Results 201 to 210 of about 470,606 (299)

A reinforcement learning-based approach for dynamic privacy protection in genomic data sharing beacons. [PDF]

open access: yesGenome Biol
Poorghaffar Aghdam M   +5 more
europepmc   +1 more source

Tradeoffs between brain and digestive tissues across elevations in Typhlomys daloushanensis: evidence for sexual dimorphism

open access: yesWildlife Biology, EarlyView.
To cope with highly stochastic and/or heterogeneous environmental conditions, animals must balance energy resource allocation across physiological processes. The digestive tract and brain exhibit structural variations under strong developmental and selective pressures that vary across environmental gradients both between and within species.
Yimei Yan   +9 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

AT‐AER: Adversarial Training With Adaptive Example Reuse

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu   +5 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Early Transcriptomic Signatures of Immune Response Modulation Following Antiretroviral Therapy in HIV-Infected Patients. [PDF]

open access: yesInt J Mol Sci
Stolbova EA   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy