Results 51 to 60 of about 619,710 (248)
ABAC access control policy generation technique based on deep learning
To solve the problem of automatic generation of access control policies, an access control policy generation framework based on deep learning was proposed.Access control policy based on attributes could be generated from natural language texts.This ...
Aodi LIU, Xuehui DU, Na WANG, Rui QIAO
doaj +2 more sources
The Task of Detecting Unacceptable Information Security Events in the Information Infrastructure
The purpose of the study is to develop an advanced approach to solving the task of detecting unacceptable events in the field of information security to improve incident detection accuracy and reduce the number of false positives.
Darya A. Evdokimova, Andrey A. Mikryukov
doaj +1 more source
Rationalization of the parameters of the cylindrical bridge support (theoretical basis)
Paper deals with a new constructive solution of a massive concrete pillar intended, mostly, for construction of railway and road bridge supports and with procedure of rationalization of its parameters.
Shmukler Valery +2 more
doaj +1 more source
The use of conceptual components in language production: an ERP study
According to frame-theory, concepts can be represented as structured frames that contain conceptual attributes (e.g., ‘color’) and their values (e.g., ‘red’).
Alexandra eRedmann +7 more
doaj +1 more source
This work identified serum proteins associated with pancreatic epithelial neoplasms (PanINs) and early‐stage PDAC. Proteomics screens assessed genetically engineered mice with abundant PanINs, KPC mice (Lox‐STOP‐Lox‐KrasG12D/+ Lox‐STOP‐Lox‐Trp53R172H/+ Pdx1‐Cre) before PDAC development and also early‐stage PDAC patients (n = 31), compared to benign ...
Hannah Mearns +10 more
wiley +1 more source
In this study, we propose an interactive environment-aware dialog and planning system for social robots in early childhood education, aimed at supporting the learning and social interaction of young children.
Jiyoun Moon, Seung Min Song
doaj +1 more source
Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel +6 more
wiley +1 more source
Correlation Filter Tracking Algorithm Using TSK Fuzzy Logic System
For the problem how to accurately and quickly distinguish the target from the background in the current target tracking field, the core task of most trackers is how to train a discriminant classifier to distinguish between the target and the surrounding ...
CHEN Chen, GAO Yanli, DENG Zhaohong, WANG Shitong
doaj +1 more source
API design for machine learning software: experiences from the scikit-learn project [PDF]
Scikit-learn is an increasingly popular machine learning li- brary. Written in Python, it is designed to be simple and efficient, accessible to non-experts, and reusable in various contexts.
Blondel, Mathieu +14 more
core +3 more sources
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source

