Showing 5,021 - 5,040 results of 67,915 for search 'DASB~', query time: 2.34s Refine Results
  1. 5021

    How to use monoclonal antibody-based therapy in ALL by Erica Brivio, Sujith Samarasinghe

    Published 2025-06-01
    “…Acute Lymphoblastic Leukemia (ALL) represents a significant challenge in haematology, particularly due to its aggressive nature, high relapse rates in adults and toxicity of treatment. Over the past decade, monoclonal antibody (MoAb)-based therapies have emerged as a promising approach to target specific antigens on leukemic cells, offering higher specificity, reduced toxicity, and improved response rates. …”
    Get full text
    Article
  2. 5022

    Securing Cloud-Based Internet of Things: Challenges and Mitigations by Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim

    Published 2024-12-01
    “…The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. …”
    Get full text
    Article
  3. 5023

    Wav-audio steganography algorithm based on amplitude modifying by 邹明光, 李芝棠

    Published 2014-10-01
    “…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
    Get full text
    Article
  4. 5024

    Considerations for Building Climate-based Species Distribution Models by David N. Bucklin, Mathieu Basille, Stephanie S. Romañach, Lauren A. Brandt, Frank J. Mazzotti, James I. Watling

    Published 2016-10-01
    “…WEC375/UW420: Considerations for Building Climate-based Species Distribution Models (ufl.edu) …”
    Get full text
    Article
  5. 5025

    Convolutional Neural Network-Based Fish Posture Classification by Xin Li, Anzi Ding, Shaojie Mei, Wenjin Wu, Wenguang Hou

    Published 2021-01-01
    “…Considering that in the actual situation, we only need to determine the four postures which are related to the head, tail, back, and belly of the fish, and we transfer this task into a four-kind classification problem. As such, the convolutional neural network (CNN) is introduced here to do classification and then to detect the fish’s posture. …”
    Get full text
    Article
  6. 5026

    Decentralized searchable encryption scheme based on dynamic accumulator by Yan ZHANG, Jinfan WANG, Zhuyun QI, Rongwei YANG, Yi WANG

    Published 2019-04-01
    “…Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.…”
    Get full text
    Article
  7. 5027

    A Memory-Based Hysteresis Model in Piezoelectric Actuators by Guilin Zhang, Chengjin Zhang, Jason Gu

    Published 2012-01-01
    “…A mathematical memory-based model is proposed to capture the hysteresis behavior in piezoelectric actuators. …”
    Get full text
    Article
  8. 5028

    A novel platform for engineered AAV-based vaccines by Sabrina Babutzka, Miranda Gehrke, Anastasia Papadopoulou, Maria Diedrichs-Möhring, Maria Giannaki, Lena Hennis, Bastian Föhr, Cale Kooyman, Andreas Osterman, Evangelia Yannaki, Gerhild Wildner, Hermann Ammer, Stylianos Michalakis

    Published 2025-03-01
    “…In conclusion, this novel AAV-based next-generation vaccine platform allows for the presentation of large antigenic sequences to elicit strong and specific immune responses. …”
    Get full text
    Article
  9. 5029

    Genetic Basis of Sjögren's Syndrome. How Strong is the Evidence? by Juan-Manuel Anaya, Angélica María Delgado-Vega, John Castiblanco

    Published 2006-01-01
    “…Genetic studies on twins with primary SS have not been performed, and only a few case reports describing twins have been published. …”
    Get full text
    Article
  10. 5030

    Deep Learning-Based Damage Assessment in Cherry Leaves by Burakhan Cubukcu, Hazel BOZCU

    Published 2024-12-01
    “…Therefore, the primary objective of this study is to use deep learning-based disease detection applications to increase cherry production and enable early disease diagnosis. …”
    Get full text
    Article
  11. 5031

    Design and implementation of secure Windows platform based on TCM by Wei FENG, Yu QIN, Deng-guo FENG, Bo YANG, Ying-jun ZHANG

    Published 2015-08-01
    “…A secure Windows platform solution based on TCM was proposed to solve the integrity measurement and attestation problem of the Windows system.Two security modes were realized by extending the Windows kernel:in the measurement mode,all executable contents that were loaded onto the Windows system were measured,and the TCM provided the protection and outward attestation for these measurements; and in the control mode,the measurements were further compared with a whitelist customized by an administrator,and all the programs that were not included in the whitelist would be prohibited from running.Experiment analysis shows that proposed solution can enhance the security of Windows platform and resist some software attacks; and at the same time,the average performance overhead is about 20~30ms,which will not influence the normal running of Windows.…”
    Get full text
    Article
  12. 5032

