Suggested Topics within your search.
Suggested Topics within your search.
-
921
Integrating the Prior Shape Knowledge Into Deep Model and Feature Fusion for Topologically Effective Brain Tumor Segmentation
Published 2025-01-01“…Deep learning techniques totally rely on the loss function optimization and due to the lack of explicit form of prior knowledge, they may struggle to generate the accurate tumor shapes. …”
Get full text
Article -
922
G2Grad-CAMRL: An Object Detection and Interpretation Model Based on Gradient-Weighted Class Activation Mapping and Reinforcement Learning in Remote Sensing Images
Published 2023-01-01“…The reinforcement learning method is used to optimize the generated region generation network. At the same time, we improve the reward function of reinforcement learning to improve the effectiveness of the region generation network. …”
Get full text
Article -
923
An IoT intrusion detection framework based on feature selection and large language models fine-tuning
Published 2025-07-01“…This algorithm utilizes the CMA-ES algorithm for feature search while also taking into account the mutual information and collinearity among features, thereby more effectively reducing redundancy features. Subsequently, we employ the selected representative features to fine-tune LLMs and generate additional attack samples. …”
Get full text
Article -
924
A novel lightweight hybrid cryptographic framework for secure smart card operations
Published 2025-05-01“…In this article, we propose a novel hybrid crypto standard to enhance the security and privacy of the transactions using smart cards, to achieve this we integrate Elliptic Curve Cryptography Curve25519 to generate secure keys, SPECK block cipher for lightweight encipherment with a powerful hash function for message authentication and integrity checks called PHOTON. …”
Get full text
Article -
925
Few-Shot Unsupervised Domain Adaptation Based on Refined Bi-Directional Prototypical Contrastive Learning for Cross-Scene Hyperspectral Image Classification
Published 2025-07-01“…Furthermore, our framework introduces the class-balanced multicentric dynamic prototype strategy to generate more robust and representative prototypes. …”
Get full text
Article -
926
Statistical Analysis of Inverse Weibull based on Step-Stress Partially Accelerated Life Tests with Unified Hybrid Censoring Data
Published 2025-04-01“…For the purpose of estimating the model parameters and acceleration factor, the maximum likelihood approach is applied along with the maximum product of the spacing procedure to generate point and interval estimates. The squared error loss function is used to calculate the Bayes point estimates based on the assumption of independent gamma priors. …”
Get full text
Article -
927
RMixDA: A Random Compound Data Augmentation Operation Framework for Neural Machine Translation
Published 2025-01-01“…We further incorporate contrastive learning, identifying augmented data as positive or negative samples to evaluate similarity more effectively. Additionally, a novel evaluation method for augmented data quality is introduced, which is regularized by the NMT model’s loss function to improve the positive correlation between augmented data quality and model training. …”
Get full text
Article -
928
Innovative Strategies For Social-Economic Development Financial Strategies In The Development Country
Published 2021-03-01“…The research study highlighted the need for both the government and financing institutions to support small businesses to function effectively to remain relevant, continue to generate more employment, improve the living standard of the owners of small business, and ultimately impact development country at large. …”
Get full text
Article -
929
Insulin secretion deficits in a Prader-Willi syndrome β-cell model are associated with a concerted downregulation of multiple endoplasmic reticulum chaperones.
Published 2023-04-01“…Consistent with reduced ER chaperones levels, PWS INS-1 β-cells are more sensitive to ER stress, leading to earlier activation of all three arms of the unfolded protein response. …”
Get full text
Article -
930
Efficient and Effective NDVI Time-Series Reconstruction by Combining Deep Learning and Tensor Completion
Published 2025-01-01“…The ST-Tensor method is first used to generate high-quality seamless NDVI data as the label data to construct sample pairs, along with the original degraded observations. …”
Get full text
Article -
931
Drugs of abuse drive neurotransmitter plasticity that alters behavior: implications for mental health
Published 2025-03-01“…Changes in the transmitter neurons express can generate changes in animal behavior. The ability of neurons to express multiple transmitters and/or switch them in response to environmental stimuli likely evolved to provide flexibility and complexity to neuronal circuit function in an ever-changing environment. …”
Get full text
Article -
932
A Novel Time-Varying P-III Distribution Curve Fitting Model to Estimate Design Floods in Three Gorges Reservoir Operation Period
Published 2024-11-01“…The results indicate that: (1) The modified reservoir index used as a covariate can effectively capture the non-stationary characteristics of the flood series; (2) The Tv-P3/CF model emphasizes the fitness of historical information, yielding superior results compared to time-varying P-III distribution estimated by the maximum likelihood method; (3) Compared to the original design values, the 1000-year design peak discharge <i>Q</i><sub>m</sub> and 3-day and 7-day flood volumes in the TGR operation period are reduced by approximately 20%, while the 15-day and 30-day flood volumes are reduced by about 16%; (4) The flood-limited water level of the TGR can be raised from 145 m to 154 m, which can annually generate 0.32 billion kW h more hydropower (or increase by 6.8%) during flood season without increasing flood prevention risks.…”
Get full text
Article -
933
The pervasive effects of an antibiotic on the human gut microbiota, as revealed by deep 16S rRNA sequencing.
Published 2008-11-01“…We investigated the distal gut bacterial communities of three healthy humans before and after treatment with ciprofloxacin, obtaining more than 7,000 full-length rRNA sequences and over 900,000 pyrosequencing reads from two hypervariable regions of the rRNA gene. …”
Get full text
Article -
934
ELTrack: Events-Language Description for Visual Object Tracking
Published 2025-01-01“…ELTrack synthesizes event data, filters out noise, and applies imprinting and a step decay function to introduce a novel event image representation called Pseudo-Frames. …”
Get full text
Article -
935
Mechanical feedback mechanisms in a multiscale sliding filament model of lymphatic muscle pumping
Published 2025-06-01“…Lymph transport is important not only for fluid homeostasis, but also for immune function, as lymph is a carrier for immune cells. Lymphatic muscle cells exhibit both cardiac-like phasic contractions to generate flow and smooth-muscle-like tonic contractions to regulate flow. …”
Get full text
Article -
936
COVID-19 Diagnosis Using Spectral and Statistical Analysis of Cough Recordings Based on the Combination of SVD and DWT
Published 2023-04-01“… Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. …”
Get full text
Article -
937
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
938
Integrated Reporting: Problems of Formation
Published 2020-08-01“…The latter are interesting in the symbiosis of criticism and constructivism because against the lack of objective reasons for the introduction of integrated reporting in Russia, there are questions raised about the need to generate a unified theory that underlies the functioning of accounting systems as well as the economic consciousness development of our society and implementation of business ethics. …”
Get full text
Article -
939
LANGUAGE SPACE OF NEURAL NETWORKS: FEATURES AND DIFFERENCES FROM NATURAL LANGUAGE
Published 2024-12-01“…Modern society is developing in a world of information overload and digitalization, which has led to a need for artificial intelligence (AI) to help analyze and process information more efficiently. Most AI models use natural language processing, and while they can imitate human speech, they generate texts based on templates set by humans. …”
Get full text
Article -
940
Mental health and well-being of older adults living with HIV in sub-Saharan Africa: a systematic review
Published 2021-09-01“…Future work should have sufficiently large samples of PLWH50+, engage appropriate comparison groups, harmonise the measurement of these outcomes using a standardised methodology to generate more robust prevalence estimates and confirm predictors.PROSPERO registration number CRD42020145791.…”
Get full text
Article