-
3581
BFS: A blockchain-based financing scheme for logistics company in supply chain finance
Published 2022-12-01“…At the same time, the transparency feature of blockchain is used to solve the financing dilemma of many industries in supply chain finance. On this basis, we propose a blockchain-based financing scheme (BFS) for logistics company. …”
Get full text
Article -
3582
A Backdoor Attack Against LSTM-Based Text Classification Systems
Published 2019-01-01“…With the widespread use of deep learning system in many applications, the adversary has strong incentive to explore vulnerabilities of deep neural networks and manipulate them. …”
Get full text
Article -
3583
Unlocking autism’s complexity: the Move Initiative’s path to comprehensive motor function analysis
Published 2025-01-01“…Despite advances in sensors, wearables, algorithms, machine learning, and agentic AI, autism research remains siloed, with many tools inaccessible to affected families and care teams. …”
Get full text
Article -
3584
Hybrid neural network method for damage localization in structural health monitoring
Published 2025-03-01“…Abstract The detection of cracks in large structures is of critical importance, as such damage can result not only in significant financial costs but also pose serious risks to public safety. Many existing methods for crack detection rely on deep learning algorithms or traditional approaches that typically use image data. …”
Get full text
Article -
3585
From patterned response dependency to structured covariate dependency: Entropy based categorical-pattern-matching.
Published 2018-01-01“…Data generated from a system of interest typically consists of measurements on many covariate features and possibly multiple response features across all subjects in a designated ensemble. …”
Get full text
Article -
3586
Prediction of Corona-Virus Using Deep Learning
Published 2022-12-01“…Artificial intelligence provides many tools for data analysis, statistical analysis, and intelligent research. …”
Get full text
Article -
3587
Computational inference of co-regulatory modules from transcription factors, MicroRNAs, and their targets using CanMod2
Published 2025-04-01“…In this work, we have introduced several algorithmic enhancements to the earlier version of CanMod2. …”
Get full text
Article -
3588
Data analysis methods in astronomic objects classification (Sloan Digital Sky Survey DR14)
Published 2021-06-01“…The large quantity of statistical information leads to the demand for analytical algorithms and systems capable of making classification. …”
Get full text
Article -
3589
Using mathematical modelling to highlight challenges in understanding trap counts obtained by a baited trap
Published 2025-03-01“…Abstract Baited traps are routinely used in many ecological and agricultural applications, in particular when information about pest insects is required. …”
Get full text
Article -
3590
Optimization of non-smooth functions via differentiable surrogates.
Published 2025-01-01“…Mathematical optimization is fundamental across many scientific and engineering applications. While data-driven models like gradient boosting and random forests excel at prediction tasks, they often lack mathematical regularity, being non-differentiable or even discontinuous. …”
Get full text
Article -
3591
Graph-based two-level indicator system construction method for smart city information security risk assessment
Published 2024-08-01“…The rapid development of urban informatization has led to a deep integration of advanced information technology into urban life. Many decision-makers are starting to alleviate the adverse effects of this informatization process through risk assessment. …”
Get full text
Article -
3592
Application of the Endurance Time Method in the Seismic Assessment of Moment-Resisting Reinforced Concrete Frames with Setbacks
Published 2024-12-01“…Nowadays, many buildings around the world exhibit height irregularities. …”
Get full text
Article -
3593
Modeling LTE-advanced cell capacity estimation using packet bundling and carrier aggregation
Published 2025-05-01“…The increasing demand for mobile usage raises many challenges for service providers. Satisfying subscribers by providing a better quality of service (QoS) is one of the major concerns of an operator. …”
Get full text
Article -
3594
Computational toolkit for predicting thickness of 2D materials using machine learning and autogenerated dataset by large language model
Published 2025-03-01“…This Python-based computational framework harnesses an autogenerated thickness database, developed using large language models, and advanced ML algorithms to facilitate the rapid and scalable estimation of material thickness, relying solely on crystallographic data. …”
Get full text
Article -
3595
A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing
Published 2022-09-01“…Mobile crowdsensing has become a versatile platform for many Internet of things applications in urban scenarios. …”
Get full text
Article -
3596
Application of Machine Learning for Real-Time Phishing Attack Detection
Published 2025-06-01“…The system uses machine learning algorithms to distinguish legitimate websites from phishing websites and generate a prediction to be used for the platform. …”
Get full text
Article -
3597
Real Time Application for Automatic Object and 3D Position Detection and Sorting with Robotic Manipulator
Published 2020-08-01“…For this work, a common industrial task in many factories of pick and place is implemented. …”
Get full text
Article -
3598
Profitability Indicators: Critical Analysis and Applicability in Modern Conditions
Published 2024-10-01“…Theoretical significance of the obtained results consists in the development of the methodology of value-oriented management in order to actualize and adapt the algorithms for calculating profitability indicators to domestic conditions, taking into account the interests of the participants of the organization. …”
Get full text
Article -
3599
Explainable Anomaly Detection Based on Operational Sequences in Industrial Control Systems
Published 2025-01-01“…Anomaly detection systems, initially implemented for detecting device faults or failures, have increasingly become the focus of research aimed at identifying attack patterns as cyberattack techniques become more sophisticated and intelligent. Many anomaly detection algorithms based on deep learning models have good performance but often involve complex neural network structures, creating a black-box issue where users cannot interpret the decisions made by the models. …”
Get full text
Article -
3600
OWNC: Open-World Node Classification on Graphs with a Dual-Embedding Interaction Framework
Published 2025-04-01“…Additionally, when there are too many or too few nodes from unseen classes, classification performance typically declines. …”
Get full text
Article