Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (328)

Search Parameters:
Keywords = ADEPT

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 1652 KB  
Review
Metabolic Hostile Takeover: How Influenza Virus Reprograms Cellular Metabolism for Replication
by Xianfeng Hui, Xiaowei Tian, Shihuan Ding, Ge Gao, Xin Zhao, Jiyan Cui, Yiru Hou, Tiesuo Zhao and Hui Wang
Viruses 2025, 17(10), 1386; https://doi.org/10.3390/v17101386 - 17 Oct 2025
Viewed by 372
Abstract
Influenza viruses are adept at hijacking host cellular machinery to facilitate their replication and propagation. A critical aspect of this hijacking involves the reprogramming of host cell metabolism. This review summarizes current findings on how influenza virus infection alters major metabolic pathways, including [...] Read more.
Influenza viruses are adept at hijacking host cellular machinery to facilitate their replication and propagation. A critical aspect of this hijacking involves the reprogramming of host cell metabolism. This review summarizes current findings on how influenza virus infection alters major metabolic pathways, including enhanced glycolysis, suppression of oxidative phosphorylation, diversion of TCA cycle intermediates for biosynthesis, and upregulation of lipid and amino acid metabolism. Key nutrients like glucose, glutamine, and serine are redirected to support viral RNA synthesis, protein production, and membrane formation. Moreover, these metabolic changes also modulate host immune responses, potentially aiding in immune evasion. We highlight the role of transcription factors such as SREBPs in lipid synthesis and the impact of one-carbon metabolism on epigenetic regulation. Finally, we discuss how targeting virus-induced metabolic shifts, using agents like 2-deoxyglucose or fatty acid synthesis inhibitors, offers promising avenues for antiviral intervention, while emphasizing the need for selective approaches to minimize harm to normal cells. Full article
(This article belongs to the Special Issue Interaction Between Influenza Virus and Host Cell)
Show Figures

Figure 1

20 pages, 2565 KB  
Article
GBV-Net: Hierarchical Fusion of Facial Expressions and Physiological Signals for Multimodal Emotion Recognition
by Jiling Yu, Yandong Ru, Bangjun Lei and Hongming Chen
Sensors 2025, 25(20), 6397; https://doi.org/10.3390/s25206397 - 16 Oct 2025
Viewed by 476
Abstract
A core challenge in multimodal emotion recognition lies in the precise capture of the inherent multimodal interactive nature of human emotions. Addressing the limitation of existing methods, which often process visual signals (facial expressions) and physiological signals (EEG, ECG, EOG, and GSR) in [...] Read more.
A core challenge in multimodal emotion recognition lies in the precise capture of the inherent multimodal interactive nature of human emotions. Addressing the limitation of existing methods, which often process visual signals (facial expressions) and physiological signals (EEG, ECG, EOG, and GSR) in isolation and thus fail to exploit their complementary strengths effectively, this paper presents a new multimodal emotion recognition framework called the Gated Biological Visual Network (GBV-Net). This framework enhances emotion recognition accuracy through deep synergistic fusion of facial expressions and physiological signals. GBV-Net integrates three core modules: (1) a facial feature extractor based on a modified ConvNeXt V2 architecture incorporating lightweight Transformers, specifically designed to capture subtle spatio-temporal dynamics in facial expressions; (2) a hybrid physiological feature extractor combining 1D convolutions, Temporal Convolutional Networks (TCNs), and convolutional self-attention mechanisms, adept at modeling local patterns and long-range temporal dependencies in physiological signals; and (3) an enhanced gated attention fusion module capable of adaptively learning inter-modal weights to achieve dynamic, synergistic integration at the feature level. A thorough investigation of the publicly accessible DEAP and MAHNOB-HCI datasets reveals that GBV-Net surpasses contemporary methods. Specifically, on the DEAP dataset, the model attained classification accuracies of 95.10% for Valence and 95.65% for Arousal, with F1-scores of 95.52% and 96.35%, respectively. On MAHNOB-HCI, the accuracies achieved were 97.28% for Valence and 97.73% for Arousal, with F1-scores of 97.50% and 97.74%, respectively. These experimental findings substantiate that GBV-Net effectively captures deep-level interactive information between multimodal signals, thereby improving emotion recognition accuracy. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

