Results 41 to 50 of about 748,201 (294)
Mobile malware detection method using improved GhostNetV2 with image enhancement technique
In recent years, image-based feature extraction and deep learning classification methods are widely used in the field of malware detection, which helps improve the efficiency of automatic malicious feature extraction and enhances the overall performance ...
Yao Du +5 more
doaj +1 more source
UAV Target Detection Algorithm Based on Improved YOLOv8
Since UAVs usually fly at higher altitudes, resulting in a more significant proportion of small targets after imaging, this poses a challenge to the target detection algorithm at this stage; in addition, the high-speed flight of UAVs causes a sense of ...
Feng Wang +3 more
doaj +1 more source
Toward a multidisciplinary model of context to support context-aware computing [PDF]
Capturing, defining, and modeling the essence of context are challenging, compelling, and prominent issues for interdisciplinary research and discussion.
Bradley, N.A., Dunlop, M.D.
core +2 more sources
Rapid screening of staphylokinase protein variants using an unpurified cell‐free expression system
An unpurified cell‐free protein synthesis (CFPS) platform enables rapid functional screening of staphylokinase variants. Direct plasminogen‐activation assays performed in microplate format provide real‐time activity readouts, allowing rapid identification and ranking of variants with improved or reduced fibrinolytic activity without protein ...
Maria Tomková +3 more
wiley +1 more source
Unsupervised Domain Adaptation (UDA) aims to transfer knowledge from a labeled source domain to an unlabeled target domain with differing data distributions.
Weibin Luo +5 more
doaj +1 more source
The Grand Challenges and Myths of Neural-Symbolic Computation [PDF]
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field.
Lamb, Luis C.
core +1 more source
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero +5 more
wiley +1 more source
SHC: soft-hard correspondences framework for simplifying point cloud registration
Point cloud registration is a multifaceted problem that involves a series of procedures. Many deep learning methods employ complex structured networks to achieve robust registration performance.
Zhaoxiang Chen +5 more
doaj +1 more source
Defect Detection Method Based on Knowledge Distillation
Aiming at the problem that traditional surface detection is easily affected by complex industrial environments and cannot extract effective features, a deep learning-based knowledge distillation anomaly detection model is proposed. Firstly, a pre-trained
Qunying Zhou +3 more
doaj +1 more source
Herbert Simon (1916-2001). The scientist of the artificial [PDF]
With the disappearance of Herbert A. Simon, we have lost one of the most original thinkers of the 20th century. Highly influential in a number of scientific fields—some of which he actually helped create, such as artificial intelligence or information ...
Gobet, F
core

