Results 51 to 60 of about 944,285 (292)
Detecting Evasion Attacks in Deployed Tree Ensembles
sponsorship: This research is supported by the Research Foundation - Flanders (LD: 1SB1322N; LP: 1166222N), the Flemish Government under the "Onderzoeksprogramma Artificiele Intelligentie (AI) Vlaanderen" program (JD), the European Union's Horizon Europe Research and Innovation program under the grant agreement TUPLES No.
Devos, Laurens +3 more
openaire +1 more source
AUTOMATIC TREE-CROWN DETECTION IN CHALLENGING SCENARIOS [PDF]
In this paper, a new procedure for individual tree detection and modeling is presented. The input of this procedure consists of a normalized digital surface model NDSM, and a possibly error-prone classification result. The procedure is modular so that the functionality, the advantages and the disadvantages for every single module will be explained. The
D. Bulatov, I. Wayand, H. Schilling
openaire +3 more sources
Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde +3 more
wiley +1 more source
Forest plantations are globally important for the economy and are significant for carbon sequestration. Properly managing plantations requires accurate information about stand timber stocks. In this study, we used the area (ABA) and individual tree (ITD)
Rodrigo Vieira Leite +9 more
doaj +1 more source
Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data [PDF]
Recently, because of increasing amount of data in the society, data stream mining targeting large scale data has attracted attention. The data mining is a technology of discovery new knowledge and patterns from the massive amounts of data, and what the ...
Ise, Masayuki +3 more
core
Optimized state independent entanglement detection based on geometrical threshold criterion
Experimental procedures are presented for the rapid detection of entanglement of unknown arbitrary quantum states. The methods are based on the entanglement criterion using accessible correlations and the principle of correlation complementarity.
Knips, Lukas +5 more
core +1 more source
Despite frogs avoiding low temperatures, examination of four salamander species revealed that none avoided cold and all possessed cold tolerance. Functional analysis of TRPM8, a cold sensor, showed that all salamander TRPM8s had lost their cold sensitivity.
Tadahiro Sawao +3 more
wiley +1 more source
Detecting non-tree-like signal using multiple tree topologies [PDF]
Abstract Recent applications of phylogenetic methods to historical linguistics have been criticized for assuming a tree structure in which ancestral languages differentiate and split up into daughter languages, while language evolution is inherently non-tree-like (François 2014; Blench
openaire +3 more sources
Evolutionarily divergent DUF4465 domains have a common vitamin B12‐binding function
We show that DUF4465 family proteins, widespread across bacteria from gut microbiomes, hydrothermal vents, and soil, share a common vitamin B12‐binding function. These augmented β‐jellyroll proteins bind vitamin B12 via extended loops. Our findings establish sequence‐diverse DUF4465 proteins as a widespread class of B12‐binding proteins, highlighting ...
Charlea Clarke +4 more
wiley +1 more source
The automatic detection of tree crowns and estimation of crown areas from remotely sensed information offer a quick approach for grasping the dynamics of forest ecosystems and are of great significance for both biodiversity and ecosystem conservation ...
Yi Gan, Quan Wang, Atsuhiro Iio
doaj +1 more source