17 pages, 2347 KB  
Article
A Convolutional Neural Network-Based Vehicle Security Enhancement Model: A South African Case Study
by Thapelo Samuel Matlala, Michael Moeti, Khuliso Sigama and Relebogile Langa
Appl. Sci. 2025, 15(19), 10584; https://doi.org/10.3390/app151910584 - 30 Sep 2025
Viewed by 293
Abstract
This paper applies a Convolutional Neural Network (CNN)-based vehicle security enhancement model, with a specific focus on the South African context. While conventional security systems, including immobilizers, alarms, steering locks, and GPS trackers, provide a baseline level of protection, they are increasingly being [...] Read more.
This paper applies a Convolutional Neural Network (CNN)-based vehicle security enhancement model, with a specific focus on the South African context. While conventional security systems, including immobilizers, alarms, steering locks, and GPS trackers, provide a baseline level of protection, they are increasingly being circumvented by technologically adept adversaries. These limitations have spurred the development of advanced security solutions leveraging artificial intelligence (AI), with a particular emphasis on computer vision and deep learning techniques. This paper presents a CNN-based Vehicle Security Enhancement Model (CNN-based VSEM) that integrates facial recognition with GSM and GPS technologies to provide a robust, real-time security solution in South Africa. This study contributes a novel integration of CNN-based authentication with GSM and GPS tracking in the South African context, validated on a functional prototype.The prototype, developed on a Raspberry Pi 4 platform, was validated through practical demonstrations and user evaluations. The system achieved an average recognition accuracy of 85.9%, with some identities reaching 100% classification accuracy. While misclassifications led to an estimated False Acceptance Rate (FAR) of ~5% and False Rejection Rate (FRR) of ~12%, the model consistently enabled secure authentication. Preliminary latency tests indicated a decision time of approximately 1.8 s from image capture to ignition authorization. These results, together with positive user feedback, confirm the model’s feasibility and reliability. This integrated approach presents a promising advancement in intelligent vehicle security for regions with high rates of vehicle theft. Future enhancements will explore the incorporation of 3D sensing, infrared imaging, and facial recognition capable of handling variations in facial appearance. Additionally, the model is designed to detect authorized users, identify suspicious behaviour in the vicinity of the vehicle, and provide an added layer of protection against unauthorized access. Full article
Show Figures

Figure 1

8 pages, 206 KB  
Proceeding Paper
Transitive Self-Reflection–A Fundamental Criterion for Detecting Intelligence
by Krassimir Markov and Velina Slavova
Proceedings 2025, 126(1), 8; https://doi.org/10.3390/proceedings2025126008 - 15 Sep 2025
Viewed by 432
Abstract
This survey investigates the concept of transitive self-reflection as a fundamental criterion for detecting and measuring intelligence. We explore the manifestation of this ability in humans, consider its potential presence in other animals, and discuss the challenges and possibilities of replicating it in [...] Read more.
This survey investigates the concept of transitive self-reflection as a fundamental criterion for detecting and measuring intelligence. We explore the manifestation of this ability in humans, consider its potential presence in other animals, and discuss the challenges and possibilities of replicating it in artificial intelligence systems. Transitive self-reflection is characterized by an awareness of oneself through complex cognitive abilities rooted in evolutionary mechanisms that are innate in humans. Although transitive self-reflection cannot be fully replicated in AI as an origin, its behavioral characteristics can be analyzed and, to some extent, imitated. The study delves into various forms of transitive self-reflection, including self-recognition, object-mediated self-reflection, and reflective social cognition, highlighting their philosophical roots and recent advancements in cognitive science. We also examine the multifaceted nature of intelligence, encompassing cognitive, emotional, and social dimensions. Despite significant progress, current AI systems lack true transitive self-reflection. Developing AI with this capability requires advances in knowledge representation, reasoning algorithms, and machine learning. Incorporating transitive self-reflection into AI systems holds transformative potential for creating socially adept and more human-like intelligence in machines. This research underscores the importance of transitive self-reflection in advancing our understanding of and the development of intelligent systems. Full article
22 pages, 3476 KB  
Article
AlzheimerRAG: Multimodal Retrieval-Augmented Generation for Clinical Use Cases
by Aritra Kumar Lahiri and Qinmin Vivian Hu
Mach. Learn. Knowl. Extr. 2025, 7(3), 89; https://doi.org/10.3390/make7030089 - 27 Aug 2025
Cited by 1 | Viewed by 1247
Abstract
Recent advancements in generative AI have fostered the development of highly adept Large Language Models (LLMs) that integrate diverse data types to empower decision-making. Among these, multimodal retrieval-augmented generation (RAG) applications are promising because they combine the strengths of information retrieval and generative [...] Read more.
Recent advancements in generative AI have fostered the development of highly adept Large Language Models (LLMs) that integrate diverse data types to empower decision-making. Among these, multimodal retrieval-augmented generation (RAG) applications are promising because they combine the strengths of information retrieval and generative models, enhancing their utility across various domains, including clinical use cases. This paper introduces AlzheimerRAG, a multimodal RAG application for clinical use cases, primarily focusing on Alzheimer’s disease case studies from PubMed articles. This application incorporates cross-modal attention fusion techniques to integrate textual and visual data processing by efficiently indexing and accessing vast amounts of biomedical literature. Our experimental results, compared to benchmarks such as BioASQ and PubMedQA, yield improved performance in the retrieval and synthesis of domain-specific information. We also present a case study using our multimodal RAG in various Alzheimer’s clinical scenarios. We infer that AlzheimerRAG can generate responses with accuracy non-inferior to humans and with low rates of hallucination. Full article
Show Figures

