling shale gas reservoir fracturing fluid is divided into two stages. During the first stage, i.e., the former 30 hours, imbibition velocity is high, with the cumulative imbibition occupying more than 70% of the total imbibition; during the second stage, i.e., the latter 30 hours, the imbibition velocity substantially drops towards balance. There is a typical power function relationship between the average imbibition velocity and imbibition time, and this function relationship runs throughout the whole imbibition process. Nonetheless, the imbibition process of shale core cannot be described directly by the Handy equation. The imbibition velocity is closely related to clay mineral content and pore structure characteristics of shale core. The higher the clay mineral content, the higher the imbibition velocity. According to the relationship between the average imbibition velocity and imbibition time, we derived the estimation equation of fracture area formed by fractured shale gas well to estimate the fracture scale formed by shale gas well fracturing.
    Type of Medium: Online Resource
    ISSN: 1468-8123 , 1468-8115
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2045012-6
    SSG: 13
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...