-
321
Distributed Authentication of Power Grid Safety and Stability Control Terminals Based on DHT and Blockchain
Published 2022-04-01Get full text
Article -
322
GCBRGCN: Integration of ceRNA and RGCN to Identify Gastric Cancer Biomarkers
Published 2025-03-01“…It demonstrates exceptional performance, surpassing traditional machine learning and graph neural network algorithms with an area under the curve (AUC) of 0.8172 in the task of predicting GC biomarkers. …”
Get full text
Article -
323
Classification of mammograms: Comparing a graphical to a geometrical approach
Published 2025-06-01Get full text
Article -
324
-
325
Discovering emergent connections in quantum physics research via dynamic word embeddings
Published 2025-01-01Get full text
Article -
326
Hybrid Feature Selection and Classifying Stages through Electrocardiogram (ECG) Signal for Heart Disease Prediction
Published 2023-12-01“…In order to choose the best features, a modified chicken swarm optimization algorithm (MCSO) was proposed. Aberrant waves caused by cardiac ailments impacted the dataset patients, according to the suggested research’s unique machine learning methods of multi-module neural network system (MMNNS). …”
Get full text
Article -
327
-
328
-
329
Utilizing LSTM-GRU for IOT-Based Water Level Prediction Using Multi-Variable Rainfall Time Series Data
Published 2024-10-01Get full text
Article -
330
Calculation Method of Planetary Gear Train Transmission Ratio based on Adjacency Matrix
Published 2019-05-01Get full text
Article -
331
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…The massive APT attack analysis reports and threat intelligence generated by security companies have significant research value. They can effectively provide the information of APT organizations, thereby assisting in the traceability analysis of network attack events. …”
Get full text
Article -
332
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…The massive APT attack analysis reports and threat intelligence generated by security companies have significant research value. They can effectively provide the information of APT organizations, thereby assisting in the traceability analysis of network attack events. …”
Get full text
Article -
333
Multi-task aquatic toxicity prediction model based on multi-level features fusion
Published 2025-02-01Get full text
Article -
334
Graphlet decomposition dataset of Tallinn’s road network from January 2020 OpenStreetMap dataGithub
Published 2025-08-01“…The code is designed for reproducibility, allowing researchers to apply the same analysis to other cities. …”
Get full text
Article -
335
Heterogeneous AI Music Generation Technology Integrating Fine-Grained Control
Published 2025-01-01“…As artificial intelligence algorithms continue to advance, researchers have increasingly harnessed their capabilities to generate music that resonates with human emotions, offering a novel means of alleviating the escalating pressures of contemporary life. …”
Get full text
Article -
336
Inconsistency evaluation of the curriculum logical structure
Published 2018-11-01“…Conclusion. As a result of the research, the methods were proposed that allow identifying possible contradictions in the structure of the curriculum and evaluating its inconsistency. …”
Get full text
Article -
337
-
338
-
339
-
340