Showing 9,261 - 9,280 results of 10,771 for search 'Big3~', query time: 1.90s Refine Results
  1. 9261

    Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation by Karthik Raman, Rukmini Kumar, Cynthia J. Musante, Subha Madhavan

    Published 2025-01-01
    “…However, several challenges, including the availability of relevant, labeled, high‐quality datasets, data privacy concerns, model interpretability, and algorithmic bias, must be carefully managed. …”
    Get full text
    Article
  2. 9262

    Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures by Navod Neranjan Thilakarathne, Muhammad Saifullah Abu Bakar, Pg Emeroylariffion Abas, Hayati Yassin

    Published 2025-02-01
    “…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
    Get full text
    Article
  3. 9263

    The First Record of an Aggressive Form of Ocular Tumour Enhanced by Marek’s Disease Virus Infection in Layer Flock in Al-Najaf, Iraq by Aoula Al-Zebeeby, Ali Hadi Abbas, Haider Abas Alsaegh, Furkan Sabbar Alaraji

    Published 2024-01-01
    “…In the presented study, the positive samples of ocular tumour were 168 out of 282 MD positive samples, which accomplished in farm suffered from an unexpectedly high mortality rate. We investigated a rapidly developed tumour mass that was observed in an MD-vaccinated layer flock that showed obvious clinical signs of MD, accompanied by forming a small lump in one eye at age 21 weeks, which developed to a big lump at week 28 of age, leading to death. …”
    Get full text
    Article
  4. 9264

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  5. 9265

    Surgical Excision and Radiotherapy for Giant Keloids in Auricula: A Case Report by Boesoirie SF, Winastuti RA, Permana AD, Yudistira NA, Gatera VA, Boesoirie MT

    Published 2025-01-01
    “…A combined way of doing surgery and giving radiotherapy showed it could work well for handling big ear keloids and keeping them from coming back. …”
    Get full text
    Article
  6. 9266
  7. 9267

    Was Aristotle right about moral decision-making? Building a new empirical model of practical wisdom. by Shane McLoughlin, Stephen Thoma, Kristján Kristjánsson

    Published 2025-01-01
    “…Phronesis also correlated with Big 6 and Dark Tetrad personality traits, moral disengagement, and Moral Foundations in expected directions. …”
    Get full text
    Article
  8. 9268

    A Novel Complex Event Processing Engine for Intelligent Data Analysis in Integrated Information Systems by Dong Wang, Mingquan Zhou, Sajid Ali, Pengbo Zhou, Yusong Liu, Xuesong Wang

    Published 2016-03-01
    “…Although Complex Event Processing (CEP) has enhanced the capacity of data analysis in information systems, it is still a big challenging task since events are rapidly increasing in diverse applications. …”
    Get full text
    Article
  9. 9269

    Deep Learning and Wavelet Transform Combined With Multichannel Satellite Images for Tropical Cyclone Intensity Estimation by Chang-Jiang Zhang, Mei-Shu Chen, Lei-Ming Ma, Xiao-Qin Lu

    Published 2025-01-01
    “…Tropical cyclone (TC) is a highly catastrophic weather event, and accurate estimation of intensity is of great significance. …”
    Get full text
    Article
  10. 9270

    Confidence intervals for the COVID-19 neutralizing antibody retention rate in the Korean population by Catherine Apio, Md. Kamruzzaman, Taesung Park

    Published 2020-09-01
    “…Due to the sparsity of data, the estimation of confidence interval is a big challenge. Thus, we consider several confidence intervals using Asymptotic, Exact and Bayesian estimation methods. …”
    Get full text
    Article
  11. 9271
  12. 9272

    Brain state forecasting for precise brain stimulation: Current approaches and future perspectives by Matteo De Matola, Carlo Miniussi

    Published 2025-02-01
    “…Subsequently, we will review the evidence in favour of data-driven forecasting and discuss its potential contributions to TMS methodology and the scientific understanding of brain dynamics, highlighting the transformative potential of big open datasets.…”
    Get full text
    Article
  13. 9273

    Bio-primed machine learning to enhance discovery of relevant biomarkers by David M. Henke, Alexander Renwick, Joseph R. Zoeller, Jitendra K. Meena, Nicholas J. Neill, Elizabeth A. Bowling, Kristen L. Meerbrey, Thomas F. Westbrook, Lukas M. Simon

    Published 2025-02-01
    “…Abstract Precision medicine relies on identifying reliable biomarkers for gene dependencies to tailor individualized therapeutic strategies. The advent of high-throughput technologies presents unprecedented opportunities to explore molecular disease mechanisms but also challenges due to high dimensionality and collinearity among features. …”
    Get full text
    Article
  14. 9274

    Advancing Sustainable Development Goals through Earth Observation Satellite Data: Current Insights and Future Directions by Qiang Zhao, Le Yu

    Published 2025-01-01
    “…Earth observation (EO) satellites have become essential tools in advancing these goals, providing high-frequency, extensive data for tracking environmental changes, assessing ecosystem health, and supporting resource management. …”
    Get full text
    Article
  15. 9275

    FROM HIGH ASPIRATIONS TO HARSH REALITY: EU HUMAN RIGHTS PROMOTION AT THE UN HUMAN RIGHTS COUNCIL by A. S. Boyashov

    Published 2018-02-01
    “…Since 1990s the EU has been highly aspirational on its role in human rights promotion on a global scale, which has led to the EU’s proactive participation in international organizations. …”
    Get full text
    Article
  16. 9276

    High-performance reconfigurable encryption scheme for distributed storage by Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG

    Published 2023-10-01
    “…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
    Get full text
    Article
  17. 9277

    Shedding light on DNA methylation and its clinical implications: the impact of long-read-based nanopore technology by Alexandra Chera, Mircea Stancu-Cretu, Nicolae Radu Zabet, Octavian Bucur

    Published 2024-12-01
    “…This is a big step forward for epigenomic studies, and unsolved questions regarding gene expression and transposable elements silencing through DNA methylation can now be answered.…”
    Get full text
    Article
  18. 9278

    Advanced R-GAN: Generating anomaly data for improved detection in imbalanced datasets using regularized generative adversarial networks by Junhak Lee, Dayeon Jung, Jihoon Moon, Seungmin Rho

    Published 2025-01-01
    “…The high prevalence of fraud in contemporary financial transactions necessitates advanced anomaly detection systems to address the significant imbalance between legitimate and anomalous transactions in real-time datasets. …”
    Get full text
    Article
  19. 9279

    Multiple Acrometastases in a Patient with Renal Pelvic Urothelial Cancer by Ryoko Sawada, Yusuke Shinoda, Aya Niimi, Tohru Nakagawa, Masachika Ikegami, Hiroshi Kobayashi, Sakae Tanaka, Yukio Homma, Nobuhiko Haga

    Published 2017-01-01
    “…Radiation therapy and disarticulation of the left big toe at the metacarpal-phalangeal joint were performed and his pain and hemorrhage were successfully controlled. …”
    Get full text
    Article
  20. 9280

    Drought risk management in agricultural sector with an emphasis on the socioeconomic dimension under Fuzzy Logic in the Sistan region by Zahra Sarani, Ali Sardar Shahraki, Mahdi Safdari

    Published 2024-10-01
    “…Agriculture is an important sector for economic development in any society and country, so the development of this sector can be a big leap toward economic development. However, this sector is suffering from frequent droughts with extensive socioeconomic dimensions. …”
    Get full text
    Article