Figure 1

13 pages, 327 KB  
Article
PSO-Guided Construction of MRD Codes for Rank Metrics
by Behnam Dehghani and Amineh Sakhaie
Mathematics 2025, 13(17), 2756; https://doi.org/10.3390/math13172756 - 27 Aug 2025
Viewed by 489
Abstract
Maximum Rank-Distance (MRD) codes are a class of optimal error-correcting codes that achieve the Singleton-like bound for rank metric, making them invaluable in applications such as network coding, cryptography, and distributed storage. While algebraic constructions of MRD codes (e.g., Gabidulin codes) are well-studied [...] Read more.
Maximum Rank-Distance (MRD) codes are a class of optimal error-correcting codes that achieve the Singleton-like bound for rank metric, making them invaluable in applications such as network coding, cryptography, and distributed storage. While algebraic constructions of MRD codes (e.g., Gabidulin codes) are well-studied for specific parameters, a comprehensive theory for their existence and structure over arbitrary finite fields remains an open challenge. Recent advances have expanded MRD research to include twisted, scattered, convolutional, and machine-learning-aided approaches, yet many parameter regimes remain unexplored. This paper introduces a computational optimization framework for constructing MRD codes using Particle Swarm Optimization (PSO), a bio-inspired metaheuristic algorithm adept at navigating high-dimensional, non-linear, and discrete search spaces. Unlike traditional algebraic methods, our approach does not rely on prescribed algebraic structures; instead, it systematically explores the space of possible generator matrices to identify MRD configurations, particularly in cases where theoretical constructions are unknown. Key contributions include: (1) a tailored finite-field PSO formulation that encodes rank-metric constraints into the optimization process, with explicit parameter control to address convergence speed and global optimality; (2) a theoretical analysis of the adaptability of PSO to MRD construction in complex search landscapes, supported by experiments demonstrating its ability to find codes beyond classical families; and (3) an open-source Python toolkit for MRD code discovery, enabling full reproducibility and extension to other rank-metric scenarios. The proposed method complements established theory while opening new avenues for hybrid metaheuristic–algebraic and machine learning–aided MRD code construction. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
22 pages, 1785 KB  
Article
LA-EAD: Simple and Effective Methods for Improving Logical Anomaly Detection Capability
by Zhixing Li, Zan Yang, Lijie Zhang, Lie Yang and Jiansheng Liu
Sensors 2025, 25(16), 5016; https://doi.org/10.3390/s25165016 - 13 Aug 2025
Viewed by 904
Abstract
In the field of intelligent manufacturing, image anomaly detection plays a pivotal role in automated product quality inspection. Most existing anomaly detection methods are adept at capturing local features of images, achieving high detection accuracy for structural anomalies such as cracks and scratches. [...] Read more.
In the field of intelligent manufacturing, image anomaly detection plays a pivotal role in automated product quality inspection. Most existing anomaly detection methods are adept at capturing local features of images, achieving high detection accuracy for structural anomalies such as cracks and scratches. However, logical anomalies typically appear normal within local regions of an image and are difficult to represent well by the anomaly score map, requiring the model to possess the capability to extract global context features. To address this challenge while balancing the detection of both structural and logical anomalies, this paper proposes a lightweight anomaly detection framework built upon EfficientAD. This framework integrates the reconstruction difference constraint (RDC) and a logical anomaly detection module. Specifically, the original EfficientAD relies on the coarse-grained reconstruction difference between the student and the autoencoder to detect logical anomalies; but, false detection may be caused by the local fine-grained reconstruction difference between the two models. RDC can promote the consistency of the fine-grained reconstruction between the student and the autoencoder, thereby effectively alleviating this problem. Furthermore, in order to detect anomalies that are difficult to represent by feature maps more effectively, the proposed logical anomaly detection module extracts and aggregates the context features of the image, and combines the feature-based method to calculate the overall anomaly score. Extensive experiments demonstrate our method’s significant improvement in logical anomaly detection, achieving 94.2 AU-ROC on MVTec LOCO, while maintaining strong structural anomaly detection performance at 98.4 AU-ROC on MVTec AD. Compared to the baseline, like EfficientAD, our framework achieves a state-of-the-art balance between both anomaly types. Full article
Show Figures

