Results 41 to 50 of about 1,118 (118)
High‐Throughput Strategies for Streamlining Lipid Nanoparticle Development Pipeline
This review highlights emerging state‐of‐the‐art high‐throughput strategies for optimising lipid nanoparticle formulation. By integrating combinatorial design, characterization, in vitro/in vivo screening, automation, and machine learning into a closed‐loop framework, it provides a roadmap to streamline discovery and accelerate the translation of ...
Lois Lam +3 more
wiley +1 more source
Computer Vision to Analyze Protests in Social Media [PDF]
Images are central to understanding protests and mass activism today for its impact in shaping public opinion. Previously, analyzing protest images required human annotation, which is laborious and expensive.
Chan, Alexander
core
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley +1 more source
False Discovery Estimation in Record Linkage
ABSTRACT Integrating data from multiple sources expands research opportunities at low cost. However, due to different data collection processes and privacy constraints, unique identifiers are unavailable. Record linkage (RL) algorithms address this by probabilistically linking records based on partially identifying variables. Since these variables lack
Kayané Robach +2 more
wiley +1 more source
A Scoping Review of Bullying and Harassment in Nonprofit and Voluntary Organizations
ABSTRACT Approximately 15% of workers are exposed to bullying in their workplace. However, few studies appear to have been conducted in nonprofit and voluntary organizations. This scoping review explored prevalence and structural and contextual factors that influence bullying in nonprofit and voluntary organizations.
Margaret Hodgins +4 more
wiley +1 more source
Deep neural networks (DNNs) have been shown to tolerate "brain damage": cumulative changes to the network's parameters (e.g., pruning, numerical perturbations) typically result in a graceful degradation of classification accuracy.
Dumitraş, Tudor +4 more
core +2 more sources
On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme [PDF]
In this thesis, we address three main security problems related to cryptography andcloud storage. To tackle the challenge posed by a quantum computer, we needencryption that is resistant to quantum computers.
Kundu, Rohon
core
Watch Your Step: Optimal Retrieval for Continual Learning at Scale
In continual learning, a model learns incrementally over time while minimizing interference between old and new tasks. One of the most widely used approaches in continual learning is referred to as replay.
Hickok, Truman, Kudithipudi, Dhireesha
core
Explainable multilingual and multimodal fake-news detection: toward robust and trustworthy AI for combating misinformation. [PDF]
Jadhav R +5 more
europepmc +1 more source
Detecting freebooted content in social media ads: multimodal provenance and e-commerce implications. [PDF]
Weinlich P, Semeradova T.
europepmc +1 more source

