Results 41 to 50 of about 70,576 (258)

Your Actions Tell Where You Are: Uncovering Twitter Users in a Metropolitan Area

open access: yes, 2015
Twitter is an extremely popular social networking platform. Most Twitter users do not disclose their locations due to privacy concerns. Although inferring the location of an individual Twitter user has been extensively studied, it is still missing to ...
Sun, Jingchao   +3 more
core   +1 more source

Ergonomics as instrument for prevention against work injury or occupational diseases [PDF]

open access: yes, 2018
Ergonomics as complex branch solves work of employee on concrete work place and follows up relationships between human, machine and work environment.
Bartlová, Ivana, Koutný, Petr
core   +1 more source

Cellular Identity Crisis: RD3 Loss Fuels Plasticity and Immune Silence in Progressive Neuroblastoma

open access: yesAdvanced Science, EarlyView.
Researchers discovered that therapy‐induced loss of RD3 protein in neuroblastoma triggers a dangerous shift: cancer cells become more stem‐like, invasive, and resistant to treatment while evading immune detection. RD3 loss suppresses antigen presentation and boosts immune checkpoints, creating an immune‐silent environment.
Poorvi Subramanian   +7 more
wiley   +1 more source

Legal governance countermeasures for social problems based on the clustering algorithm under the application of big data technology

open access: yesIET Networks, EarlyView., 2022
This work aims to improve the comprehensive role of big data technology in promoting social development and reduce the continuous emergence of social problems under the background of big data application. Abstract The purpose is to improve the security of the application of big data technology and ensure the stable development of society in the context
Xuejie Zhao
wiley   +1 more source

GMT-WGAN: An Adversarial Sample Expansion Method for Ground Moving Targets Classification

open access: yesRemote Sensing, 2021
In the field of target classification, detecting a ground moving target that is easily covered in clutter has been a challenge. In addition, traditional feature extraction techniques and classification methods usually rely on strong subjective factors ...
Xin Yao   +6 more
doaj   +1 more source

Toolbox of Countermeasures for Rural Two-Lane Curves, June 2012 [PDF]

open access: yes, 2012
The Federal Highway Administration (FHWA) estimates that 58 percent of roadway fatalities are lane departures, while 40 percent of fatalities are single-vehicle run-off-road (SVROR) crashes.

core  

The Age‐Dependent Resident Myonuclear Multi‐Omic Response to an Acute Skeletal Muscle Hypertrophic Stimulus in Mice

open access: yesAdvanced Science, EarlyView.
Resident myonuclei are the molecular “control centers” for large multinuclear muscle fibers. It is presumed that, with aging, these control centers become compromised and contribute to delayed or blunted muscle adaptive potential. This study is a detailed roadmap that exposes how young versus aged myonuclei respond to a hypertrophic loading stimulus ...
Pieter J. Koopmans   +8 more
wiley   +1 more source

Elevator dynamic monitoring and early warning system based on machine learning algorithm

open access: yesIET Networks, EarlyView., 2022
In order to monitor and warn the elevator dynamics, in this work, the machine learning algorithm is introduced, and the particle swarm algorithm is used to perfect the model. The model is optimised, and the experimental comparison shows that the optimisation of the model parameters can further improve the accuracy of the elevator load prediction. Then,
Shuai Zhang, Qiangguo Yin, Jinlong Wang
wiley   +1 more source

Semi-Supervised Radar Work Mode Recognition Based on Contrastive Learning

open access: yesSensors
Deep learning for fine-grained radar mode recognition faces a major bottleneck—its heavy reliance on expensively labeled data. To address this, we propose a novel semi-supervised framework that effectively leverages unlabeled data. Through an end-to-end,
Peishan Sun   +4 more
doaj   +1 more source

A new countermeasure against side-channel attacks based on hardware-software co-design [PDF]

open access: yes, 2016
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design.
Cantó Navarro, Enrique   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy