Category: 7. Maths

Continue Reading

  • Optimized generative adversarial network for efficient resolution enhancement of 3D segmented rock tomography

    Optimized generative adversarial network for efficient resolution enhancement of 3D segmented rock tomography

    Segmented 3D low-resolution training dataset

    A Berea sandstone plug with a diameter of 12 mm was prepared to obtain high-quality imaging using a Tescan CoreTOM X-ray micro-CT scanner. The raw 3D micro-CT image acquisition and reconstruction were…

    Continue Reading

  • Enhancing the precision of male fertility diagnostics through bio inspired optimization techniques

    Enhancing the precision of male fertility diagnostics through bio inspired optimization techniques

    The proposed methodology outlines a novel, ML based framework for early prediction of male infertility. It integrates clinical, lifestyle, and environmental factors with advanced computational techniques to enable accurate, interpretable, and…

    Continue Reading

  • Coupling coordination and driving mechanism between tourism development, ecological conservation and digital economy: insights from Chinese 278 cities

    Coupling coordination and driving mechanism between tourism development, ecological conservation and digital economy: insights from Chinese 278 cities

    TED subsystem comprehensive development indices calculation and analysis

    Based on Eq. 1 to 3 and Table 1, this paper calculates the comprehensive development indices (CDI) and coupling coordination degree (CCD) for the TED subsystems. As shown…

    Continue Reading

  • Public values in public R&D through natural language processing

    Public values in public R&D through natural language processing

    Public values on AI

    This study has chosen “Artificial Intelligence (AI)” as the target technology field for analysis. AI is a promising technology area associated with the Fourth Industrial Revolution, with significant links to public value…

    Continue Reading

  • Temporal fingerprints for identity matching across fully encrypted domains

    Temporal fingerprints for identity matching across fully encrypted domains

    Preliminaries

    In this study, we aim at identifying individuals across different encrypted domains. Specifically, we aim at learning an identity matching function:

    Definition 1

    Given D1, …, Dn different…

    Continue Reading

  • Phishing detection on webpages in European non-English languages based on machine learning

    Phishing detection on webpages in European non-English languages based on machine learning

    This section introduces and evaluates a novel approach to phishing detection tailored for non-English webpages, particularly those in European countries where minor languages are spoken. The first subsection introduces the challenges of phishing…

    Continue Reading