-
4341
Gene therapy shines light on congenital stationary night blindness for future cures
Published 2025-04-01“…Abstract Congenital Stationary Night Blindness (CSNB) is a non-progressive hereditary eye disease that primarily affects the retinal signal processing, resulting in significantly reduced vision under low-light conditions. …”
Get full text
Article -
4342
Aspects of biosafety and biosecurity in poultry
Published 2024-05-01“…Control of biological vectors of introducing pathogens into the farm is carried out through physical protection barriers (arrangement of fences, fences, installation of protective nets and screens on windows, doors, and ventilation shafts). …”
Get full text
Article -
4343
Extremist Ideology Classification in Kazakh: A Multi-Class Approach Using Machine Learning and Psycholinguistic Analysis
Published 2025-01-01“…This paper presents a new approach for analyzing extremist content in the Kazakh language on social media using advanced machine learning and natural language processing techniques. With the rapid growth of online data, especially on social networks, there is an urgent need for tools that can identify and classify extremist ideologies. …”
Get full text
Article -
4344
-
4345
A Revised Counter-Propagation Network Model Integrating Rough Set for Structural Damage Detection
Published 2013-11-01“…This paper proposes a revised counter-propagation network (CPN) model by integrating rough set in structural damage detection, applicable for processing redundant and uncertain information as well as assessing structural health states. …”
Get full text
Article -
4346
Sequential Discrimination of Mixed Quantum States
Published 2025-02-01“…Classical mixtures of quantum states often give rise to decoherence and are generally considered detrimental to quantum processing. However, in the framework of sequential measurement, such mixtures can be beneficial for state discrimination. …”
Get full text
Article -
4347
Vibration-Based Fault Diagnosis of Commutator Motor
Published 2018-01-01“…Proposed techniques used vibration signals and signal processing methods. The authors analysed recognition efficiency for 3 states of the CM: healthy CM, CM with broken tooth on sprocket, CM with broken rotor coil. …”
Get full text
Article -
4348
A hybrid Hadoop-based sentiment analysis classifier for tweets associated with COVID-19 utilizing two machine learning algorithms: CNN, and fuzzy C4.5
Published 2024-12-01“…The approach involves six steps: pre-processing to remove noisy data, vectorizing tweets with word embedding, extracting sentiment and contextual features using convolutional neural networks, fuzzifying outputs with a Gaussian fuzzifier to handle ambiguity, constructing a fuzzy tree and rule base using a fuzzy version of C4.5, and classifying tweets with fuzzy General Reasoning. …”
Get full text
Article -
4349
Classification and Time-Frequency Localization of Arbitrary LPWAN Signals With Radial Deformable DETR
Published 2025-01-01“…Our method eliminates the need for hand-crafting CNN layers or signal processing pipelines for different LPWAN protocols provided that sufficient training samples are available. …”
Get full text
Article -
4350
Research on Analyzing the Emotional Polarity of Malicious Swipe Comments on E-commerce Platforms Based on NPL
Published 2025-01-01“…In the era of rapid advancements in natural language processing (NLP) models, these technologies have immense potential to detect and address societal issues, enhancing the functioning of the digital society. …”
Get full text
Article -
4351
A novel dual embedding few-shot learning approach for classifying bone loss using orthopantomogram radiographic notes
Published 2025-07-01“…The proposed DualFit model architecture consists of two main branches: a Text Processing Branch for converting textual data into dense vectors and a Feature Processing Branch for analyzing numerical and categorical data. …”
Get full text
Article -
4352
Identification of key nodes and vulnerability analysis in airport networks with attention mechanism
Published 2025-07-01“…In this method, the core indicators such as degree, betweenness, closeness, eigenvector, and throughput centrality are adopted, and the input layer is constructed by normalization processing. The query, key and value vectors are calculated by a linear transformation, and then the attention score and weight coefficient are obtained, and finally, the comprehensive importance of the airport is evaluated. …”
Get full text
Article -
4353
Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
Published 2025-06-01“…Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
Get full text
Article -
4354
Comparison Between State-of-the-Art Color Local Binary Pattern-Based Descriptors for Image Retrieval
Published 2024-01-01“…It contributes to the continual evolution of image processing and computer vision, particularly in deep learning methods.…”
Get full text
Article -
4355
Off-Shore wind potential estimation along the coast of Chile by using scatterometer and Reanalysis data
Published 2014-06-01“…The images obtained from the data processing were grouped into three different wind power zones named (A) located up north, (B) in the center and (C) down south-center. …”
Get full text
Article -
4356
Discovering Representations of Democracy in Big Data: Purposive Semantic Sample Selection for Qualitative and Mixed-Methods Research
Published 2024-11-01“…To address this, we propose purposive semantic sampling – a Natural Language Processing approach using document-level embeddings created by a weighted average of word vectors with term frequency-inverse document frequency (tf-idf). …”
Get full text
Article -
4357
Hyperspectral target detection based on graph sampling and aggregation network.
Published 2025-01-01“…This proposed model is capable of autonomously learning the effective feature representations of nodes within the graph, thereby facilitating the extraction and processing of graph data. It achieves this by extracting feature vectors through principal component analysis to construct adjacency matrices and performing convolution operations on hyperspectral images via sparse matrix multiplication, which enables the propagation and aggregation of node features within the graph structure. …”
Get full text
Article -
4358
First M87 Event Horizon Telescope Results. V. Physical Origin of the Asymmetric Ring
Published 2019-01-01“…At the same time, in those models that produce a sufficiently powerful jet, the latter is powered by extraction of black hole spin energy through mechanisms akin to the Blandford-Znajek process. We briefly consider alternatives to a black hole for the central compact object. …”
Get full text
Article -
4359
Distributed Heterogeneous Spiking Neural Network Simulator Using Sunway Accelerators
Published 2024-12-01“…Besides, SWsnn relies on parallel Compute Processing Elements (CPEs) rather than serial Manage Processing Element (MPE) to control the communicating buffers, using Register-Level Communication (RLC) and Direct Memory Access (DMA). …”
Get full text
Article -
4360
An Embedding-Based Semantic Analysis Approach: A Preliminary Study on Redundancy Detection in Psychological Concepts Operationalized by Scales
Published 2025-01-01“…This study introduces an Embedding-based Semantic Analysis Approach (ESAA) for detecting redundancy in psychological concepts, which are operationalized through their respective scales, using natural language processing techniques. The ESAA utilizes OpenAI’s text-embedding-3-large model to generate high-dimensional semantic vectors (i.e., embeddings) of scale items and applies hierarchical clustering to group semantically similar items, revealing potential redundancy. …”
Get full text
Article