Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 4
- Electric wiring, Interior 3
- MATHEMATICS / Mathematical Analysis 3
- Study and teaching 3
- Electric wiring 2
- Insurance requirements 2
- Law 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Research 2
- Tourism 2
- Analysis 1
- Buildings 1
- Children 1
- Communication 1
- Communication in rehabilitation 1
- Corporations 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Education 1
- Educational technology 1
- Electric apparatus and appliances 1
- Electric equipment 1
- Electric power systems 1
- Electrical engineering 1
- Emotions 1
- Emotions (Philosophy) 1
-
1881
Contribution of Cloud Accounting to Employment and Economic Growth: An Evaluation from Nigerian Public Sector
Published 2024-03-01“…The data obtained were analyzed using descriptive statistics and time series data containing ordinary least square technique. The results highlight a positive and statistically significant correlation between the adoption rate of cloud accounting, the number of cloud accounting software providers, and the General Cloud Accounting Metric. …”
Get full text
Article -
1882
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01“…In recent years, deep learning has emerged as a crucial technology in various fields.However, the training process of deep learning models often requires a substantial amount of data, which may contain private and sensitive information such as personal identities and financial or medical details.Consequently, research on the privacy risk associated with artificial intelligence models has garnered significant attention in academia.However, privacy research in deep learning models has mainly focused on traditional neural networks, with limited exploration of emerging networks like reversible networks.Reversible neural networks have a distinct structure where the upper information input can be directly obtained from the lower output.Intuitively, this structure retains more information about the training data, potentially resulting in a higher risk of privacy leakage compared to traditional networks.Therefore, the privacy of reversible networks was discussed from two aspects: data privacy leakage and model function privacy leakage.The risk assessment strategy was applied to reversible networks.Two classical reversible networks were selected, namely RevNet and i-RevNet.And four attack methods were used accordingly, namely membership inference attack, model inversion attack, attribute inference attack, and model extraction attack, to analyze privacy leakage.The experimental results demonstrate that reversible networks exhibit more serious privacy risks than traditional neural networks when subjected to membership inference attacks, model inversion attacks, and attribute inference attacks.And reversible networks have similar privacy risks to traditional neural networks when subjected to model extraction attack.Considering the increasing popularity of reversible neural networks in various tasks, including those involving sensitive data, it becomes imperative to address these privacy risks.Based on the analysis of the experimental results, potential solutions were proposed which can be applied to the development of reversible networks in the future.…”
Get full text
Article -
1883
Le choix des espaces communs dans l’habité, support écologique et solidaire
Published 2021-11-01“…The common spaces in housing, also called intermediary or common areas, are an in-between of the public and the private and contain a whole part of social life: from the garbage room to the bicycle garage, from the lift to the corridor, from the entrance hall to the car park, from the courtyard to the garden. …”
Get full text
Article -
1884
Selected Mechanisms of Action of Bacteriophages in Bacterial Infections in Animals
Published 2025-01-01“…The results of our own experiments using calves are also presented as examples. The paper contains many new examples of potential uses of bacteriophages and their effects on eukaryotic cells, especially in the course of bacterial infections, which are extremely important in experimental treatments exploiting phages as alternatives to antibiotics. …”
Get full text
Article -
1885
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01“…The systematic categorization of each physical device and its associated integrated sensors has been accomplished via data from logs and an information repository contained within a sensor index device library.…”
Get full text
Article -
1886
Application of Electro-Fenton Technology to Remediation of Polluted Effluents by Self-Sustaining Process
Published 2014-01-01“…Afterwards, the degradation of Reactive Black 5 dye and phenanthrene was evaluated in an electro-Fenton reactor, containing iron-enriched zeolite as catalyst, using the electricity supplied by the MFC. …”
Get full text
Article -
1887
Sperm Cryopreservation before Testicular Cancer Treatment and Its Subsequent Utilization for the Treatment of Infertility
Published 2014-01-01“…The testicular cancer survivors have a good chance of fathering a child by using sperm cryopreserved prior to the oncology treatment, even when it contains only limited number of spermatozoa.…”
Get full text
Article -
1888
Dynamic System Simulation to Improve the Effectiveness and Efficiency of Supply Chain Performance and Behaviour on Waste Bank Resik Becik
Published 2025-01-01“…Waste bank Resik Becik (BSRB) is one of the containers that help with waste management in the city of Semarang. …”
Get full text
Article -
1889
The BnaBPs gene regulates flowering time and leaf angle in Brassica napus
Published 2024-10-01“…The protein sequence analysis showed two proteins containing conserved domains KNOX I, KNOX II, ELK, and HOX of the KONX protein family. …”
Get full text
Article -
1890
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
1891
Morphogenesis of the tumor patterns
Published 2008-02-01“…It was found that the tumor has a characteristicfractal dimension, which contains the necessary information to predictthe tumor growth until it reaches a stationary state. …”
Get full text
Article -
1892
Peritoneal Dialysis with Marked Pneumoperitoneum
Published 2020-01-01“…Pneumoperitoneum, the presence of free air within the peritoneal cavity, is often caused by the perforation of gas-containing viscus and commonly requires surgical treatment. …”
Get full text
Article -
1893
High-Performance Region-of-Interest Image Error Concealment with Hiding Technique
Published 2010-01-01“…Recently region-of-interest (ROI) based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. …”
Get full text
Article -
1894
HSP70-Inducible hNIS-IRES-eGFP Reporter Imaging: Response to Heat Shock
Published 2007-11-01“…A retroviral vector pQHSP70/hNIS-IRES-eGFP (pQHNIG70) was constructed containing the hNIS-IRES-eGFP dual-reporter genes under the control of an inducible human heat shock protein (HSP)70 promoter and RG2-pQHSP70/hNIS-IRES-eGFP (RG2-pQHNIG70) transduced cells were generated. …”
Get full text
Article -
1895
HEIDEGGER’S HUMAN DIMENSION UNDERSTANDING OF TECHNOLOGY
Published 2013-12-01“…Technological dependence is hardly fatal to humans in the sense that it contains distinct preconceived thinking, behavior and consciousness.…”
Get full text
Article -
1896
Nucleosome patterns in four plant pathogenic fungi with contrasted genome structures
Published 2023-01-01“…Genomes of phytopathogenic fungi are often compartmentalized: the core genome contains housekeeping genes whereas the fast-evolving genome mainly contains transposable elements and species-specific genes. …”
Get full text
Article -
1897
Concentration of nitric oxide oxidation products and antioxidant vitamins in chicken fed with supplemental zinc
Get full text
Article -
1898
Reconstructing a Longitudinal Dataset for Tasmania
Published 2021-08-01“…This article describes the formation of The Tasmanian Historical Dataset a longitudinal data resource spanning the 19th and early 20th century. This resource contains over 1.6 million records drawn from digitised prison and hospital admission registers, military enlistment papers, births, deaths and marriages, census and muster records, arrival and departure lists, bank accounts and property valuations, maps and plans and meteorological observations. …”
Get full text
Article -
1899
Integration, Game, and Sustainable Development of Shenzhen Port Based on Governmental Regulations
Published 2022-01-01“…The results show that, along with the promoting effect of port cooperation on the increase in container throughput, there is a gradual increase in the punishment of speculative behaviours. …”
Get full text
Article -
1900
Genome-wide identification and characterization of the bZIP family in the Mangrove Plant Kandelia obovata and its role in response to stress
Published 2025-02-01“…Conserved motif analysis showed that all bZIP family members contained motifs in the basic and hinge regions, with subfamily D displaying the greatest motif diversity. …”
Get full text
Article