Search
Now showing items 221-230 of 326
Comparative analysis of deep learning and graph cut algorithms for cell image segmentation
(2020-08-01)
Image segmentation is a commonly used technique in digital image processing with many applications in the area of computer vision and medical image analysis. The goal of image segmentation is to partition an image into ...
A new method of modelling tuneable lasers with functional composition
(2019-07-01)
A new nonlinear model is proposed for tuneable lasers. Using the generalized nonlinear Schrodinger equation as a starting point, expressions for the transformations undergone by the pulse are derived for each of the five ...
Group representation learning for group recommendation
(2021-01-01)
Group recommender systems facilitate group decision making for a set of individuals (e.g., a group of friends, a team, a corporation, etc.). Existing group recommendation methods mostly learn group members' individual ...
Synthesis of internal amide bond short interfering RNAs (siRNAs) and investigation of their gene silencing properties
(2012-10-01)
Cancer is a leading cause of death worldwide, accounting for around 13% of all death [1]. Traditional cancer therapeutics usually require careful selection of one or more intervention, such as surgery, radiotherapy, and ...
Identifying metabolic indicators of phytoplankton and comparing the temporal changes in algal community composition in two Lake Ontario areas of concern
(2021-12-01)
Freshwater algal blooms transition into harmful algal blooms (HABs) when cyanobacteria produce toxins that impact ecosystem health. The point at which algal blooms transition into HABs is not fully understood, but I believe ...
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)
The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ...
Faulty node repair and dynamically spawned black hole search in clouds
(2015-03-01)
The reality of the constant emergence of new threats justifies the necessity to protect
network assets and mitigate the risks associated with attacks. In this context, eliminating faulty network entities in the distributed ...
Peer evaluation with graph neural networks
(2021-12-01)
Peer assessment systems are rising in various social contexts, such as peer grading in large (online) classrooms, peer review in conferences, peer art evaluation, etc. However, peer assessments might not be as accurate as ...
A molecular characterization of agonists that bind to Hco-UNC-49, a GABA-gated chloride channel from Haemonchus contortus
(2012-11-01)
Haemonchus contortus is a blood feeding parasitic nematode infecting ruminants causing anemia and poor health at great economic cost. The ability to pharmaceutically control infection has been challenged by the rapid ...
Using detection in depth to counter SCADA-specific advanced persistent threats
(2014-04-01)
A heavy focus has recently been placed on the current state of each country’s critical
infrastructure security. Unfortunately, widely deployed supervisory control and data
acquisition (SCADA) protocols provide little ...