Results 51 to 60 of about 30,753 (229)

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Quantization of anomaly coefficients in 6D $\mathcal{N}=(1,0)$ supergravity

open access: yes, 2018
We obtain new constraints on the anomaly coefficients of 6D $\mathcal{N}=(1,0)$ supergravity theories using local and global anomaly cancellation conditions.
Monnier, Samuel   +2 more
core   +2 more sources

Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution

open access: yesAdvanced Intelligent Discovery, EarlyView.
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren   +6 more
wiley   +1 more source

Memory‐Reduced Convolutional Neural Network for Fast Phase Hologram Generation

open access: yesAdvanced Intelligent Systems, EarlyView.
This article reports a lightweight convolutional neural network framework using INT8 quantization to efficiently generate 3D computer‐generated holograms from a single 2D image. The quantized model reduces memory usage and computational cost, accelerates inference speed, and maintains high output quality, enabling real‐time holographic display on low ...
Chenliang Chang   +6 more
wiley   +1 more source

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj   +1 more source

Upsampling DINOv2 Features for Unsupervised Vision Tasks and Weakly Supervised Materials Segmentation

open access: yesAdvanced Intelligent Systems, EarlyView.
Feature from recent image foundation models (DINOv2) are useful for vision tasks (segmentation, object localization) with little or no human input. Once upsampled, they can be used for weakly supervised micrograph segmentation, achieving strong results when compared to classical features (blurs, edge detection) across a range of material systems.
Ronan Docherty   +2 more
wiley   +1 more source

Threshold Password-Based Authentication Using Bilinear Pairings [PDF]

open access: yes, 2004
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not need to carry the smart card storing his private information.
Lee, S Lee, Sangwon   +4 more
openaire   +2 more sources

Deformable Attention Multiscale Feature Fusion Network‐Dehaze: An Adaptive Image Dehazing Method Based on Deformable Attention Multiscale Fusion Network

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents the deformable attention multiscale feature fusion network‐dehaze adaptive image dehazing network, which integrates three core modules (revised residual shrinkage unit, multiscale attention, cross‐scale feature fusion). It incorporates deformable convolution and multiscale attention mechanisms to address the detail loss issue of ...
Ruipeng Wang   +4 more
wiley   +1 more source

Verifiable access control scheme based on unpaired CP-ABE in fog computing

open access: yesTongxin xuebao, 2021
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is ...
Jiangtao DONG, Peiwen YAN, Ruizhong DU
doaj   +2 more sources

Hierarchical Complementary Enhanced Autoencoder Integrating Spatio‐Temporal Interaction Feature for Soft Sensor

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT To address the issues of neglecting the spatiotemporal correlations among process variables, low‐level features are vulnerable to noise interference, and the gradual loss of key information layer by layer during deep network training in traditional stacked autoencoder‐based soft‐sensor models, this paper proposes a hierarchical complementary ...
Xiaoping Guo, Jinghong Guo, Yuan Li
wiley   +1 more source

Home - About - Disclaimer - Privacy