Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
24721
Privacy-enhanced federated learning scheme based on generative adversarial networks
Published 2023-06-01“…Federated learning, a distributed machine learning paradigm, has gained a lot of attention due to its inherent privacy protection capability and heterogeneous collaboration.However, recent studies have revealed a potential privacy risk known as “gradient leakage”, where the gradients can be used to determine whether a data record with a specific property is included in another participant’s batch, thereby exposing the participant’s training data.Current privacy-enhanced federated learning methods may have drawbacks such as reduced accuracy, computational overhead, or new insecurity factors.To address this issue, a differential privacy-enhanced generative adversarial network model was proposed, which introduced an identifier into vanilla GAN, thus enabling the input data to be approached while satisfying differential privacy constraints.Then this model was applied to the federated learning framework, to improve the privacy protection capability without compromising model accuracy.The proposed method was verified through simulations under the client/server (C/S) federated learning architecture and was found to balance data privacy and practicality effectively compared with the DP-SGD method.Besides, the usability of the proposed model was theoretically analyzed under a peer-to-peer (P2P) architecture, and future research work was discussed.…”
Get full text
Article -
24722
Quantification of the Dental Morphology of Orangutans
Published 2013-01-01“…Both of their dentitions, comprising 50 teeth, were scanned employing the cone-beam computed tomography for both metrical and nonmetrical analyses. …”
Get full text
Article -
24723
Spatio-temporal correlation based fast inter mode decision for HEVC
Published 2016-04-01“…The new generation high efficiency video coding (HEVC) standard adopts coding tree unit (CTU) quadtree partition technology and ten inter prediction unit (PU) modes to improve compression efficiency significantly, but it brings in an enormous encoding computational complexit . A spatio-temporal correlation based fast inter mode decision algorithm for HEVC was proposed to reduce partition times of coding unit (CU) and inter PU mode candidates. …”
Get full text
Article -
24724
Algorithmic emergence? Epistemic in/justice in AI-directed transformations of healthcare
Published 2025-02-01“…AI applications invariably center on the domains of medical knowledge and practice that are amenable to computational workings. This, in turn, intensifies the prioritization of these medical domains and furthers the assumptions which support the development of AI, a move which decontextualizes the qualitative nuances and complexities of healthcare while simultaneously advancing infrastructure to support these medical domains. …”
Get full text
Article -
24725
Cortical Surface Reconstruction from High-Resolution MR Brain Images
Published 2012-01-01“…A new PDE-based method is presented for the automated cortical reconstruction that is computationally efficient and scales well with grid resolution, and thus is particularly suitable for high-resolution MR images with submillimeter voxel size. …”
Get full text
Article -
24726
Posterior Positivity Distribution Analysis of Subclinical Bluetongue in the Eastern and North-Eastern States of India: A Wakeup Call for Outbreak Preparedness
Published 2024-12-01“…In short, as a powerful computational tool, MCMC could be used for accurate seroprevalence estimation, species-specific insights, regional analysis, enhanced decision-making and epidemiological insights for bluetongue.…”
Get full text
Article -
24727
Aggressive Odontogenic myxoma: a case report
Published 2022-02-01“…A week after starting the medical treatment, the evolution was not favorable, so it was decided to perform computed tomography in which a large hypodense image was observed that involved the right mandibular branch. …”
Get full text
Article -
24728
Small cell osteosarcoma in gnathic bones in the maxilla: case report in a pediatric patient
Published 2025-01-01“…This report concerns an 8-year-old female patient referred to the Oral and Maxillofacial Surgery outpatient clinic with progressive swelling in the right maxillofacial region, initially asymptomatic, but progressing to pain and difficulty chewing. A cone beam computed tomography scan was requested and an incisional biopsy was carried out for histopathological and immunohistochemical analysis, which confirmed the pathological entity. …”