Figure 1

20 pages, 2448 KB  
Article
CCESC: A Crisscross-Enhanced Escape Algorithm for Global and Reservoir Production Optimization
by Youdao Zhao and Xiangdong Li
Biomimetics 2025, 10(8), 529; https://doi.org/10.3390/biomimetics10080529 - 12 Aug 2025
Viewed by 552
Abstract
Global optimization problems, ubiquitous scientific research, and engineering applications necessitate sophisticated algorithms adept at navigating intricate, high-dimensional search landscapes. The Escape (ESC) algorithm, inspired by the complex dynamics of crowd evacuation behavior—where individuals exhibit calm, herding, or panic responses—offers a compelling nature-inspired paradigm [...] Read more.
Global optimization problems, ubiquitous scientific research, and engineering applications necessitate sophisticated algorithms adept at navigating intricate, high-dimensional search landscapes. The Escape (ESC) algorithm, inspired by the complex dynamics of crowd evacuation behavior—where individuals exhibit calm, herding, or panic responses—offers a compelling nature-inspired paradigm for addressing these challenges. While ESC demonstrates a strong intrinsic balance between exploration and exploitation, opportunities exist to enhance its inter-agent communication and search trajectory diversification. This paper introduces an advanced bio-inspired algorithm, termed Crisscross Escape Algorithm (CCESC), which strategically incorporates a Crisscross (CC) information exchange mechanism. This CC strategy, by promoting multi-directional interaction and information sharing among individuals irrespective of their behavioral group (calm, herding, panic), fosters a richer exploration of the solution space, helps to circumvent local optima, and accelerates convergence towards superior solutions. The CCESC’s performance is extensively validated on the demanding CEC2017 benchmark suites, alongside several standard engineering design problems, and compared against a comprehensive set of prominent metaheuristic algorithms. Experimental results consistently reveal CCESC’s superior or highly competitive performance across a wide array of benchmark functions. Furthermore, CCESC is effectively applied to a complex reservoir production optimization problem, demonstrating its capacity to achieve significantly improved Net Present Value (NPV) over other established methods. This successful application underscores CCESC’s robustness and efficacy as a powerful optimization tool for tackling multifaceted real-world problems, particularly in reservoir production optimization within complex sedimentary environments. Full article
Show Figures

Figure 1

23 pages, 85184 KB  
Article
MB-MSTFNet: A Multi-Band Spatio-Temporal Attention Network for EEG Sensor-Based Emotion Recognition
by Cheng Fang, Sitong Liu and Bing Gao
Sensors 2025, 25(15), 4819; https://doi.org/10.3390/s25154819 - 5 Aug 2025
Cited by 1 | Viewed by 799
Abstract
Emotion analysis based on electroencephalogram (EEG) sensors is pivotal for human–machine interaction yet faces key challenges in spatio-temporal feature fusion and cross-band and brain-region integration from multi-channel sensor-derived signals. This paper proposes MB-MSTFNet, a novel framework for EEG emotion recognition. The model constructs [...] Read more.
Emotion analysis based on electroencephalogram (EEG) sensors is pivotal for human–machine interaction yet faces key challenges in spatio-temporal feature fusion and cross-band and brain-region integration from multi-channel sensor-derived signals. This paper proposes MB-MSTFNet, a novel framework for EEG emotion recognition. The model constructs a 3D tensor to encode band–space–time correlations of sensor data, explicitly modeling frequency-domain dynamics and spatial distributions of EEG sensors across brain regions. A multi-scale CNN-Inception module extracts hierarchical spatial features via diverse convolutional kernels and pooling operations, capturing localized sensor activations and global brain network interactions. Bi-directional GRUs (BiGRUs) model temporal dependencies in sensor time-series, adept at capturing long-range dynamic patterns. Multi-head self-attention highlights critical time windows and brain regions by assigning adaptive weights to relevant sensor channels, suppressing noise from non-contributory electrodes. Experiments on the DEAP dataset, containing multi-channel EEG sensor recordings, show that MB-MSTFNet achieves 96.80 ± 0.92% valence accuracy, 98.02 ± 0.76% arousal accuracy for binary classification tasks, and 92.85 ± 1.45% accuracy for four-class classification. Ablation studies validate that feature fusion, bidirectional temporal modeling, and multi-scale mechanisms significantly enhance performance by improving feature complementarity. This sensor-driven framework advances affective computing by integrating spatio-temporal dynamics and multi-band interactions of EEG sensor signals, enabling efficient real-time emotion recognition. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

