Results 11 to 20 of about 314,050 (316)

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

Expert Consensus on Primary Health Governance 2024 [PDF]

open access: yesZhongguo quanke yixue
Primary health governance is a crucial part of the national health governance system and plays a key role in achieving universal health. However, primary health governance currently faces many challenges. The Expert Consensus on Primary Health Governance
Public Health Security and Health Professional Committee of the Public Safety Science and Technology Society, General Practitioner Branch of Chinese Medical Doctor Association
doaj   +1 more source

Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks

open access: yesComplex & Intelligent Systems, 2023
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou   +3 more
doaj   +1 more source

Private versus public old-age security [PDF]

open access: yesJournal of Population Economics, 2012
We compare two institutions head on, a family compact – a parent makes a transfer to her parent in anticipation of a possible future gift from her children – with a pay-as-you-go, social security system in a lifecycle model with endogenous fertility wherein children are valued both as consumption and investment goods.
Richard C. Barnett   +2 more
openaire   +3 more sources

Public Health Security

open access: yesPakistan Journal of Health Sciences, 2023
Public health security refers to the ability of a society to protect and promote the health of its population, particularly in the face of emerging health threats. Ensuring public health security is essential for the well-being of communities and is a key responsibility of government agencies and health care systems. One significant aspect of ...
openaire   +1 more source

Expert Consensus on Health Promotion Strategies for Adult Vaccination in China [PDF]

open access: yesZhongguo quanke yixue
Vaccine-preventable diseases impose a significant health burden on adults in China, highlighting urgent needs to address gaps in the current adult immunization program.
Institute for Healthy China, Tsinghua University, School of Public Health, Peking University, College of General Practice, Southern University of Science and Technology, Public Health Security and Health Professional Committee, Public Safety Science and Technology Society
doaj   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network

open access: yesEntropy, 2023
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu   +4 more
doaj   +1 more source

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy