Showing 53,181 - 53,200 results of 68,043 for search '"technology"', query time: 0.24s Refine Results
  1. 53181
  2. 53182
  3. 53183
  4. 53184

    Chromosome-level genome assembly of a destructive leaf-mining moth Eriocrania semipurpurella alpina by Gui-fang Wang, Jin-wu He, Cheng Sun, Xue-yan Li, Pei-feng Qi, Dan-dan Feng, Cai-qing Yang, Ai-bing Zhang

    Published 2025-01-01
    “…In this study, utilizing Illumina sequencing, PacBio HiFi sequencing, and Hi-C technology, we constructed a chromosome-level genome assembly of E. semipurpurella alpina, representing the first high-quality genome in the Eriocraniidae family. …”
    Get full text
    Article
  5. 53185

    Modern Imaging Methods in the Diagnosis of Neurodegenerative Diseases by Paulina Dorota Pietrukaniec, Bartosz Omasta, Katarzyna Kamińska-Omasta, Olga Krupa, Daria Rybak, Kuba Borys Romańczuk, Magdalena Agata Czerska, Szymon Przemysław Stolarczyk, Zofia Martyna Wójcik, Kinga Furtak

    Published 2025-02-01
    “…In addition, the prospects for the development of these technologies, including the use of artificial intelligence and new biomarkers in diagnosis, are also discussed. …”
    Get full text
    Article
  6. 53186
  7. 53187
  8. 53188
  9. 53189
  10. 53190
  11. 53191

    Parametric Study Of Friction Stir Spot Welding (FSSW) For Polymer Materials Case Of High Density Polyethylene Sheets: Experimental And Numerical Study by Djilali Benyerou, El Bahri Ould Chikh, Habib Khellafi, Hadj Miloud Meddah, Ali Benhamena, Kaddour Hachelaf, Abdellah Lounis

    Published 2020-12-01
    “…Friction stir spot welding (FSSW) is a new technology adopted to join various types of metals such as titanium, aluminum, magnesium. …”
    Get full text
    Article
  12. 53192
  13. 53193
  14. 53194

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  15. 53195

    Adversarial example defense algorithm for MNIST based on image reconstruction by Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN

    Published 2022-02-01
    “…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
    Get full text
    Article
  16. 53196

    A tunable multi-timescale Indium-Gallium-Zinc-Oxide thin-film transistor neuron towards hybrid solutions for spiking neuromorphic applications by Mauricio Velazquez Lopez, Bernabe Linares-Barranco, Jua Lee, Hamidreza Erfanijazi, Alberto Patino-Saucedo, Manolis Sifalakis, Francky Catthoor, Kris Myny

    Published 2024-07-01
    “…The multi-timescale ability of this neuron can be utilized together with silicon to create hybrid spiking neural networks capable of effectively executing more complex tasks than their single-technology counterparts.…”
    Get full text
    Article
  17. 53197

    Evaluating basic chest pass skills in the 21st century using chest pass automatic board 2.0 by Dzihan Khilmi Ayu Firdausi, Muhammad Eka Mardyansyah Simbolon, Ahmad Muchlisin Natas Pasaribu, Indra Dwisaputra, Diah Retno Arum sari, Catur Pebriandini

    Published 2025-01-01
    “…Objective: The product refines the previous version of the automatic chest pass board by adding a feature for automatic result calculation and utilizing wireless technology. Methodology: This study utilized the research and development approach. …”
    Get full text
    Article
  18. 53198

    Optimizing and Enhancing Piezoelectric Energy Harvesting Devices by Amri Chaymae, Gaouzi Khawla, Jilbab Abdelilah, el Yousfi Alaoui My Hachem, Azrar Lahcen

    Published 2025-01-01
    “…These results demonstrate the potential to enhance and scale up the system for harvesting and storing energy in batteries through a larger-scale prototype. This technology provides a renewable and unlimited energy source, particularly useful for biomedical sensors with strict energy requirements.…”
    Get full text
    Article
  19. 53199
  20. 53200

    Optogenetic regulation of endogenous gene transcription in mammals by E. S. Omelina, A. V. Pindyurin

    Published 2019-03-01
    “…The factors include zinc finger proteins, transcription activator-like effectors (TALEs), and the CRISPR/Cas9 technology. We also discuss the advantages and disadvantages of these DNA targeting tools in the context of the light-inducible gene regulation systems.…”
    Get full text
    Article