Results 41 to 50 of about 5,184,742 (254)
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan +4 more
doaj +1 more source
ABSTRACT Background Breast cancer is a multifactorial disease that affects many women worldwide. Age is the most important risk factor for breast cancer, with an increased incidence markedly after the age of 50. The relationships of aging to breast cancer have been thoroughly examined, and notable connections regarding various age‐related changes in ...
Mehran Radak +3 more
wiley +1 more source
Feature Graph Construction With Static Features for Malware Detection
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou +6 more
doaj +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin +4 more
doaj +1 more source
ABSTRACT This article explores how artificial intelligence (AI) can support online adult learning by aligning with Knowles’ four principles of andragogy: involvement, experience, problem‐centeredness, and relevance. Three activities were analyzed using a comparative case study (CCS) method.
Xi Lin, Steve W. Schmidt
wiley +1 more source
Information age has brought a new colossal change in a person’s habitual life. The level of computer literacy has grown greatly and even a middle level specialist is able to perform the tasks intended for the programming experts.
Gubkina, V.V. +2 more
core
The Fascist Moment: Security, Exclusion, Extermination [PDF]
Security is cultivated and mobilized by enacting exclusionary practices, and exclusion is cultivated and realized on security grounds. This article explores the political dangers that lie in this connection, dangers which open the door to a fascist ...
Neocleous, M
core +3 more sources
ABSTRACT This article explores institutional policies on artificial intelligence (AI) in higher education. As AI tools become increasingly utilized in academia—from research and teaching to assessment and student support—institutions face growing pressure to establish clear, ethical, and practical guidelines to help guide faculty.
Lauren Azevedo +3 more
wiley +1 more source
Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina +4 more
core +1 more source