    Construction of multi-robot platform based on dobot robots by Jinchi Han, Duojicairang Ma

    Published 2025-02-01
    “…Specifically, a computer sends data to the microcontroller inside the host through WiFi communication, then the host distributes data to the slaves. …”
    Get full text
    Article
  13. 5033

    Honeypot contract detection of blockchain based on deep learning by Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG

    Published 2022-01-01
    “…Aiming at the problems of low accuracy of current detection methods and poor generalization of model, a honeypot contract detection method based on KOLSTM deep learning model was proposed.Firstly, by analyzing the characteristics of honeypot contract, the concept of key opcode was proposed, and a keyword extraction method which could be used to select the key opcode in smart contract was designed.Secondly, by adding the key opcode weight mechanism to the traditional LSTM model, a KOLSTM model which could simultaneously capture the sequence features and key opcode features hidden in the honeypot contract was constructed.Finally, the experimental results show that the model had a high recognition accuracy.Compared with the existing methods, the F-score is improved by 2.39% and 19.54% respectively in the two classification and multi-classification detection scenes.…”
    Get full text
    Article
  14. 5034

    Thermal conductivity of different bio-based insulation materials by Sergej Medved, Eugenia Mariana Tudor, Marius Catalin Barbu, Timothy M. Young

    Published 2021-06-01
    “… To achieve the zero-waste goal as well as sustainability, the use of the raw materials, especially those from nature, and wood in particular, has to be smart, meaning that the resource has to be used to its full potential. …”
    Get full text
    Article
  15. 5035

    Android malware detection based on improved random forest by Hong-yu YANG, Jin XU

    Published 2017-04-01
    “…Aiming at the defect of vote principle in random forest algorithm which is incapable of distinguishing the differences between strong classifier and weak classifier,a weighted voting improved method was proposed,and an improved random forest classification (IRFCM) was proposed to detect Android malware on the basis of this method.The IRFCM chose Permission information and Intent information as attribute features from AndroidManifest.xml files and optimized them,then applied the model to classify the final feature vectors.The experimental results in Weka environment show that IRFCM has better classification accuracy and classification efficiency.…”
    Get full text
    Article
  16. 5036

    Real-Time Depth-Based Hand Detection and Tracking by Sung-Il Joo, Sun-Hee Weon, Hyung-Il Choi

    Published 2014-01-01
    “…To determine the central point of a hand, we propose the so-called Depth Adaptive Mean Shift algorithm. DAM-Shift is a variant of CAM-Shift (Bradski, 1998), where the size of the search disk varies according to the depth of a hand. …”
    Get full text
    Article
  17. 5037

    BASES OF QUALITY MANAGEMENT OF GOODS BY AN ASSESSMENT OF LOYALTY OF THE CONSUMER by N. Zemlyanskaya, N. Kazakova, L. Mikhailova

    Published 2016-03-01
    “…Such fundamental categories as norm and mass of potrebitelny cost, a consumer assessment, quality and the range allow to reveal degree of satisfaction of the client. …”
    Get full text
    Article
  18. 5038

    IoT business guarantee method based on behavioral portrait by Longgang ZHAO, Hansheng LIU, Feng WANG, Shuang DI

    Published 2021-05-01
    “…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
    Get full text
    Article
  19. 5039

    A bidirectional authentication protocol for RFID based on Syn by Shanhua ZHAN, Shaorong HUANG

    Published 2018-12-01
    “…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
    Get full text
    Article
  20. 5040

    Distributed dynamic mapping scheme based on cost function by Guo-dong GE, Yun-fei GUO, Ju-long LAN, Cai-xia LIU

    Published 2014-10-01
    “…For supporting efficient host mobility and mapping identifiers onto locators,a distributed dynamic mobility mapping scheme based on cost function was proposed.In the scheme,depending on the mobility pattern and communication feature,the communication of mobile node is divided into three communication models,namely,moving update model,balanced transmission model and resolving query model.In order to minimize the total resolving cost,three mapping approach are proposed based on distributed multicast,consistent hash functions and proactive sharing respectively in the mobile domain.For each mapping approach,corresponding registration update,resolution query and packet delivery strategies are designed.Simulation results show that the scheme can achieve the minimum resolving cost,and can have low resolve latency and good adaptability for network topology dynamic changing.…”
    Get full text
    Article