Results 111 to 120 of about 170,367 (287)
A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan +5 more
wiley +1 more source
TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Combined Hashing/Watermarking Method For Image Authentication
In this paper we present a combined hashing/watermarking method for image authentication. A robust image hash, invariant to legitimate modifications, but fragile to illegitimate modifications is generated from the local image characteristics. To increase security of the system the watermark is generated using the image hash as a key.
Kitanovski, Vlado +2 more
openaire +1 more source
Abstract Background and aims Lower risk guidelines for safer levels of cannabis use could help to reduce the health burden posed by cannabis use disorder (CUD). We aimed to estimate risk thresholds for CUD based on delta‐9‐tetrahydrocannabinol (THC) consumption using standard THC units (1 unit = 5 mg THC).
Rachel Lees Thorne +9 more
wiley +1 more source
Abstract Background and aims Epidemiologic research suggests that adolescent cannabis use is associated with psychological distress (i.e. depression and anxiety symptoms); however, most studies have relied on 20th‐century data, when cannabis was significantly less potent than today.
André J. McDonald +12 more
wiley +1 more source
Does the total consumption model apply to cannabis use?
Abstract Aims To test whether the total consumption model and its extension, the theory of collectivity, apply to adolescent cannabis use. We estimated: (1) whether the distribution of cannabis use frequency was stable over time; (2) whether changes in average cannabis use were mirrored across consumption quantiles; and (3) whether higher average use ...
Thor Norström, Håkan Leifman
wiley +1 more source
Single Cell Analysis Reveals Dynamic Changes of Distinct Cell Populations in Human Nickel Allergy
We investigated cell types mediating the early and late inflammatory responses in human Ni2+‐allergy by scRNA‐Seq. Early responsiveness was mainly mediated by TLR4+TAGLN− endothelial cells indirectly activating TLR4−KRT16+ keratinocytes, and CCR7+DCN+ DCs. Late responsiveness was crucially driven by infiltration of KLF2+ central memory T cells and TLR4+
Marc Schmidt +7 more
wiley +1 more source
ANALYSIS OF HASHING METHODS IN INFORMATION SYSTEMS
This article is devoted to the analysis of modern methods of hashing and collision search, as well as the scope and direction of their application in hashing procedures for data verification. The article also discusses the use of various algorithms MD5, SHA, GOST R 34.11-2012for hashing, their advantages and disadvantages.
openaire +1 more source