35 pages, 2713 KB  
Article
Leveraging the Power of Human Resource Management Practices for Workforce Empowerment in SMEs on the Shop Floor: A Study on Exploring and Resolving Issues in Operations Management
by Varun Tripathi, Deepshi Garg, Gianpaolo Di Bona and Alessandro Silvestri
Sustainability 2025, 17(15), 6928; https://doi.org/10.3390/su17156928 - 30 Jul 2025
Viewed by 2558
Abstract
Operations management personnel emphasize the maintenance of workforce empowerment on the shop floor. This is made possible by implementing effective operations and human resource management practices. However, organizations are adept at controlling the workforce empowerment domain within operational scenarios. In the current industry [...] Read more.
Operations management personnel emphasize the maintenance of workforce empowerment on the shop floor. This is made possible by implementing effective operations and human resource management practices. However, organizations are adept at controlling the workforce empowerment domain within operational scenarios. In the current industry revolution scenario, industry personnel often face failure due to a laggard mindset in the face of industry revolutions. There are higher possibilities of failure because of standardized operations controlling the shop floor. Organizations utilize well-established human resource concepts, including McClelland’s acquired needs theory, Herzberg’s two-factor theory, and Maslow’s hierarchy of needs, in order to enhance the workforce’s performance on the shop floor. Current SME individuals require fast-paced approaches for tracking the performance and idleness of a workforce in order to control them more efficiently in both flexible and transformational stages. The present study focuses on investigating the parameters and factors that contribute to workforce empowerment in an industrial revolution scenario. The present research is used to develop a framework utilizing operations and human resource management approaches in order to identify and address the issues responsible for deteriorating workforce contributions. The framework includes HRM and operations management practices, including Herzberg’s two-factor theory, Maslow’s theory, and lean and smart approaches. The developed framework contains four phases for achieving desired outcomes on the shop floor. The developed framework is validated by implementing it in a real-life electric vehicle manufacturing organization, where the human resources and operations team were exhausted and looking to resolve employee-related issues instantly and establish a sustainable work environment. The current industry is transforming from Industry 3.0 to Industry 4.0, and seeks future-ready innovations in operations, control, and monitoring of shop floor setups. The operations management and human resource management practices teams reviewed the results over the next three months after the implementation of the developed framework. The results revealed an improvement in workforce empowerment within the existing work environment, as evidenced by reductions in the number of absentees, resignations, transfer requests, and medical issues, by 30.35%, 94.44%, 95.65%, and 93.33%, respectively. A few studies have been conducted on workforce empowerment by controlling shop floor scenarios through modifications in operations and human resource management strategies. The results of this study can be used to fulfil manufacturers’ needs within confined constraints and provide guidelines for efficiently controlling workforce performance on the shop floor. Constraints refer to barriers that have been decided, including production time, working time, asset availability, resource availability, and organizational policy. The study proposes a decision-making plan for enhancing shop floor performance by providing suitable guidelines and an action plan, taking into account both workforce and operational performance. Full article
(This article belongs to the Section Sustainable Management)
Show Figures

