Results 41 to 50 of about 748,201 (294)

Mobile malware detection method using improved GhostNetV2 with image enhancement technique

open access: yesScientific Reports
In recent years, image-based feature extraction and deep learning classification methods are widely used in the field of malware detection, which helps improve the efficiency of automatic malicious feature extraction and enhances the overall performance ...
Yao Du   +5 more
doaj   +1 more source

UAV Target Detection Algorithm Based on Improved YOLOv8

open access: yesIEEE Access, 2023
Since UAVs usually fly at higher altitudes, resulting in a more significant proportion of small targets after imaging, this poses a challenge to the target detection algorithm at this stage; in addition, the high-speed flight of UAVs causes a sense of ...
Feng Wang   +3 more
doaj   +1 more source

Toward a multidisciplinary model of context to support context-aware computing [PDF]

open access: yes, 2005
Capturing, defining, and modeling the essence of context are challenging, compelling, and prominent issues for interdisciplinary research and discussion.
Bradley, N.A., Dunlop, M.D.
core   +2 more sources

Rapid screening of staphylokinase protein variants using an unpurified cell‐free expression system

open access: yesFEBS Open Bio, EarlyView.
An unpurified cell‐free protein synthesis (CFPS) platform enables rapid functional screening of staphylokinase variants. Direct plasminogen‐activation assays performed in microplate format provide real‐time activity readouts, allowing rapid identification and ranking of variants with improved or reduced fibrinolytic activity without protein ...
Maria Tomková   +3 more
wiley   +1 more source

Multi-view affinity-based projection alignment for unsupervised domain adaptation via locality preserving optimization

open access: yesScientific Reports
Unsupervised Domain Adaptation (UDA) aims to transfer knowledge from a labeled source domain to an unlabeled target domain with differing data distributions.
Weibin Luo   +5 more
doaj   +1 more source

The Grand Challenges and Myths of Neural-Symbolic Computation [PDF]

open access: yes, 2008
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field.
Lamb, Luis C.
core   +1 more source

Pharmacological inhibition of the PERK pathway modulates hepatocellular carcinoma growth and immune signaling

open access: yesFEBS Open Bio, EarlyView.
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero   +5 more
wiley   +1 more source

SHC: soft-hard correspondences framework for simplifying point cloud registration

open access: yesEURASIP Journal on Advances in Signal Processing
Point cloud registration is a multifaceted problem that involves a series of procedures. Many deep learning methods employ complex structured networks to achieve robust registration performance.
Zhaoxiang Chen   +5 more
doaj   +1 more source

Defect Detection Method Based on Knowledge Distillation

open access: yesIEEE Access, 2023
Aiming at the problem that traditional surface detection is easily affected by complex industrial environments and cannot extract effective features, a deep learning-based knowledge distillation anomaly detection model is proposed. Firstly, a pre-trained
Qunying Zhou   +3 more
doaj   +1 more source

Herbert Simon (1916-2001). The scientist of the artificial [PDF]

open access: yes, 2001
With the disappearance of Herbert A. Simon, we have lost one of the most original thinkers of the 20th century. Highly influential in a number of scientific fields—some of which he actually helped create, such as artificial intelligence or information ...
Gobet, F
core  

Home - About - Disclaimer - Privacy