Search alternatives:
generate » generated (Expand Search), general (Expand Search)
Showing 921 - 940 results of 2,920 for search 'more function generate', query time: 0.17s Refine Results
  1. 921

    Integrating the Prior Shape Knowledge Into Deep Model and Feature Fusion for Topologically Effective Brain Tumor Segmentation by Salma Asif, Ahmad Raza Shahid, Kiran Aftab, Syed Ather Enam

    Published 2025-01-01
    “…Deep learning techniques totally rely on the loss function optimization and due to the lack of explicit form of prior knowledge, they may struggle to generate the accurate tumor shapes. …”
    Get full text
    Article
  2. 922

    G2Grad-CAMRL: An Object Detection and Interpretation Model Based on Gradient-Weighted Class Activation Mapping and Reinforcement Learning in Remote Sensing Images by Shoulin Yin, Liguo Wang, Muhammad Shafiq, Lin Teng, Asif Ali Laghari, Muhammad Faizan Khan

    Published 2023-01-01
    “…The reinforcement learning method is used to optimize the generated region generation network. At the same time, we improve the reward function of reinforcement learning to improve the effectiveness of the region generation network. …”
    Get full text
    Article
  3. 923

    An IoT intrusion detection framework based on feature selection and large language models fine-tuning by Huan Ma, Wan Zhang, Dalong Zhang, Baozhan Chen

    Published 2025-07-01
    “…This algorithm utilizes the CMA-ES algorithm for feature search while also taking into account the mutual information and collinearity among features, thereby more effectively reducing redundancy features. Subsequently, we employ the selected representative features to fine-tune LLMs and generate additional attack samples. …”
    Get full text
    Article
  4. 924

    A novel lightweight hybrid cryptographic framework for secure smart card operations by Kranthi Kumar Singamaneni

    Published 2025-05-01
    “…In this article, we propose a novel hybrid crypto standard to enhance the security and privacy of the transactions using smart cards, to achieve this we integrate Elliptic Curve Cryptography Curve25519 to generate secure keys, SPECK block cipher for lightweight encipherment with a powerful hash function for message authentication and integrity checks called PHOTON. …”
    Get full text
    Article
  5. 925

    Few-Shot Unsupervised Domain Adaptation Based on Refined Bi-Directional Prototypical Contrastive Learning for Cross-Scene Hyperspectral Image Classification by Xuebin Tang, Hanyi Shi, Chunchao Li, Cheng Jiang, Xiaoxiong Zhang, Lingbin Zeng, Xiaolei Zhou

    Published 2025-07-01
    “…Furthermore, our framework introduces the class-balanced multicentric dynamic prototype strategy to generate more robust and representative prototypes. …”
    Get full text
    Article
  6. 926

    Statistical Analysis of Inverse Weibull based on Step-Stress Partially Accelerated Life Tests with Unified Hybrid Censoring Data by Amal Soliman Hassan, Abd ELwahab Hagag, Nader Metwally, Omar Hussein Sery

    Published 2025-04-01
    “…For the purpose of estimating the model parameters and acceleration factor, the maximum likelihood approach is applied along with the maximum product of the spacing procedure to generate point and interval estimates. The squared error loss function is used to calculate the Bayes point estimates based on the assumption of independent gamma priors. …”
    Get full text
    Article
  7. 927

    RMixDA: A Random Compound Data Augmentation Operation Framework for Neural Machine Translation by Huijun Wang, Xiaojing Du, Xinkun Hao

    Published 2025-01-01
    “…We further incorporate contrastive learning, identifying augmented data as positive or negative samples to evaluate similarity more effectively. Additionally, a novel evaluation method for augmented data quality is introduced, which is regularized by the NMT model’s loss function to improve the positive correlation between augmented data quality and model training. …”
    Get full text
    Article
  8. 928

    Innovative Strategies For Social-Economic Development Financial Strategies In The Development Country by Chukwu Anthony Ogochukwu, Karina Kasztelnik

    Published 2021-03-01
    “…The research study highlighted the need for both the government and financing institutions to support small businesses to function effectively to remain relevant, continue to generate more employment, improve the living standard of the owners of small business, and ultimately impact development country at large. …”
    Get full text
    Article
  9. 929

    Insulin secretion deficits in a Prader-Willi syndrome β-cell model are associated with a concerted downregulation of multiple endoplasmic reticulum chaperones. by Erik A Koppes, Marie A Johnson, James J Moresco, Patrizia Luppi, Dale W Lewis, Donna B Stolz, Jolene K Diedrich, John R Yates, Ronald C Wek, Simon C Watkins, Susanne M Gollin, Hyun Jung Park, Peter Drain, Robert D Nicholls

    Published 2023-04-01
    “…Consistent with reduced ER chaperones levels, PWS INS-1 β-cells are more sensitive to ER stress, leading to earlier activation of all three arms of the unfolded protein response. …”
    Get full text
    Article
  10. 930

    Efficient and Effective NDVI Time-Series Reconstruction by Combining Deep Learning and Tensor Completion by Ang Li, Menghui Jiang, Dong Chu, Xiaobin Guan, Jie Li, Huanfeng Shen

