Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54921
Downscaling of ERA5 reanalysis land surface temperature based on attention mechanism and Google Earth Engine
Published 2025-01-01“…Therefore, to improve the spatial resolution of ERA5-Land LST data, this study proposes an Attention Mechanism U-Net (AMUN) method, which combines data acquisition and preprocessing on the Google Earth Engine (GEE) cloud computing platform, to downscale the hourly monthly mean reanalysis LST data of ERA5-Land across China’s territory from 0.1° to 0.01°. …”
Get full text
Article -
54922
Evaluation of Anti-HIV-1 Integrase and Anti-Inflammatory Activities of Compounds from Betula alnoides Buch-Ham
Published 2019-01-01“…Potential interactions of compounds with IN active sites were investigated using computational docking. The results indicated that active compounds interacted with Asp64, a residue participating in 3′-processing, and Thr66, His67, and Lys159, residues participating in strand-transfer reactions of the integration process. …”
Get full text
Article -
54923
A Health Economic Analysis Exploring the Cost Consequence of Using a Surgical Site Infection Prevention Bundle for Hip and Knee Arthroplasty in Germany
Published 2023-12-01“…Research into how bundles of measures perform together is required to further inform the results of this computational analysis.…”
Get full text
Article -
54924
Identifying Critical Input Parameters for Improving Drag‐Based CME Arrival Time Predictions
Published 2020-01-01“…Drag‐based models typically are much more computationally efficient than magnetohydrodynamic models, allowing for ensemble modeling. …”
Get full text
Article -
54925
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
54926
THERMAL EFFECTIVENESS OF THE GAS FLOW VORTICAL HEAT-RELEASE INTENSIFICATION AT AXIAL AND TRANSVERSAL FLOWING-AROUND THE ROUND-TUBULAR SURFACES. Part 1
Published 2015-06-01“…To exclude the heat-exchange surface square influence on the result and for obtaining the comparable valuesi it is indispensable to calculate the power input by the effective value of the surface square.While performing computations of the energy effectiveness it is necessary to recon with the fact that accounting for the stream-pressure local losses at the tube entrance and exit reduces the axial-stream thermal effectiveness coefficient by 33 %. …”
Get full text
Article -
54927
Breast mass lesion area detection method based on an improved YOLOv8 model
Published 2024-10-01“…Experiments conducted on the MIAS and DDSM datasets show that the new models achieved significantly improved computational efficiency while maintaining high detection accuracy. …”
Get full text
Article -
54928
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article -
54929
A thermo-magnetohydrodynamic particle-fluid suspension moves peristaltically through a porous medium
Published 2025-01-01“…A computational study is conducted on the magnetohydrodynamic peristaltic circulation of Casson nanofluid within a non-uniform conduit when Joule heating, thermal radiation, and combined mass/heat transportation impacts are present and the porous medium is saturated. …”
Get full text
Article -
54930
Utilizing MRAMs With Low Resistance and Limited Dynamic Range for Efficient MAC Accelerator
Published 2024-01-01“…The recent advancements in data mining, machine learning algorithms and cognitive systems have necessitated the development of neuromorphic processing engines which may enable resource and computationally intensive applications on the internet-of-Things (IoT) edge devices with unprecedented energy efficiency. …”
Get full text
Article -
54931
Comprehensive Analysis of Breast Cancer Cell Lines: Genome-wide Insights from ChIP-seq Analysis
Published 2024-12-01“…Motif analysis was done through the Multiple Expectation maximizations for Motif Elicitation database (https://meme-suite.org/meme/db/motifs). Results: Computational investigation demonstrates the binding sequences of the T47-D breast cancer cell line as TTTTGTATTTTTAGT, and this motif occurs 2123 times in the Homo Sapiens reference genome that is hg19. …”
Get full text
Article -
54932
Estimation of aeroelastic stability of a tower spire
Published 2023-11-01“…Using the developed computational dynamic finite element models, natural frequencies and vibration modes are determined. …”
Get full text
Article -
54933
Influence of Non-Structural Localized Inertia on Free Vibration Response of Thin-Walled Structures by Variable Kinematic Beam Formulations
Published 2014-01-01“…The results highlight the efficiency of the proposed models and, in particular, the enhanced capabilities of LE modelling approach, which is able to reproduce solid-like analysis with very low computational costs.…”
Get full text
Article -
54934
-
54935
Performance Analysis of Thermal and Surface Roughness Effect of Slider Bearings with Unsteady Fluid Film Lubricant Using Finite Element Method
Published 2024-01-01“…For simplicity of numerical computation, the irregularity caused by the texture of the surface is transformed into a regular domain. …”
Get full text
Article -
54936
Antigen Delivery Platforms for Next-Generation Coronavirus Vaccines
Published 2024-12-01“…This review will (1) present the current state of antigen delivery platforms involving a multifaceted approach, including bioinformatics, molecular and structural biology, immunology, and advanced computational methods; (2) discuss the challenges facing the development of safe and effective antigen delivery platforms; and (3) highlight the potential of nucleoside-modified mRNA encapsulated in lipid nanoparticles (LNP) as the platform that is well suited to the needs of a next-generation pan-CoV vaccine, such as the ability to induce broad-based immunity and amenable to large-scale manufacturing to safely provide durable protective immunity against current and future Coronavirus threats.…”
Get full text
Article -
54937
Analysis of Settlement Induced by Shield Construction of the Metro Passing under Existing Buildings Based on the Finite Difference Method
Published 2022-01-01“…Based on the settlement monitoring data, this study analyzed the impact of tunnel shield construction on the foundation settlement of adjacent buildings. The computational analysis of the shield tunnel was performed by numerical simulation, taking into account the upper building load and the construction disturbance to the surrounding rock. …”
Get full text
Article -
54938
Efficient parameter extraction in PV solar modules with the diligent crow search algorithm
Published 2024-12-01Get full text
Article -
54939
An estimation method of sound speed profile based on grouped dilated convolution informer model
Published 2025-02-01“…By replacing the standard one-dimensional convolution in the Informer model with GDC, the proposed model expands its receptive field and improves computational efficiency. The model was trained using Argo profile data from 2008 to 2017, incorporating empirical orthogonal function (EOF) decomposition data, geographic location, temporal information, and historical SSP data, enabling SSP inversion across diverse regions and time periods.ResultsThe model’s performance was evaluated using mean absolute error (MAE), root mean square error (RMSE) and mean absolute percentage error (MAPE) metrics. …”
Get full text
Article -
54940
Factors Associated with High Prevalence of Multibacillary Leprosy in West Bengal: A Case–Control Study
Published 2024-04-01“…R, version 4.1.1 (R Foundation for Statistical Computing, 2021, Vienna, Austria) was used for data analysis. …”
Get full text
Article