Results 91 to 100 of about 1,457 (180)
Dual Asymmetric Deep Hashing Learning
Due to the impressive learning power, deep learning has achieved a remarkable performance in supervised hash function learning. In this paper, we propose a novel asymmetric supervised deep hashing method to preserve the semantic structure among different
Jinxing Li +3 more
doaj +1 more source
In middle age, testicular CMKLR1⁺ macrophages exhibited a pro‐inflammatory immunometabolic profile, mediated by adipose signals associated with high BMI. However, inhibition of CMKLR1 signaling, either through Cmklr1 genetic ablation or treatment with a CMKLR1 antagonist peptide, can reverse this phenotype.
Zhendong Zhu +10 more
wiley +1 more source
HiFiCCL, as the first assembly framework specifically designed for low‐coverage high‐fidelity reads, improves the assembly quality of existing assemblers and also enhances downstream applications such as large structural variant (SV) detection (>10 000 bp), synteny analysis, pangenome graph construction, and graph‐based individual‐specific germline SVs
Zhongjun Jiang +9 more
wiley +1 more source
Deep Self-Supervised Hashing With Fine-Grained Similarity Mining for Cross-Modal Retrieval
With the efficiency of storage and retrieval speed, the hashing methods have attracted a lot of attention for cross-modal retrieval applications. In contrast to traditional cross-modal hashing by using handcrafted features, deep cross-modal hashing ...
Lijun Han +5 more
doaj +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o +3 more
wiley +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
ABSTRACT Duchenne muscular dystrophy (DMD) is a severe neuromuscular disorder without an effective cure. Adeno‐associated virus (AAV) based gene therapy has improved dystrophin function, with sub‐optimal clinical outcomes. We reasoned that a combination of rational engineering of AAV9 capsids modified at the post‐translational modification sites ...
Mohankumar B. Senthilkumar +14 more
wiley +1 more source
Deep Distillation Hashing for Palmprint and Finger Vein Retrieval
With the increasing application of biometric recognition technology in daily life, the number of registered users is rapidly growing, making fast retrieval techniques increasingly important for biometric recognition.
Chenlong Liu +4 more
doaj +1 more source
In large-scale multimodal remote sensing data archives, the application of cross-modal technology to achieve fast retrieval between different modalities has attracted great attention.
Na Liu +5 more
doaj +1 more source

