-
5001
Nonrelativistic Approximation in the Theory of a Spin-2 Particle with Anomalous Magnetic Moment
Published 2025-01-01“…This equation is hypothesized to describe a particle with an anomalous magnetic moment. The complete wave function consists of a two-rank symmetric tensor and a three-rank tensor that is symmetric in two indices. …”
Get full text
Article -
5002
Intelligent standalone eye blinking monitoring system for computer users
Published 2024-12-01“…The blinking monitoring system with the alarm function turned on showed an increase in blinking rates (28.2 ± 12.1 blinks/min) compared to blinking rates without the alarm function (25.2 ± 11.9 blinks/min; p=0.09; Cohen’s effect size d=0.25) when the subjects were watching movie trailers. …”
Get full text
Article -
5003
Generation of a Reconfigurable Logical Cell Using Evolutionary Computation
Published 2013-01-01“…The reconfiguration is realized by modifying its internal parameters generating several logical functions in the same structure. The logical cell is built with three blocks: the initial condition generating function, the tent map, and the output function. …”
Get full text
Article -
5004
Two-Dimensional Coherent Polarization–Direction-of-Arrival Estimation Based on Sequence-Embedding Fusion Transformer
Published 2024-10-01“…Moreover, to enhance the model’s expressive capacity, we designed a multi-task parallel output mode and a multi-task weighted loss function. …”
Get full text
Article -
5005
VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM
Published 2019-08-01“…The formation (change) of the authority establishment matrix for managing a weakly vulnerable process of access control using a promising subsystem for protecting confidential information and the development of a system of indicators to comprehensively evaluate the effectiveness of its functioning is one of the most important tasks of protecting information from unauthorized access, guaranteeing the implementation of a security policy throughout the entire operation period secure electronic document management system.…”
Get full text
Article -
5006
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
Get full text
Article -
5007
-
5008
Regression Model Employing Spiking Neural Network for Bio-Signal Analysis With Hardware Integration
Published 2025-01-01“…Spiking neural networks, known for mimicking the brain’s functionality resulting in efficient algorithms, are gaining attention across various problems and applications. …”
Get full text
Article -
5009
Predicting DNA-binding proteins and binding residues by complex structure prediction and application to human proteome.
Published 2014-01-01“…As more and more protein sequences are uncovered from increasingly inexpensive sequencing techniques, an urgent task is to find their functions. This work presents a highly reliable computational technique for predicting DNA-binding function at the level of protein-DNA complex structures, rather than low-resolution two-state prediction of DNA-binding as most existing techniques do. …”
Get full text
Article -
5010
Bio-Inspired Object Detection and Tracking in Aerial Images: Harnessing Northern Goshawk Optimization
Published 2024-01-01“…To enhance training stability, Northern Goshawk Optimization is utilized to optimize the generator’s cost and loss functions, mitigating issues like non-convergence and mode collapse. …”
Get full text
Article -
5011
Molten Pool Image Segmentation Based on Adaptive Multi-Scale Attention Mechanism
Published 2025-01-01“…This study presents an innovative segmentation algorithm that seamlessly integrates an adaptive multi-scale attention mechanism with the Lossab loss function to tackle challenges like overlapping molten pool contours and arc interference during image segmentation. …”
Get full text
Article -
5012
Impaired mnemonic pattern separation associated with PTSD symptoms paradoxically improves with regular cannabis use
Published 2025-04-01“…Abstract Posttraumatic stress disorder (PTSD) is associated with poor hippocampal function and disrupted pattern recognition. Cannabis use is highly prevalent in individuals with PTSD, yet the impact on these cognitive functions is poorly understood. …”
Get full text
Article -
5013
Land-Cover Semantic Segmentation for Very-High-Resolution Remote Sensing Imagery Using Deep Transfer Learning and Active Contour Loss
Published 2025-01-01“…We assessed the U-Net-scSE, FT-U-NetFormer, and DC-Swin architectures, incorporating transfer learning and active contour loss functions to improve performance on semantic segmentation tasks. …”
Get full text
Article -
5014
Identification of Intrinsic Friction and Torque Ripple for a Robotic Joint with Integrated Torque Sensors with Application to Wheel-Bearing Characterization
Published 2024-11-01“…In this work, we propose an approach for identifying and predicting the intrinsic dynamics using linear regression with non-linear radial basis functions. Then, we validate this regression on a wheel-bearing turning task, in which its friction is a measure of quality, and thus must be accurately measured. …”
Get full text
Article -
5015
Leverage point themes within Dutch municipalities' healthy weight approaches: A qualitative study from a systems perspective.
Published 2023-01-01“…Such an approach has four interconnected system levels: events, structures, goals, and beliefs, in which small changes ('leverage points') can lead to substantial changes in the functioning of the entire system. The current research examined the functioning of five Dutch municipalities' healthy weight approaches (HWAs) and the leverage point themes that can be identified in their system.…”
Get full text
Article -
5016
The Development of the Economic Analysis Methodology in the Digital Economy
Published 2019-01-01“…On the other hand, it stands as a methodical support of management system by performing one of the main functions of practical management in innovative industries. …”
Get full text
Article -
5017
Comparison of Language Models in Skills Extraction From Vacancies and Resumes
Published 2024-03-01“…The result of the study is the selection of the best model and the derivation of functions from the summary text, as well as a comparison of the two sets of functions with each other. …”
Get full text
Article -
5018
THE LEGAL SYSTEM OF RUSSIA AS THE BASIS OF THE SOVEREIGN REGIME OF LEGALITY
Published 2023-03-01“…. ; it is given not just an assessment of their effectiveness in terms of solving national tasks, but also from the point of view of the reliable functionality of the systems themselves, contributing to ensuring a qualitatively different level of performance of all state functions that ensure sovereignty and security; various aspects of the implementation of legality are shown: on the one hand, the formation of an understanding of the regime of legality is a certain dynamic balance of public relations based on legal awareness and legal culture of society; on the other hand, the rule of law is implemented, taking into account national traditions and legal values, which allows us to talk about such a concept as a “sovereign regime of legality”. …”
Get full text
Article -
5019
An improved dung beetle optimizer based on Padé approximation strategy for global optimization and feature selection
Published 2025-03-01“…Finally, the binary version of the mDBO algorithm (bmDBO) was applied to feature selection tasks. Experiments entailing CEC2017 benchmark functions and 17 datasets showed that both mDBO and bmDBO outperformed other algorithms. …”
Get full text
Article -
5020
EFM-ResNet: A Feature Enhanced Network for Tobacco Strips Classification
Published 2025-01-01“…Finally, a WFL loss function is used to address the limitations of the traditional cross-entropy loss function. …”
Get full text
Article