Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
53181
-
53182
-
53183
-
53184
Chromosome-level genome assembly of a destructive leaf-mining moth Eriocrania semipurpurella alpina
Published 2025-01-01“…In this study, utilizing Illumina sequencing, PacBio HiFi sequencing, and Hi-C technology, we constructed a chromosome-level genome assembly of E. semipurpurella alpina, representing the first high-quality genome in the Eriocraniidae family. …”
Get full text
Article -
53185
Modern Imaging Methods in the Diagnosis of Neurodegenerative Diseases
Published 2025-02-01“…In addition, the prospects for the development of these technologies, including the use of artificial intelligence and new biomarkers in diagnosis, are also discussed. …”
Get full text
Article -
53186
-
53187
Experimental investigation of gas seepage characteristics in coal seams under gas-water-stress function
Published 2025-01-01Get full text
Article -
53188
PreZon: Prediction by Zone and Its Application to Egg Productivity in Chickens
Published 2012-01-01Get full text
Article -
53189
Effects of silkworm pupa protein on apoptosis and energy metabolism in human colon cancer DLD-1 cells
Published 2022-09-01Get full text
Article -
53190
-
53191
Parametric Study Of Friction Stir Spot Welding (FSSW) For Polymer Materials Case Of High Density Polyethylene Sheets: Experimental And Numerical Study
Published 2020-12-01“…Friction stir spot welding (FSSW) is a new technology adopted to join various types of metals such as titanium, aluminum, magnesium. …”
Get full text
Article -
53192
Analysis of Refractive Index Sensing Properties of a Hybrid Hollow Cylindrical Tetramer Array
Published 2025-01-01Get full text
Article -
53193
الکترونیک چاپی بر پایه نانولولههای کربنی و نانوصفحات گرافن
Published 2020-11-01Get full text
Article -
53194
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article -
53195
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
53196
A tunable multi-timescale Indium-Gallium-Zinc-Oxide thin-film transistor neuron towards hybrid solutions for spiking neuromorphic applications
Published 2024-07-01“…The multi-timescale ability of this neuron can be utilized together with silicon to create hybrid spiking neural networks capable of effectively executing more complex tasks than their single-technology counterparts.…”
Get full text
Article -
53197
Evaluating basic chest pass skills in the 21st century using chest pass automatic board 2.0
Published 2025-01-01“…Objective: The product refines the previous version of the automatic chest pass board by adding a feature for automatic result calculation and utilizing wireless technology. Methodology: This study utilized the research and development approach. …”
Get full text
Article -
53198
Optimizing and Enhancing Piezoelectric Energy Harvesting Devices
Published 2025-01-01“…These results demonstrate the potential to enhance and scale up the system for harvesting and storing energy in batteries through a larger-scale prototype. This technology provides a renewable and unlimited energy source, particularly useful for biomedical sensors with strict energy requirements.…”
Get full text
Article -
53199
Loadability Analysis of Smart Solid-State Transformer Considering its Interactions Amongst all the Ports
Published 2024-01-01Get full text
Article -
53200
Optogenetic regulation of endogenous gene transcription in mammals
Published 2019-03-01“…The factors include zinc finger proteins, transcription activator-like effectors (TALEs), and the CRISPR/Cas9 technology. We also discuss the advantages and disadvantages of these DNA targeting tools in the context of the light-inducible gene regulation systems.…”
Get full text
Article