-
581
Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI
Published 2024-12-01“…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
Get full text
Article -
582
Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly
Published 2025-04-01“…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
Get full text
Article -
583
Integrated Machine Learning and Region Growing Algorithms for Enhanced Concrete Crack Detection: A Novel Approach
Published 2024-10-01“…Firstly, the regression method learns the image features of the dataset and the specific region growth threshold, and the regression function is trained by using the open-source dataset to determine the region growth threshold using the characteristics of the images included in the tests. …”
Get full text
Article -
584
Abstract 260: TCD Bubble test as a Screening tool for detection of Patent Foramen Ovale in Stroke
Published 2023-11-01“…Introduction Introduction & Objectives: Transcranial Doppler (TCD) ultrasound provides rapid, noninvasive, real‐time measures of cerebrovascular function. Patent Foramen Ovale (PFO) is fourfold more common in Young Stroke Patients <55 years of age, as opposed to age‐matched controls. …”
Get full text
Article -
585
-
586
-
587
-
588
Detection and classification of hypertensive retinopathy based on retinal image analysis using a deep learning approach
Published 2025-01-01“…These gap factors make the research on hypertensive retinopathy urgent since it requires an early detection model to improve treatment accuracy and prevent heart attacks and strokes before they happen. …”
Get full text
Article -
589
SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC
Published 2025-07-01“…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
Get full text
Article -
590
Prob-sparse self-attention extraction of time-aligned dynamic functional connectivity for ASD diagnosis
Published 2025-01-01Get full text
Article -
591
-
592
A COMPREHENSIVE EVALUATION OF DIGITAL TRANSFORMATION ACROSS MULTIPLE BUSINESS FUNCTIONS IN SOUTH AFRICAN SMMES: INSIGHTS POST-COVID-19
Published 2025-07-01“…This systematic literature review evaluates how digital technologies have reshaped business functions within South African SMMEs, particularly following the COVID-19 pandemic. …”
Get full text
Article -
593
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
Get full text
Article -
594
-
595
GloFinder: AI-empowered QuPath plugin for WSI-level glomerular detection, visualization, and curation
Published 2025-04-01“…Artificial intelligence (AI) has demonstrated significant success in automating the detection of glomeruli—key functional units of the kidney—from whole slide images (WSIs) in kidney pathology. …”
Get full text
Article -
596
5G network slicing function migration mechanism based on particle swarm optimization algorithm
Published 2018-08-01“…In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing was proposed.The mechanism simulates the virtual machine into particles based on particle swarm optimization algorithm.In the process of migration,all particles were divided into several subgroups,and particle swarm optimization algorithm was applied within and among groups.According to the historical optimal solution and the current global optimal solution,the particle location was updated,and the best target particles were determined by selecting the smaller particle size of the particle in real time.The mechanism not only improves the convergence speed,but also improves the accuracy of the algorithm.Compared with other migration methods,the results show that the proposed migration mechanism has the advantages of high accuracy and fast convergence.And it can also improve the efficiency of resource utilization,reduce the energy consumption of data center,and has better adaptability.…”
Get full text
Article -
597
Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions
Published 2025-01-01“…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
Get full text
Article -
598
-
599
Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging
Published 2024-12-01“…Human–machine interaction software based on PyQt5 was developed, integrating functions such as communication between upper and lower machines, image acquisition, storage, and processing. …”
Get full text
Article -
600
Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing
Published 2025-01-01“…A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform. …”
Get full text
Article