-
4281
A novel dual embedding few-shot learning approach for classifying bone loss using orthopantomogram radiographic notes
Published 2025-07-01“…The proposed DualFit model architecture consists of two main branches: a Text Processing Branch for converting textual data into dense vectors and a Feature Processing Branch for analyzing numerical and categorical data. …”
Get full text
Article -
4282
FPGA Programming Challenges When Estimating Power Spectral Density and Autocorrelation in Coherent Doppler Lidar Systems for Wind Sensing
Published 2025-02-01“…The second algorithm computes the autocorrelation of the received signals and accumulates the results over the same number of pulses. Both signal pre-processing algorithms are initially developed as logic designs and compiled using the Xilinx System Generator toolset to produce a hardware VLSI image. …”
Get full text
Article -
4283
Advanced control scheme for harmonic mitigation and performance improvement in DC-AC microgrid with parallel voltage source inverter
Published 2025-02-01“…To reduce computational complexity, the FS-MPC selectively employs 30 out of 64 switching vectors, ensuring faster processing without sacrificing performance. …”
Get full text
Article -
4284
SUPERMAGOv2: Protein Function Prediction via Transformer Embeddings and Bitscore-Weighted Features
Published 2025-01-01“…Our machine learning-based model (SUPERMAGOv2) utilizes transformer-based backbones to extract features from multiple layers, which are then processed by six multilayer perceptrons that incorporate a novel bitscore-weighted input derived from DIAMOND alignments, and by an image classification model that converts the extracted feature vectors into images. …”
Get full text
Article -
4285
An Efficient Optimal CapsNet Model-Based Computer-Aided Diagnosis for Gastrointestinal Cancer Classification
Published 2024-01-01“…To achieve it, the SOADL-GCC model employs a bilateral filtering (BF) approach for the noise removal process and enhances image quality. Besides, the SOADL-GCC technique uses a capsule network (CapsNet) model for deriving the feature vectors from preprocessed images. …”
Get full text
Article -
4286
Combined formаtion of a cryptographic key using synchronized artificial neural networks
Published 2021-02-01“…The analysis of the influence of network parameters on the process of eliminating the bit mismatch at the second stage is carried out. …”
Get full text
Article -
4287
DEREGULATED EXPRESSIONS OF MYC ALTER THE EXPRESSIONS OF tRNAS IN BREAST CANCER CELLS
Published 2023-02-01“…Objective: The protein synthesis process is started with DNA being transcribed into mRNA in the nucleus, then mRNA is transported to the cytoplasm and attaches to a ribosome in order to be translated into a protein. …”
Get full text
Article -
4288
Reducing the dynamic range of infrared images based on block-priority equalization and compression of histograms
Published 2022-06-01“…As a result, the total number of alignment vectors is reduced in proportion to the ratio of subsets sizes and the computational complexity of the dynamic range transformation is reduced.Conclusion. …”
Get full text
Article -
4289
Efficient network attack path optimization method based on prior knowledge-based PPO algorithm
Published 2025-03-01“…Based on these rules, action mask vectors are generated before each action sampling phase to modify the distribution of the output of the policy network. …”
Get full text
Article -
4290
Open Radio Access Networks “O-RAN” SystemsThroughput improvement)
Published 2024-12-01“…In this work, we balance the spectral efficiency and the required power, which will reduce the signalling overheads and processing in high-density radio access networks. More specifically, a linear channel estimation (based on the MMSE technique) is employed to design the Conjugate Beamforming vectors. …”
Get full text
Article -
4291
A Combined Approach to Safety and Security of IoT by Applying Fault Tree Analysis and Attack Trees with Minimal Cut Sets
Published 2025-05-01“…FTA systematically identifies root causes of system failures, while AT models attack vectors and their probabilities. By deriving MCS—minimal combinations of safety faults and security breaches—the approach reveals critical scenarios where failures and attacks interact, enabling prioritized mitigation. …”
Get full text
Article -
4292
DeepContainer: A Deep Learning-based Framework for Real-time Anomaly Detection in Cloud-Native Container Environments
Published 2025-01-01“…Comprehensive security testing validates the system's effectiveness across multiple attack vectors, including network-based attacks, resource exhaustion attempts, and access violations. …”
Get full text
Article -
4293
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
Published 2022-12-01“… Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. …”
Get full text
Article -
4294
The complex rupture evolution of the long and slow, tsunamigenic 2021 South Sandwich Islands earthquake
Published 2025-05-01“…This method allows us to suitably reduce the effect of the time-increasing uncertainty of the Green’s function and the effect of modelling errors related to the fault geometry. We found the slip vectors of the 400 km long rupture area rotate clockwise to the south, corresponding to the clockwise rotation of the trench strike. …”
Get full text
Article -
4295
Phylogeny and divergence time estimation of the subfamily Amphipsyllinae based on the Frontopsylla diqingensis mitogenome
Published 2024-12-01“…Fleas are primarily parasites of small mammals and serve as essential vectors of the transmission of plague. The subfamily Amphipsyllinae (Siphonaptera: Leptopsyllidae) consists of 182 species across 13 genera, widely distributed worldwide. …”
Get full text
Article -
4296
Enhancing Cyber Security: Comparing the Accuracy of the Bert Model with Other Common Deep Learning Models in Identifying Email Spam
Published 2025-03-01“…Data preprocessing included stemming, lemmatization, and text vectorization using Word2Vec to enhance feature extraction. …”
Get full text
Article -
4297
Coordinated surveillance system under the One Health approach for cross‐border pathogens that threaten the Union – options for sustainable surveillance strategies for priority path...
Published 2023-03-01“…Finally, there is a roadmap providing an overall description of the steps in the process of developing a surveillance system in order to apply for the grant.…”
Get full text
Article -
4298
Fatty acid oxidation participates in resistance to nutrient-depleted environments in the insect stages of Trypanosoma cruzi.
Published 2021-04-01“…Trypanosoma cruzi, the parasite causing Chagas disease, is a digenetic flagellated protist that infects mammals (including humans) and reduviid insect vectors. Therefore, T. cruzi must colonize different niches in order to complete its life cycle in both hosts. …”
Get full text
Article -
4299
ORGANIZING, STRUCTURING AND UNIFICATION OF CREDIT RISK ESTIMATE PROBLEMS WITHINTHE COMMERCIAL LENDING OF AGRICULTURAL ENTERPRISES
Published 2016-11-01“…The risk management process is based on the evaluation procedure that encourages authors to concentrate on the study of evaluation problems as the fundamental components of the risk management system. …”
Get full text
Article -
4300
Graph Isomorphism and Hybrid-Order Residual Gated Graph Neural Network for Session-Based Recommendation
Published 2025-02-01“…Firstly, graph isomorphic network is used to aggregate feature vectors of adjacent items, which can effectively fuse global and local information, solving the problem that graph neural network is good at capturing local connections between nodes and ignoring global information. …”
Get full text
Article