-
141
Caffeine-Induced Suppression of GABAergic Inhibition and Calcium-Independent Metaplasticity
Published 2016-01-01“…A brief local puff-application of caffeine to hippocampal CA1 pyramidal cells transiently suppressed GABAergic inhibitory postsynaptic currents (IPSCs) by 73.2 ± 6.98%. Time course of suppression and the subsequent recovery of IPSCs resembled DSI (depolarization-induced suppression of inhibition), mediated by endogenous cannabinoids that require a [Ca2+]i rise. …”
Get full text
Article -
142
-
143
Optimally stable fifth-order integration methods: a numerical approach
Published 1978-01-01Get full text
Article -
144
Effect of Metal Dopant on Ninhydrin—Organic Nonlinear Optical Single Crystals
Published 2013-01-01“…Single crystal X-ray diffraction analysis reveals that the compound crystallizes in monoclinic system with noncentrosymmetric space group P21 with lattice parameters a=11.28 Å, b=5.98 Å, c=5.71 Å, α=90∘, β=98.57, γ=90∘, and V=381 (Å)3, which agrees very well with the reported value. …”
Get full text
Article -
145
-
146
ETNOZOOLOGI: STUDI KEARIFAN LOKAL MASYARAKAT ADAT KAMPUNG NAGA TASIKMALAYA
Published 2021-11-01Get full text
Article -
147
Raise of short-stemmed vaviloid branched spike lines and their cytogenetics
Published 2015-07-01Get full text
Article -
148
Wear - Sediment Quantity Correlation Model for Preventive Maintenance Scheduling of a Hydroelectric Power Plant
Published 2025-01-01“…The result of the correlation statistical model determined the preventive maintenance for improvement conditions of 98 % of the availability in the hydroelectric power plant and is reflected in the reduction of days of no electricity generation. …”
Get full text
Article -
149
Noise-attention-based forgery face detection method
Published 2023-08-01“…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
Get full text
Article -
150
Towards automated recipe genre classification using semi-supervised learning.
Published 2025-01-01“…The proposed pipeline named 3A2M+ extends the size of the Named Entity Recognition (NER) list to address missing named entities like heat, time or process from the recipe directions using two NER extraction tools. 3A2M+ dataset provides a comprehensive solution to the various challenging recipe-related tasks, including classification, named entity recognition, and recipe generation. Furthermore, we have demonstrated traditional machine learning, deep learning and pre-trained language models to classify the recipes into their corresponding genre and achieved an overall accuracy of 98.6%. …”
Get full text
Article -
151
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01“…The experimental results demonstrate the model’s effectiveness with 98% privacy preservation, 700 TPS throughput, 0.7 J energy consumption, 0.98 quantum resilience, and 96% access control effectiveness, making it highly suitable for modern IoT and blockchain applications.…”
Get full text
Article -
152
Simulation of accelerated strip cooling on the hot rolling mill run-out roller table
Published 2016-07-01“…Winding temperature calculation error does not exceed 20°C for 98.5 % of strips of low-carbon and low-alloy steels…”
Get full text
Article -
153
SIMULATIONAL AND EXPERIMENTAL STUDY ON THE CRITICAL FACTORS OF HIGH-SPEED BRAKING SQUEAL
Published 2018-01-01Get full text
Article -
154
L’oléiculture en France : quand le paysage participe au renouveau d’une activité agricole
Published 2017-12-01Get full text
Article -
155
Modal Analysis of the Cycloid Gear Pump based on Pro/E and ANSYS
Published 2015-01-01Get full text
Article -
156
A Parameter Optimization Approach for Optimal Control of RSSI Problem in cdma2000 1x Ev-Do Network
Published 2013-09-01Get full text
Article -
157
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01“…With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.…”
Get full text
Article -
158
-
159
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01Get full text
Article -
160
Construction of International Cooperation strategies: An inquiry into the learning experience
Published 2016-05-01Get full text
Article