Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
25681
Perceiving Excitation Characteristics from Interactions between Field Road and Vehicle via Vibration Sensing
Published 2021-01-01“…A camera-accelerator system can solve this issue by utilizing computer vision information; however, the relationship between the field road surface and the vehicle vibration response remains an unsolved problem. …”
Get full text
Article -
25682
Public Transit Loyalty Modeling Considering the Effect of Passengers’ Emotional Value: A Case Study in Xiamen, China
Published 2018-01-01“…Besides, the index score of variables was also computed to help determine targeted approaches to better improve the level of bus service. …”
Get full text
Article -
25683
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
Get full text
Article -
25684
Surgical Treatment for Spinal Tuberculosis without Elevation of Inflammatory Biomarkers at the Initial Visit Mimicking Spinal Metastasis
Published 2020-01-01“…Although the pathology revealed no malignant tumor cells, a positron emission tomography-computed tomography (PET-CT) showed upregulation of the thyroid gland and aspiration cytology revealed a thyroid carcinoma. …”
Get full text
Article -
25685
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
Get full text
Article -
25686
Oral behaviors in Chinese temporomandibular disorder patients: insights from exploratory and confirmatory factor analyses
Published 2024-12-01“…Items were contrasted with those of Italian TMDs patients (I-NFA and I-FA), and subscale scores were computed, compared, and correlated using Kruskal Wallis and Post-hoc and Spearman’s rank-order correlation (α = 0.05).ResultsVariations in NFA and FA items were observed between Chinese and Italian TMDs patients. …”
Get full text
Article -
25687
Three-dimensional effects on cracked components under anti-plane loading
Published 2015-07-01“…Increasingly powerful computers made it possible to investigate three-dimensional effects numerically in detail. …”
Get full text
Article -
25688
Influence of breed and environment on leukocyte telomere length in cattle
Published 2024-04-01“…The leukocyte telomere lengths were estimated computationally from whole-genome resequencing data. We leveraged data on leukocyte telomere length, sex, and age of 239 animals from 17 cattle breeds. …”
Get full text
Article -
25689
Exercise of Civil-Law Rights: Categories in the Context of Their Digitalization
Published 2021-10-01“…Since no proper verification of the interests of the parties to ‘smart contracts’, which are essentially a computer code, is available, and as the same refers to linguistic verification of their will, there is no way for ‘smart contracts’ to enter the domain of law. …”
Get full text
Article -
25690
Research on Feature Extracted Method for Flutter Test Based on EMD and CNN
Published 2021-01-01“…The method allows for real-time, online prediction with low computational complexity.…”
Get full text
Article -
25691
Non vertical ionization-dissociation model for strong IR induced dissociation dynamics of $${{D}_{2}}O^{2+}$$
Published 2025-01-01“…However, a full quantum mechanical treatment of electron-nuclear dynamics is computationally intensive. In this work, we have developed a Strong Laser Induced non-adiabatic Multi-Ionic-Multi-Electric States (SLIMIMES) approach, which contains the electron-laser and electron-nuclear couplings. …”
Get full text
Article -
25692
Neuroscience Literacy and Academic Outcomes: Insights from a University Student Population
Published 2025-01-01“…<b>Results:</b> Students showed significant awareness of and interest in neuroscience; this was highest among students in health science programmes and lowest among students in computer and engineering programmes. The most common sources of general neuroscience knowledge were internet articles. …”
Get full text
Article -
25693
Intracardiac Echocardiography as a Guide for Transcatheter Closure of Patent Ductus Arteriosus
Published 2020-01-01“…In phase 1, we compared the measurements of PDA size: pulmonary artery side diameter (PA-D), length, and aortic side diameter (Ao-D) of PDA, as measured by ICE with those measured by aortography or cardiac computed tomography (AoG/CCT) in 23 patients who underwent TC-PDA. …”
Get full text
Article -
25694
A novel arc detection and identification method in pantograph-catenary system based on deep learning
Published 2025-01-01“…Traditional arc detection methods, while functional, often suffer from low detection accuracy and high computational complexity, especially in complex operational environments. …”
Get full text
Article -
25695
Electron-spin decoherence in trityl radicals in the absence and presence of microwave irradiation
Published 2025-01-01“…We introduce partial CCE that alleviates this problem and reduces computational effort at the expense of treating only part of the correlations at a particular order. …”
Get full text
Article -
25696
A Case of Ileocecal IgG4-Related Sclerosing Mesenteritis Diagnosed by Endoscopic Ultrasound-Guided Fine Needle Aspiration using Forward-Viewing Linear Echoendoscope
Published 2019-01-01“…The patient experienced abdominal pain for 4 days with repeated vomiting episodes; therefore, she was transferred to our hospital by an ambulance. Contrast-enhanced computed tomography revealed a 3-cm tumor in the ileocecal region, which caused small bowel obstruction. …”
Get full text
Article -
25697
NIGWO-iCaps NN: A Method for the Fault Diagnosis of Fiber Optic Gyroscopes Based on Capsule Neural Networks
Published 2025-01-01“…Traditional diagnostic models often encounter challenges in terms of reliability and accuracy, for example, difficulties in feature extraction, high computational cost, and long training time. To address these challenges, this paper proposes a new fault diagnostic model that performs a fault diagnosis of gyroscopes using the enhanced capsule neural network (iCaps NN) optimized by the improved gray wolf algorithm (NIGWO). …”
Get full text
Article -
25698
From boundary data to bound states
Published 2020-01-01“…These relationships allow us to compute observables for generic orbits (such as the periastron advance ∆Φ) through analytic continuation, via a radial action depending only on boundary data. …”
Get full text
Article -
25699
Comparison of and as Reporter Genes for Noninvasive Imaging of Bone Mesenchymal Stem Cells Transplanted into Infarcted Rat Myocardium
Published 2011-07-01“…The transfected rBMSCs were transplanted into infarcted rat myocardium followed by a single-photon emission computed tomography (SPECT) study with 99m Tc-pertechnetate as the radiotracer and by autoradiography. …”
Get full text
Article -
25700
How Menstruation Is Perceived by Adolescent School Girls in Gedeo Zone of Ethiopia?
Published 2020-01-01“…Odds ratio with 95% confidence interval was computed to determine the level of significance. Result. …”
Get full text
Article