Results 71 to 80 of about 1,916,317 (370)

TAN: a temporal-aware attention network with context-rich representation for boosting proposal generation

open access: yesComplex & Intelligent Systems
Temporal action proposal generation in an untrimmed video is very challenging, and comprehensive context exploration is critically important to generate accurate candidates of action instances. This paper proposes a Temporal-aware Attention Network (TAN)
Yanyan Jiao   +4 more
doaj   +1 more source

Expression and purification of E140 protein antigen fragments of Plasmodium vivax and Plasmodium berghei for serological assays

open access: yesFEBS Open Bio, EarlyView.
We provide a step‐by‐step guide for producing E140 antigen fragments from Plasmodium berghei (Pb1) and Plasmodium vivax (Pv1). Pb1/Pv1 are expressed in E. coli, solubilized by freeze–thawing, refolded by slow dilution, purified by affinity chromatography (IMAC), then concentrated and subjected to quality control.
Rodolfo Ferreira Marques   +5 more
wiley   +1 more source

Manet: motion-aware network for video action recognition

open access: yesComplex & Intelligent Systems
Video action recognition is a fundamental task in video understanding. Actions in videos may vary at different speeds or scales, and it is difficult to cope with a wide variety of actions by relying on a single spatio-temporal scale to extract features ...
Xiaoyang Li   +4 more
doaj   +1 more source

Les chercheurs face à la surveillance d’État : état des lieux et contre-mesures

open access: yesTracés, 2019
Since the 2013 disclosures of whistleblower Edward Snowden on the surveillance practices of Western intelligence agencies, the exposure of the field of social science to state surveillance – implemented by judiciary and police authorities, and more ...
Félix Tréguer, Camille Noûs
doaj   +1 more source

Using computer vision in security applications [PDF]

open access: yes, 2002
In this paper we present projects developed in the Computer Vision Laboratory, which address the issue of safety. First, we present the Internet Video Server (IVS) monitoring system [5] that sends live video stream over the Internet and enables remote ...
Batagelj, Borut   +2 more
core  

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Cognitive Hacking and Digital Government: Digital Identity [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line.
Paul Thompson
doaj  

Security in Quantum Computing

open access: yesAnnals of Disaster Risk Sciences, 2020
Quantum key distribution will bring more confidentiality and privacy of communication in the future ICT world and will solve the eavesdropping issue. Domains regarded are e-government, e-commerce, e-health, transmission of biometric data, intelligent transport systems and more.
Ana Lavinia Petrache, George Suciu
openaire   +3 more sources

METTL3 knockout accelerates hepatocarcinogenesis via inhibiting endoplasmic reticulum stress response

open access: yesFEBS Open Bio, EarlyView.
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui   +15 more
wiley   +1 more source

Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer

open access: yesCybersecurity
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy