Results 1 to 10 of about 19,125 (136)
Swatting flies: modelling wound healing and inflammation in Drosophila
Aberrant wound healing can lead to a variety of human pathologies, from non-healing chronic wounds that can become dangerously infected, to exuberant fibrotic healing in which repair is accompanied by excessive inflammation.
William Razzell, Will Wood, Paul Martin
semanticscholar +3 more sources
Trauma-Informed Social Media: Towards Solutions for Reducing and Healing Online Harm [PDF]
Social media platforms exacerbate trauma, and many users experience various forms of trauma unique to them (e.g., doxxing and swatting). Trauma is the psychological and physical response to experiencing a deeply disturbing event.
Carol F. Scott +4 more
semanticscholar +1 more source
Not My Voice! A Taxonomy of Ethical and Safety Harms of Speech Generators [PDF]
The rapid and wide-scale adoption of AI to generate human speech poses a range of significant ethical and safety risks to society that need to be addressed. For example, a growing number of speech generation incidents are associated with swatting attacks
Wiebke Hutiri +2 more
semanticscholar +1 more source
A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems
Anomaly detection has been known as an effective technique to detect faults or cyber-attacks in industrial control systems (ICS). Therefore, many anomaly detection models have been proposed for ICS.
Bedeuro Kim +5 more
semanticscholar +1 more source
Fields of Application of SWAT Hydrological Model—A Review
Soil and Water Assessment Tool (SWAT) is a widely used model for runoff, non-point source pollution, and other complex hydrological processes under changing environments (groundwater flow, evapotranspiration, snow melting, etc.).
Josip Janjić, L. Tadić
semanticscholar +1 more source
In this paper, we describe our two SemEval-2007 entries. Our first entry, for Task 5: Multilingual Chinese-English Lexical Sample Task, is a supervised system that decides the most appropriate English translation of a Chinese target word. This system uses a combination of Naive Bayes, nearest neighbor cosine, decision lists, and latent semantic ...
Katz, Philip J., , '07 +2 more
openaire +1 more source
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks [PDF]
This paper presents a study on detecting cyber attacks on industrial control systems (ICS) using convolutional neural networks. The study was performed on a Secure Water Treatment testbed (SWaT) dataset, which represents a scaled-down version of a real ...
Moshe Kravchik, A. Shabtai
semanticscholar +1 more source
Summary A combination of driving forces are increasing pressure on local, national, and regional water supplies needed for irrigation, energy production, industrial uses, domestic purposes, and the environment.
K. Abbaspour +5 more
semanticscholar +1 more source
Adipogenic and SWAT cells separate from a common progenitor in human brown and white adipose depots
Adipocyte function is a major determinant of metabolic disease, warranting investigations of regulating mechanisms. We show at single-cell resolution that progenitor cells from four human brown and white adipose depots separate into two main cell fates ...
Nagendra P. Palani +13 more
semanticscholar +1 more source
A Review on Hydrological Models
Various ongoing researches are there on topics like which model will give more compatible results with that of observed discharges. It was argued that even complex modeling does not provide better results. Climate change and soil heterogeneity has got an
G. Devi +3 more
semanticscholar +1 more source

