-
321
Digital security risk identification and model construction of smart city based on deep learning
Published 2025-07-01“…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
Get full text
Article -
322
Monitoring of an Electromechanical Prototype Material for Environmental Parameters Using IoT
Published 2022-01-01“…The article’s research was focused on an IoT electronic device and a web platform. A major feature of this electronic device is that its Internet connectivity is achieved using the TCP/IP protocol, an integrated feature of the Shield Ethernet board stacked on top of the Arduino mega board.…”
Get full text
Article -
323
River floating object detection with transformer model in real time
Published 2025-03-01“…This model incorporates the High-level Screening-feature Path Aggregation Network (HS-PAN), which refines feature fusion through a novel bottom-up fusion path, significantly enhancing its expressive power. …”
Get full text
Article -
324
SEM Deep Learning Multiclass Noise Level Classification With Data Augmentation
Published 2025-01-01“…In this study, a deep learning network, the Gaussian Noise Level Classification Network (GNLCN), is proposed to Classify noise levels in SEM images from 0.0000 to 0.0100, incremented by 0.001. …”
Get full text
Article -
325
Research on Apple Recognition and Localization Method Based on Deep Learning
Published 2025-02-01“…Firstly, the multi-scale feature fusion network is improved by adding a 160 × 160 feature scale layer in the backbone network, which is used to enhance the model’s sensitivity in the recognition of very small local features. …”
Get full text
Article -
326
An optimized spatial target trajectory prediction model for multi-sensor data fusion in air traffic management
Published 2025-03-01“…We segment data from various sensors within the automatic dependent surveillance-broadcast system using a designed sliding window of equal time steps, inputting them into the feature extraction network to capture spatiotemporal features. …”
Get full text
Article -
327
Permeability selection of biologically relevant membranes matches the stereochemistry of life on Earth.
Published 2025-05-01“…Early in the evolution of life, a proto-metabolic network was encapsulated within a membrane compartment. …”
Get full text
Article -
328
An improve fraud detection framework via dynamic representations and adaptive frequency response filter
Published 2025-05-01“…Consequently, we introduce the Dynamic Pattern with Adaptive Filter Graph Learning framework for telecom fraud detection. With the sequential network, we capture users’ dynamic behavioral features for LSN input. …”
Get full text
Article -
329
Enhanced SVM-based model for predicting cyberspace vulnerabilities: Analyzing the role of user group dynamics and capital influx.
Published 2025-01-01“…Amid substantial capital influx and the rapid evolution of online user groups, the increasing complexity of user behavior poses significant challenges to cybersecurity, particularly in the domain of vulnerability prediction. …”
Get full text
Article -
330
A bearing fault diagnosis method based on hybrid artificial intelligence models.
Published 2025-01-01“…Addressing the issue of that the difficulty of incipient weak signals feature extraction influences the rolling bearing diagnosis accuracy, an efficient bearing fault diagnostic technique, a proposition is forwarded for hybrid artificial intelligence models, which integrates Improved Harris Hawks Optimization (IHHO) into the optimization of Deep Belief Networks and Extreme Learning Machines (DBN-ELM). …”
Get full text
Article -
331
Research Progress and Technology Outlook of Deep Learning in Seepage Field Prediction During Oil and Gas Field Development
Published 2025-05-01“…Key processes based on Deep Learning, such as feature engineering, network structure design, and physical constraint integration mechanisms, are further explored. …”
Get full text
Article -
332
Investigating the diversity and stylization of contemporary user generated visual arts in the complexity entropy plane
Published 2025-07-01“…Informatizing 149,780 images curated on the DeviantArt and Bēhance platforms from 2010 to 2020, we analyze the relationship between local information in the C-H space and multi-level image features generated by a deep neural network and a feature extraction algorithm. …”
Get full text
Article -
333
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
Published 2025-07-01“…Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. …”
Get full text
Article -
334
Algorithmic Shadow Spectroscopy
Published 2025-03-01“…We present shadow spectroscopy as a simulator-agnostic quantum algorithm for estimating energy gaps using very few circuit repetitions (shots) and no extra resources (ancilla qubits) beyond performing time evolution and measurements. The approach builds on the fundamental feature that every observable property of a quantum system must evolve according to the same harmonic components: we can reveal them by postprocessing classical shadows of time-evolved quantum states to extract a large number of time-periodic signals N_{o}∝10^{8}, whose frequencies correspond to Hamiltonian energy differences with precision limited as ϵ∝1/T for simulation time T. …”
Get full text
Article -
335
A New Method for Identifying Key and Common Themes Based on Text Mining: An Example in the Field of Urban Expansion
Published 2021-01-01“…Second, the key degree of the thematic node in the thematic evolution transfer network is used to represent the key feature of a theme, and the PageRank algorithm is employed to measure the critical score of this theme. …”
Get full text
Article -
336
Generation of diverse biological forms through combinatorial interactions between tissue polarity and growth.
Published 2011-06-01“…This constraint leads to the emergence of features such as curvature that were not directly specified by the regulatory networks. …”
Get full text
Article -
337
Hymyc1 downregulation promotes stem cell proliferation in Hydra vulgaris.
Published 2012-01-01“…Our results show the involvement of Hymyc1 in the control of interstitial stem cell dynamics, provide new clues to decipher the molecular control of the cell and tissue plasticity in Hydra, and also provide further insights into the complex myc network in higher organisms. The ability of Hydra cells to uptake double stranded RNA and to trigger a RNAi response lays the foundations of a comprehensive analysis of the RNAi response in Hydra allowing us to track back in the evolution and the origin of this process.…”
Get full text
Article -
338
Trends in the sustainable use of artificial intelligence: a bibliometric approach
Published 2025-05-01“…China, the United States, and India were the leading countries in terms of scientific production. Thematic evolution revealed a shift toward SDG and artificial neural network. …”
Get full text
Article -
339
EXPLORING A NOVEL HEXACO PERSONALITY TRAITS ON TWITTER: AN ENSEMBLE-BASED NLP METHODOLOGY
Published 2025-01-01“…Our approach integrates advanced NLP techniques across key phases: preprocessing, feature extraction, feature selection, and final detection. …”
Get full text
Article -
340
Mobile Apps to Prevent Violence Against Women and Girls (VAWG): Systematic App Research and Content Analysis
Published 2025-06-01“…ObjectiveTherefore, we aimed to systematically evaluate the trends, geographical distribution, functional categories, available features, and feature evolution of mobile apps designed to prevent violence against women and girls (VAWG). …”
Get full text
Article