首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Frontiers in big data

缩写:

ISSN:N/A

e-ISSN:2624-909X

IF/分区:2.3/Q2

文章目录 更多期刊信息

共收录本刊相关文章索引725
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Steve Nwaiwu Steve Nwaiwu
The successful application of large-scale transformer models in Natural Language Processing (NLP) is often hindered by the substantial computational cost and data requirements of full fine-tuning. This challenge is particularly acute in low...
Urvashi Khekare,Rajay Vedaraj I S Urvashi Khekare
It is critical that electric vehicles estimate the remaining driving range after charging, as this has direct implications for drivers' range anxiety and thus for large-scale EV adoption. Traditional approaches to predicting range using mac...
Kexin Ning,Qingguo Lü,Xiaofeng Liao Kexin Ning
In this study, we focus on investigating a nonsmooth convex optimization problem involving the l 1-norm under a non-negative constraint, with the goal of developing an inverse-problem solver for image deblurring. Research focused on solving...
Xiaobin Liang,Yonghong Deng,Yibin Wang et al. Xiaobin Liang et al.
Due to long-term usage, natural disasters and human factors, pipeline leaks or ruptures may occur, resulting in serious consequences. Therefore, it is of great significance to monitor and conduct real-time detection of pipeline leaks. Curre...
Shoichiro Inokuchi,Takumi Tajima Shoichiro Inokuchi
Introduction: Migraine is a prevalent neurological disorder with a substantial socioeconomic burden, underscoring the need for continued identification of therapeutic targets. Given the significant role of genetic factors...
Shanmin Yang,Hui Guo,Shu Hu et al. Shanmin Yang et al.
Deepfake technology represents a serious risk to safety and public confidence. While current detection approaches perform well in identifying manipulations within datasets that utilize identical deepfake methods for both training and valida...
Stephanie Ness Stephanie Ness
Introduction: The study addresses adversarial threats in Autonomous Vehicle Platooning (AVP) using machine learning. Methods: A novel m...
Emanuel Casmiry,Neema Mduma,Ramadhani Sinde Emanuel Casmiry
In the face of increasing cyberattacks, Structured Query Language (SQL) injection remains one of the most common and damaging types of web threats, accounting for over 20% of global cyberattack costs. However, due to its dynamic and variabl...
Anastasia Petrovna Pamova,Yuriy Aleksandrovich Vasilev,Tatyana Mikhaylovna Bobrovskaya et al. Anastasia Petrovna Pamova et al.
Background: The rapid integration of artificial intelligence (AI) into mammography necessitates robust quality control methods. The lack of standardized methods for establishing decision thresholds on the Receiver Operati...
Stan Kachnowski,Asif H Khan,Shadé Floquet et al. Stan Kachnowski et al.
Prevalence of immune diseases is rising, imposing burdens on patients, healthcare providers, and society. Addressing the future impact of immune diseases requires "big data" on global distribution/prevalence, patient demographics, risk fact...