Get full text
Article -
24729
Unveiling the enigma of spontaneous cervical swelling syndrome: A case report
Published 2025-03-01“…Further investigation included X-Ray which showed tracheal deviation to the right side, and the Computed tomography showed soft tissue and subcutaneous edematous changes involving the left neck region and extending down to the left infraclavicular and mediastinal regions. …”
Get full text
Article -
24730
Identification of the Aerosol Types over Athens, Greece: The Influence of Air-Mass Transport
Published 2010-01-01“…The HYSPLIT model was used to compute back trajectories at three altitudes to investigate the relation between AOD550-FM and wind sector depending on the altitude. …”
Get full text
Article -
24731
Prebiotic Geochemical Automata at the Intersection of Radiolytic Chemistry, Physical Complexity, and Systems Biology
Published 2018-01-01“…The architectural attribute of “information hiding” of energy exchange processes at each object level is shared with stable, multitiered automata such as digital computers. These attributes may indicate a profound connection between the system complexity afforded by energy dissipation by subatomic level objects and the emergence of complex automata that could have preceded biological systems.…”
Get full text
Article -
24732
New Operational Matrix via Genocchi Polynomials for Solving Fredholm-Volterra Fractional Integro-Differential Equations
Published 2017-01-01“…We also derive the expressions for computing Genocchi coefficients of the integral kernel and for the integral of product of two Genocchi polynomials. …”
Get full text
Article -
24733
Analysis of Cone-Beam Artifacts in off-Centered Circular CT for Four Reconstruction Methods
Published 2006-01-01“…The results show that the low contrast artifacts can be efficiently corrected by the shift-variant method and the SART method to achieve good quality images at the expense of increased computation time, but the geometrical deformations are still not compensated for by these techniques.…”
Get full text
Article -
24734
The Effect of Seasonal Weather Variation on the Dynamics of the Plague Disease
Published 2017-01-01“…In this paper, we formulate a periodic epidemic model system by incorporating seasonal transmission rate in order to study the effect of seasonal weather variation on the dynamics of plague disease. We compute the basic reproduction number of a proposed model. …”
Get full text
Article -
24735
Impacts from cascading multi-hazards using hypergraphs: a case study from the 2015 Gorkha earthquake in Nepal
Published 2025-01-01“…Our findings underscore the potential of the hypergraph approach for multi-hazard risk assessment, offering advances in rapid computation and scenario exploration for cascading geo-hazards. …”
Get full text
Article -
24736
Autonomous Landing of a Fixed-Wing UAV With RTK GNSS and MEMS IMU
Published 2025-01-01“…Large fixed-wing UAVs often consume more onboard space and computing resources. With the improvement of system integration and the reduction of high-performance global navigation satellite system (GNSS) costs, real-time kinematic (RTK) GNSS has been widely used in small-scale and low-cost fixed-wing UAVs. …”
Get full text
Article -
24737
Characterizing Cerebral Imaging and Electroclinical Features of Five Pseudohypoparathyroidism Cases Presenting with Epileptic Seizures
Published 2022-01-01“…The clinical symptoms, biochemical imaging by magnetic resonance imaging (MRI) and computed tomography (CT) tests, and electroencephalogram (EEG) manifestations of five PHP patients with seizures were retrospectively collected and analyzed. …”
Get full text
Article -
24738
Pulmonary Hypertension due to a Pulmonary Artery Leiomyosarcoma: A Case Report
Published 2013-01-01“…She was initially diagnosed with chronic pulmonary thromboembolism and chest computed tomography (CT) scan revealed that lobulated heterogeneous left hilar mass extended to precarinal and subcarinal space. …”
Get full text
Article -
24739
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
24740
Interference Mitigation Based on Low Complexity Subspace Tracking Method for Vehicle Positioning
Published 2022-01-01“…The proposed monitor is simple, efficient, and can decide when to start the interference mitigation procedure, which can reduce the computation complexity significantly; Subspace-based method is introduced to track the interference basis matrix that can be feed to RootMUSIC to detect the frequency of interference, followed by the interference mitigation with a notch filter. …”
Get full text
Article