XAI Human-Machine collaboration applied to network security
Cyber attacking is easier than cyber defending—attackers only need to find one breach, while the defenders must successfully repel all attacks. This research demonstrates how cyber defenders can increase their capabilities by joining forces with ...
Steve Moyle +2 more
doaj +1 more source
Multi-objective improvement of software using co-evolution and smart seeding [PDF]
Optimising non-functional properties of software is an important part of the implementation process. One such property is execution time, and compilers target a reduction in execution time using a variety of optimisation techniques. Compiler optimisation
Abbass, H +15 more
core +3 more sources
Proteogenomic and V(D)J Analysis of Human Decidual T Cells Highlights Unique Transcriptional Programming and Clonal Distribution [PDF]
Deborah Chasman +8 more
openalex +1 more source
Optimizing the operation of fuel cell vehicle-to-grid systems using supervised learning
The operation of fuel cell electric vehicle-to-grid (FCEV2G) stations presents a significant challenge due to the need to manage onsite hydrogen production, storage, and vehicle dispatch in volatile electricity markets.
Arda Mert Cetin, Xiao-Yu Wu
doaj +1 more source
Probabilistic cloning and identification of linearly independent quantum states
We construct a probabilistic quantum cloning machine by a general unitary-reduction operation. With a postselection of the measurement results, the machine yields faithful copies of the input states.
A. Ekert +25 more
core +1 more source
Simple test for quantum channel capacity
Basing on states and channels isomorphism we point out that semidefinite programming can be used as a quick test for nonzero one-way quantum channel capacity.
Alber G +15 more
core +1 more source
A Review on Models and Applications of Quantum Computing
This manuscript is intended for readers who have a general interest in the subject of quantum computation and provides an overview of the most significant developments in the field.
Eduard Grigoryan +2 more
doaj +1 more source
The importance of Escherichia coli clonal complex 10 and ST131 among Tanzanian patients on antimicrobial resistance surveillance programs [PDF]
Jeremiah Seni +4 more
openalex +1 more source
Cell-free Embryonic Stem Cell Extract-mediated Derivation of Multi-potent Stem Cells from NIH3T3 Fibroblasts for Functional and Anatomical Ischemic Tissue Repair [PDF]
The oocyte-independent generation of multipotent stem cells is one of the goals in regenerative medicine. We report that upon exposure to mouse ES cell (ESC) extracts, reversibly permeabilized NIH3T3 cells undergo de-differentiation followed by stimulus ...
Deepali Ahluwalia +13 more
core +1 more source
Quantifying cross-language code reuse via function-level clone detection
Code reuse through cloning is common in software development, yet excessive or unchecked cloning can harm maintainability and raise plagiarism concerns.
Yi Rong, Yan Zhou
doaj +1 more source

