Results 51 to 60 of about 30,753 (229)
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
Quantization of anomaly coefficients in 6D $\mathcal{N}=(1,0)$ supergravity
We obtain new constraints on the anomaly coefficients of 6D $\mathcal{N}=(1,0)$ supergravity theories using local and global anomaly cancellation conditions.
Monnier, Samuel +2 more
core +2 more sources
Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren +6 more
wiley +1 more source
Memory‐Reduced Convolutional Neural Network for Fast Phase Hologram Generation
This article reports a lightweight convolutional neural network framework using INT8 quantization to efficiently generate 3D computer‐generated holograms from a single 2D image. The quantized model reduces memory usage and computational cost, accelerates inference speed, and maintains high output quality, enabling real‐time holographic display on low ...
Chenliang Chang +6 more
wiley +1 more source
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj +1 more source
Feature from recent image foundation models (DINOv2) are useful for vision tasks (segmentation, object localization) with little or no human input. Once upsampled, they can be used for weakly supervised micrograph segmentation, achieving strong results when compared to classical features (blurs, edge detection) across a range of material systems.
Ronan Docherty +2 more
wiley +1 more source
Threshold Password-Based Authentication Using Bilinear Pairings [PDF]
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not need to carry the smart card storing his private information.
Lee, S Lee, Sangwon +4 more
openaire +2 more sources
This paper presents the deformable attention multiscale feature fusion network‐dehaze adaptive image dehazing network, which integrates three core modules (revised residual shrinkage unit, multiscale attention, cross‐scale feature fusion). It incorporates deformable convolution and multiscale attention mechanisms to address the detail loss issue of ...
Ruipeng Wang +4 more
wiley +1 more source
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is ...
Jiangtao DONG, Peiwen YAN, Ruizhong DU
doaj +2 more sources
ABSTRACT To address the issues of neglecting the spatiotemporal correlations among process variables, low‐level features are vulnerable to noise interference, and the gradual loss of key information layer by layer during deep network training in traditional stacked autoencoder‐based soft‐sensor models, this paper proposes a hierarchical complementary ...
Xiaoping Guo, Jinghong Guo, Yuan Li
wiley +1 more source