Figure 1

24 pages, 5075 KB  
Article
Automated Machine Learning-Based Prediction of the Effects of Physicochemical Properties and External Experimental Conditions on Cadmium Adsorption by Biochar
by Shuoyang Wang, Xiangyu Song, Jicheng Duan, Shuo Li, Dangdang Gao, Jia Liu, Fanjing Meng, Wen Yang, Shixin Yu, Fangshu Wang, Jie Xu, Siyi Luo, Fangchao Zhao and Dong Chen
Water 2025, 17(15), 2266; https://doi.org/10.3390/w17152266 - 30 Jul 2025
Cited by 1 | Viewed by 846
Abstract
Biochar serves as an effective adsorbent for the heavy metal cadmium, with its performance significantly influenced by its physicochemical properties and various environmental features. Traditional machine learning models, though adept at managing complex multi-feature relationships, rely heavily on expertise in feature engineering and [...] Read more.
Biochar serves as an effective adsorbent for the heavy metal cadmium, with its performance significantly influenced by its physicochemical properties and various environmental features. Traditional machine learning models, though adept at managing complex multi-feature relationships, rely heavily on expertise in feature engineering and hyperparameter optimization. To address these issues, this study employs an automated machine learning (AutoML) approach, automating feature selection and model optimization, coupled with an intuitive online graphical user interface, enhancing accessibility and generalizability. Comparative analysis of four AutoML frameworks (TPOT, FLAML, AutoGluon, H2O AutoML) demonstrated that H2O AutoML achieved the highest prediction accuracy (R2 = 0.918). Key features influencing adsorption performance were identified as initial cadmium concentration (23%), stirring rate (14.7%), and the biochar H/C ratio (9.7%). Additionally, the maximum adsorption capacity of the biochar was determined to be 105 mg/g. Optimal production conditions for biochar were determined to be a pyrolysis temperature of 570–800 °C, a residence time of ≥2 h, and a heating rate of 3–10 °C/min to achieve an H/C ratio of <0.2. An online graphical user interface was developed to facilitate user interaction with the model. This study not only provides practical guidelines for optimizing biochar but also introduces a novel approach to modeling using AutoML. Full article
Show Figures

Figure 1

45 pages, 12653 KB  
Article
Mastery, Modality, and Tsotsil Coexpressivity
by John B. Haviland
Languages 2025, 10(7), 169; https://doi.org/10.3390/languages10070169 - 15 Jul 2025
Viewed by 1752
Abstract
“Coexpressivity” is the property of utterances that marshal multiple linguistic elements and modalities simultaneously to perform the distinct linguistic functions of Jakobson’s classic analysis (1960). This study draws on a longitudinal corpus of natural conversation recorded over six decades with an accomplished “master [...] Read more.
“Coexpressivity” is the property of utterances that marshal multiple linguistic elements and modalities simultaneously to perform the distinct linguistic functions of Jakobson’s classic analysis (1960). This study draws on a longitudinal corpus of natural conversation recorded over six decades with an accomplished “master speaker” of Tsotsil (Mayan), adept at using his language to manage different aspects of social life. The research aims to elaborate the notion of coexpressivity through detailed examples drawn from a range of circumstances. It begins with codified emic speech genres linked to prayer and formal declamation and then ranges through conversational narratives to gossip-laden multiparty interaction, to emphasize coexpressive connections between speech as text and concurrent gesture, gaze, and posture among interlocutors; audible modalities such as sound symbolism, pitch, and speech rate; and finally, specific morphological characteristics and the multifunctional effects of lexical choices themselves. The study thus explores how multiple functions may, in principle, be coexpressed simultaneously or contemporaneously in individual utterances if one takes this range of modalities and expressive resources into account. The notion of “master speaker” relates to coexpressive virtuosity by linking the resources available in speech, body, and interactive environments to accomplishing a wide range of social ends, perhaps with a special flourish although not excluded from humbler, plainer talk. Full article
Show Figures

