-
481
Super‐Intense Geomagnetic Storm on 10–11 May 2024: Possible Mechanisms and Impacts
Published 2024-12-01“…With a peak negative excursion of Sym‐H below −500 nT, this storm is the second largest of the space era. Solar wind energy transferred through radiation and mass coupling affected the entire Geospace. …”
Get full text
Article -
482
La villégiature anglaise et l’invention de la Côte d’Azur
Published 2014-07-01“…The introduction of seabathing on the Riviera before 1860 is emblematic of these British cultural transfers. The originality of Nice lies in the double influence of Italian and British models which are interwoven in local bathing practices and architecture.…”
Get full text
Article -
483
A Block-Based and Highly Parallel CNN Accelerator for Seed Sorting
Published 2022-01-01“…The seed sorting methods based on convolutional neural networks (CNNs) have achieved excellent recognition accuracy on large-scale pretrained network models. However, CNN inference is a computationally intensive process that often requires hardware acceleration to operate in real time. …”
Get full text
Article -
484
Deep Learning Algorithms for Detection and Classification of Gastrointestinal Diseases
Published 2021-01-01“…In the classification stage, pretrained convolutional neural network (CNN) models are tuned by transferring learning to perform new tasks. …”
Get full text
Article -
485
Novel analytical superposed nonlinear wave structures for the eighth-order (3+1)-dimensional Kac-Wakimoto equation using improved modified extended tanh function method
Published 2024-11-01“…Higher-order nonlinear partial differential equations, such as the eighth-order Kac-Wakimoto model, are useful for studying wave turbulence in fluids, where energy transfers across a range of wave numbers. …”
Get full text
Article -
486
From Bench to Brain: A Metadata-driven Approach to Research Data Management in a Collaborative Neuroscientific Research Center
Published 2025-01-01“…This framework can serve as a transferable model for other collaborative research initiatives lacking predefined metadata schemas or repositories. …”
Get full text
Article -
487
What’s Going On With Me and How Can I Better Manage My Health? The Potential of GPT-4 to Transform Discharge Letters Into Patient-Centered Letters to Enhance Patient Safety: Prospe...
Published 2025-01-01“…We evaluated how effectively and comprehensively GPT-4 identified and transferred patient safety–relevant information from the discharge letters to the transformed patient letters. …”
Get full text
Article -
488
Controlling Embedded Systems Remotely via Internet-of-Things Based on Emotional Recognition
Published 2020-01-01“…The methodology is achieved by combining machine learning (for smiling recognition) and embedded systems (for remote control IoT) fields. In terms of the smiling recognition, GENKl-4K database is exploited to train a model, which is built in the following sequenced steps: real-time video, snapshot image, preprocessing, face detection, feature extraction using HOG, and then finally SVM for the classification. …”
Get full text
Article -
489
Consensus for Operating Room Multimodal Data Management: Identifying Research Priorities for Data-Driven Surgery
Published 2024-09-01“…The roadmap prioritizes standardizing OR data formats, integrating OR data with patient information, ensuring regulatory compliance, standardizing surgical AI models, and securing data transfers in the next generation of wireless networks. …”
Get full text
Article -
490
戶外冒險教育課程對大學生心理賦能之 成效研究 Effects of Integrating Psychological Empowerment Into an Outdoor Adventure Education Curriculum for College Students...
Published 2024-12-01“…Template analysis was employed to explore themes such as the cross-domain application of empowerment, learning transfer, and concept extension, with the findings complementing the quantitative findings. …”
Get full text
Article -
491
Meta-Analysis of the Effect of Different Amounts of Cow Manure, Chemical (Nitrogen), and Biological Fertilizers on Some Quantitative and Qualitative Traits of Thyme (Thymus vulgari...
Published 2025-09-01“…All the extracted data were transferred to comprehensive meta-analysis software for meta-analysis. …”
Get full text
Article -
492
Neural quantum propagators for driven-dissipative quantum dynamics
Published 2025-01-01“…Furthermore, by appropriately configuring the external fields, our trained NQP can be transferred to systems governed by different Hamiltonians. …”
Get full text
Article -
493
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article