Suggested Topics within your search.
Suggested Topics within your search.
- Drug Dosage Calculations 1
- Manufacturing processes 1
- Mathematics 1
- Nursing 1
- Nursing Care 1
- Pharmaceutical Preparations 1
- Pharmaceutical arithmetic 1
- SCIENCE / Mechanics / General 1
- TECHNOLOGY & ENGINEERING / Manufacturing 1
- TECHNOLOGY & ENGINEERING / Material Science 1
- administration & dosage 1
- methods 1
-
1721
Cambiamenti socio-demografici e trasmissione delle risorse materiali e immateriali: prospettive etnografiche dalle Alpi occidentali italiane
Published 2016-12-01“…Economically they differ since mountain pastoralism continues to be one of the pillars of economy and culture in the upper Pellice Valley, whereas Macugnaga has converted to tourism. We argue that the current focus on intangible heritage should not obscure the role of tangible assets – such as land, buildings and rights to private and collective resources – which are often essential to ensure that traditional craftsmanship is rescued and preserved. …”
Get full text
Article -
1722
Double-Diffusive MHD Viscous Fluid Flow in a Porous Medium in the Presence of Cattaneo-Christov Theories
Published 2022-01-01“…In order to simplify these equations, they are converted into ordinary differential equations (ODEs). …”
Get full text
Article -
1723
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01“…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
Get full text
Article -
1724
A comparison study on optical character recognition models in mathematical equations and in any language
Published 2025-03-01“…Optical Character Recognition[OCR] is a technology that makes use of artificial intelligence and machine learning to extract readable text from documents, images, tags or any other type of sources. It allows one to convert characters and text objects into digital data that can be easily processed, analyzed, and modified. …”
Get full text
Article -
1725
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01“…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
Get full text
Article -
1726
DC algorithm for estimation of sparse Gaussian graphical models.
Published 2024-01-01“…To this end, we focus on sparse estimation of GGM with the cardinality constraint based on the ℓ0 norm. Specifically, we convert the cardinality constraint into an equivalent constraint based on the largest-K norm, and reformulate the resultant constrained optimization problem into an unconstrained penalty form with a DC (difference of convex functions) representation. …”
Get full text
Article -
1727
Applying Environmental Isotope Theory to Groundwater Recharge in the Jiaozuo Mining Area, China
Published 2017-01-01“…The topography increases per 100 m, and the δ18O value reduces by 0.23‰ on average. The δ18O value is converted into formula to calculate the groundwater recharge elevation, which is approximately from 400 to 800 m. …”
Get full text
Article -
1728
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…Moreover, images go through several processing stages before they are converted into cipher images, including noise, segmentation, and encryption. …”
Get full text
Article -
1729
De la cassette au fichier numérique : enjeux de l’archivage, du partage et de la restitution des archives orales enregistrées au Niger
Published 2024-12-01“…While considering the restitution to the field of collections recorded on the Nigerian territory and preserved in France, the authors adopt a comprehensive and continuous approach to take into account a decisive paradigm shift: the understanding of analogue archives converted into digital format and their production in a colonial context with a view to postcolonial use. …”
Get full text
Article -
1730
Les multiples formes actuelles de la conversion d’élevages laitiers de montagne vers la production de viande
Published 2016-07-01“…Here we address this gap through surveys of newly converted farms in the Massif Central. Our results show that milk-to-meat conversions are currently occurring in all kinds of trajectories (extend, hold or wind-down). …”
Get full text
Article -
1731
The Protective Potential Role of ACE2 against COVID-19
Published 2023-01-01“…Due to the coronavirus disease 2019 (COVID-19), researchers all over the world have tried to find an appropriate therapeutic approach for the disease. The angiotensin-converting enzyme 2 (ACE2) has been shown as a necessary receptor to cell fusion, which is involved in infection due to severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). …”
Get full text
Article -
1732
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01“…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
Get full text
Article -
1733
An Approach to Model Based Testing of Multiagent Systems
Published 2015-01-01“…The protocol diagram is converted into a protocol graph, on which different coverage criteria are applied to generate test paths that cover interactions between the agents. …”
Get full text
Article -
1734
Seismic Proofing Capability of the Accumulated Semiactive Hydraulic Damper as an Active Interaction Control Device with Predictive Control
Published 2016-01-01“…To improve the seismic proofing capability of Accumulated Semiactive Hydraulic Damper, it is converted to an Active Interaction Control device and synchronous control and predictive control methods are proposed. …”
Get full text
Article -
1735
Crystallization test: A prognostic biomarker in oral potentially malignant disorders and oral cancer
Published 2024-12-01“…Conclusion: OPMDs lesion convert from white to mixed red and white lesion and OSCC appear as non-healing ulcer or ulcero-proliferative growth increase in number of transverse bars. …”
Get full text
Article -
1736
LMI-Based Robust Stabilization of a Class of Input-Constrained Uncertain Nonlinear Systems with Application to a Helicopter Model
Published 2020-01-01“…Thanks to the Schur complement lemma and the matrix inversion lemma, we convert these BMIs into LMIs allowing the simultaneous computation of the two gains of the affine controller. …”
Get full text
Article -
1737
REVIEW OF MONITORING TECHNOLOGIES USED IN HYBRID PHOTOVOLTAIC SYSTEMS
Published 2024-01-01“…Most of the available solar energy is captured using photovoltaic systems and converted into electricity. Today's modern systems refer to combinations of photovoltaic and thermal panels (PV/T) to obtain electricity and domestic hot water, and systems consisting of photovoltaic panels with wind turbines which provides only electricity. …”
Get full text
Article -
1738
Trams: Bridging the Past and Future—Example Guidelines for Tram Redesign Illustrated by a Case Study from Korea
Published 2025-01-01“…These guidelines provide a structured framework for converting existing trams into mobile venues such as restaurants, classrooms, and work and conference spaces. …”
Get full text
Article -
1739
Determination of the Tail Unit Parameters of Ultralight Manned and Unmanned Helicopters at the Preliminary Design Stage
Published 2025-01-01“…Most of these helicopters have been converted into unmanned versions. Typically, such UAV models retain the rotor system, power plant, transmission, and empennage of the manned versions. …”
Get full text
Article -
1740
Application of first-order logic to identify organizers and perpetrators of illegal actions in teams of a limited circle of people
Published 2021-09-01“…The article also considers a method based on the resolution when implementing the reverse inference, taking into account the expression obtained in the direct inference. This expression is converted into a conjunctive normal formula using the laws of Boolean algebra and is proved by the elimination of events using the conjunction operation.…”
Get full text
Article