Results 201 to 210 of about 170,509 (285)
A multi-branch feature enhancement-based detection and hierarchical chaotic encryption fusion method for sensitive targets in remote sensing images. [PDF]
Zhang Q, Wang H, Li X, Zhang S, Liu J.
europepmc +1 more source
Sub‐annual spatiotemporal dynamics of sediment and organic matter storage in beaver ponds
Ponds higher up the beaver cascades showed increasing erosion of sediments following heavier rainfall events, whereas those further down showed increasing sediment accretion. Following periods with less intense rainfall all ponds showed net sediment accretion.
Gareth Bradbury +4 more
wiley +1 more source
Abstract Response bias for sensitive questions in face‐to‐face interviewer‐administered surveys is a common problem. Our objective was to evaluate the effectiveness of the nonverbal response card (NVRC) in soliciting responses to questions about lifetime trauma exposure and posttraumatic stress disorder (PTSD) symptoms.
David P. Lindstrom +4 more
wiley +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
Abstract Purpose The purpose of this study was to compare the accuracy, calibration, reproducibility and operating cost of seven large language models (LLMs)—including four newer models capable of using advanced reasoning techniques to analyse complex medical information and generate accurate responses—on text‐only orthopaedic multiple‐choice questions
Pedro Diniz +5 more
wiley +1 more source
HashWave: blockchain-powered perceptual hashing for resilient audio piracy detection against signal-processing attacks in decentralized networks. [PDF]
Pandey S +3 more
europepmc +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
High-Efficiency Traceability Mechanism for Multimedia Data in Consumer Internet of Things Combined with Blockchain. [PDF]
Yan T, Chen J, Zhang X, Hu G.
europepmc +1 more source
Abstract Salt's inherent weakness and capacity for ductile deformation create significant mechanical contrasts that locally perturb the stress field in surrounding rocks, often leading to deviations from regional tectonic stresses. Variations in local stress are a critical factor for wellbore stability, seal integrity, and fluid flow in subsurface ...
Lauren J. Reeher +3 more
wiley +1 more source