    Published 2025-01-01
    “…The ST-Tensor method is first used to generate high-quality seamless NDVI data as the label data to construct sample pairs, along with the original degraded observations. …”
    Get full text
    Article
  11. 931

    Drugs of abuse drive neurotransmitter plasticity that alters behavior: implications for mental health by Marta Pratelli, Marta Pratelli, Nicholas C. Spitzer, Nicholas C. Spitzer

    Published 2025-03-01
    “…Changes in the transmitter neurons express can generate changes in animal behavior. The ability of neurons to express multiple transmitters and/or switch them in response to environmental stimuli likely evolved to provide flexibility and complexity to neuronal circuit function in an ever-changing environment. …”
    Get full text
    Article
  12. 932

    A Novel Time-Varying P-III Distribution Curve Fitting Model to Estimate Design Floods in Three Gorges Reservoir Operation Period by Yuzuo Xie, Shenglian Guo, Sirui Zhong, Xiaoya Wang, Jing Tian, Zhiming Liang

    Published 2024-11-01
    “…The results indicate that: (1) The modified reservoir index used as a covariate can effectively capture the non-stationary characteristics of the flood series; (2) The Tv-P3/CF model emphasizes the fitness of historical information, yielding superior results compared to time-varying P-III distribution estimated by the maximum likelihood method; (3) Compared to the original design values, the 1000-year design peak discharge <i>Q</i><sub>m</sub> and 3-day and 7-day flood volumes in the TGR operation period are reduced by approximately 20%, while the 15-day and 30-day flood volumes are reduced by about 16%; (4) The flood-limited water level of the TGR can be raised from 145 m to 154 m, which can annually generate 0.32 billion kW h more hydropower (or increase by 6.8%) during flood season without increasing flood prevention risks.…”
    Get full text
    Article
  13. 933

    The pervasive effects of an antibiotic on the human gut microbiota, as revealed by deep 16S rRNA sequencing. by Les Dethlefsen, Sue Huse, Mitchell L Sogin, David A Relman

    Published 2008-11-01
    “…We investigated the distal gut bacterial communities of three healthy humans before and after treatment with ciprofloxacin, obtaining more than 7,000 full-length rRNA sequences and over 900,000 pyrosequencing reads from two hypervariable regions of the rRNA gene. …”
    Get full text
    Article
  14. 934

    ELTrack: Events-Language Description for Visual Object Tracking by Mohamad Alansari, Khaled Alnuaimi, Sara Alansari, Sajid Javed

    Published 2025-01-01
    “…ELTrack synthesizes event data, filters out noise, and applies imprinting and a step decay function to introduce a novel event image representation called Pseudo-Frames. …”
    Get full text
    Article
  15. 935

    Mechanical feedback mechanisms in a multiscale sliding filament model of lymphatic muscle pumping by Peter Y. Xie, Christopher J. Morris, Christopher D. Bertram, Michael J. Davis, Samira Jamalian, Mohammad Jafarnejad, David C. Zawieja, James E. Moore, Jr

    Published 2025-06-01
    “…Lymph transport is important not only for fluid homeostasis, but also for immune function, as lymph is a carrier for immune cells. Lymphatic muscle cells exhibit both cardiac-like phasic contractions to generate flow and smooth-muscle-like tonic contractions to regulate flow. …”
    Get full text
    Article
  16. 936

    COVID-19 Diagnosis Using Spectral and Statistical Analysis of Cough Recordings Based on the Combination of SVD and DWT by Thabit Sultan Mohammed, Awni Ismail Sultan, Khattab M. Ali Alheeti, Karim Mohammed Aljebory, Hasan Ismail Sultan, Muzhir Shaban Al-Ani

    Published 2023-04-01
    “… Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. …”
    Get full text
    Article
  17. 937

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  18. 938

    Integrated Reporting: Problems of Formation by N. A. Mislavskaya

    Published 2020-08-01
    “…The latter are interesting in the symbiosis of criticism and constructivism because against the lack of objective reasons for the introduction of integrated reporting in Russia, there are questions raised about the need to generate a unified theory that underlies the functioning of accounting systems as well as the economic consciousness development of our society and implementation of business ethics. …”
    Get full text
    Article
  19. 939

    LANGUAGE SPACE OF NEURAL NETWORKS: FEATURES AND DIFFERENCES FROM NATURAL LANGUAGE by Natalia B. Egorchenkova, Olga V. Korobova

    Published 2024-12-01
    “…Modern society is developing in a world of information overload and digitalization, which has led to a need for artificial intelligence (AI) to help analyze and process information more efficiently. Most AI models use natural language processing, and while they can imitate human speech, they generate texts based on templates set by humans. …”
    Get full text
    Article
  20. 940

    Mental health and well-being of older adults living with HIV in sub-Saharan Africa: a systematic review by Charles R J C Newton, Amina A Abubakar, Patrick Nzivo Mwangala, Adam Mabrouk, Ryan Wagner

    Published 2021-09-01
    “…Future work should have sufficiently large samples of PLWH50+, engage appropriate comparison groups, harmonise the measurement of these outcomes using a standardised methodology to generate more robust prevalence estimates and confirm predictors.PROSPERO registration number CRD42020145791.…”
    Get full text
    Article