Figure 1

18 pages, 1199 KB  
Article
Adaptive, Privacy-Enhanced Real-Time Fraud Detection in Banking Networks Through Federated Learning and VAE-QLSTM Fusion
by Hanae Abbassi, Saida El Mendili and Youssef Gahi
Big Data Cogn. Comput. 2025, 9(7), 185; https://doi.org/10.3390/bdcc9070185 - 9 Jul 2025
Cited by 1 | Viewed by 1972
Abstract
Increased digital banking operations have brought about a surge in suspicious activities, necessitating heightened real-time fraud detection systems. Conversely, traditional static approaches encounter challenges in maintaining privacy while adapting to new fraudulent trends. In this paper, we provide a unique approach to tackling [...] Read more.
Increased digital banking operations have brought about a surge in suspicious activities, necessitating heightened real-time fraud detection systems. Conversely, traditional static approaches encounter challenges in maintaining privacy while adapting to new fraudulent trends. In this paper, we provide a unique approach to tackling those challenges by integrating VAE-QLSTM with Federated Learning (FL) in a semi-decentralized architecture, maintaining privacy alongside adapting to emerging malicious behaviors. The suggested architecture builds on the adeptness of VAE-QLSTM to capture meaningful representations of transactions, serving in abnormality detection. On the other hand, QLSTM combines quantum computational capability with temporal sequence modeling, seeking to give a rapid and scalable method for real-time malignancy detection. The designed approach was set up through TensorFlow Federated on two real-world datasets—notably IEEE-CIS and European cardholders—outperforming current strategies in terms of accuracy and sensitivity, achieving 94.5% and 91.3%, respectively. This proves the potential of merging VAE-QLSTM with FL to address fraud detection difficulties, ensuring privacy and scalability in advanced banking networks. Full article
Show Figures

Figure 1

44 pages, 3494 KB  
Review
Cancer Stem Cells Connecting to Immunotherapy: Key Insights, Challenges, and Potential Treatment Opportunities
by Sivapar V. Mathan and Rana P. Singh
Cancers 2025, 17(13), 2100; https://doi.org/10.3390/cancers17132100 - 23 Jun 2025
Cited by 2 | Viewed by 2911
Abstract
Cancer continues to pose a significant challenge to global health, resulting in millions of deaths annually despite advancements in treatments like surgery, chemotherapy, and radiotherapy. A key factor complicating successful outcomes is the presence of cancer stem cells (CSCs), which possess distinctive features [...] Read more.
Cancer continues to pose a significant challenge to global health, resulting in millions of deaths annually despite advancements in treatments like surgery, chemotherapy, and radiotherapy. A key factor complicating successful outcomes is the presence of cancer stem cells (CSCs), which possess distinctive features that facilitate tumor initiation and progression as well as resistance to therapies. These cells are adept at evading conventional treatments and can hinder the effectiveness of immunotherapy, often manipulating the tumor microenvironment to suppress immune responses. This review delves into the complex interplay between CSCs and immune cells, emphasizing their contributions to tumor heterogeneity and therapeutic resistance. By investigating the CSC niche in which these cells thrive and their complex interactions with the immune system, we aim to reveal new therapeutic avenues that could enhance patient outcomes and minimize the risk of recurrence. CSCs are characterized by remarkable self-renewal and plasticity, allowing them to transition between stem-like and differentiated states in response to various stimuli. Their existence within the CSC niche confers immune protection and maintains stem-like properties while promoting immune evasion. Activating key signaling pathways and specific surface markers is crucial in developing CSC traits, pointing to potential strategies for effective tumor eradication. Conventional therapies often fail to eliminate CSCs, which can lead to tumor recurrence. Therefore, innovative immunotherapeutic strategies such as dendritic cell vaccines (DC vaccines), chimeric antigen receptor (CAR) engineered T cells, and immune checkpoint inhibitors (ICIs) are under examination. This review sheds light on CSC’s roles across different malignancies, highlighting the necessity for innovative targeted approaches in cancer treatment. Full article
(This article belongs to the Section Molecular Cancer Biology)
Show Figures

Figure 1

20 pages, 476 KB  
Article
The Recovery of Lu Xiujing’s Daughter: Family Ethics in Daoxue Zhuan 道學傳
by Mianheng Liu
Religions 2025, 16(6), 790; https://doi.org/10.3390/rel16060790 - 17 Jun 2025
Viewed by 824
Abstract
This paper re-examines the story of Lu Xiujing’s 陆修静 (406–477) abandonment of his ailing daughter, as recorded in Daoxue zhuan 道學傳 (Biographies of the Adepts of the Dao, hereafter DXZ), to challenge prevailing scholarly interpretations of this story that emphasize Daoist familial [...] Read more.
This paper re-examines the story of Lu Xiujing’s 陆修静 (406–477) abandonment of his ailing daughter, as recorded in Daoxue zhuan 道學傳 (Biographies of the Adepts of the Dao, hereafter DXZ), to challenge prevailing scholarly interpretations of this story that emphasize Daoist familial renunciation as a Buddhist-influenced complete rejection of Confucian ethics. Through close analysis of biographies in DXZ, Lu’s own writings, and the compiler Ma Shu’s 馬樞 (522–581) life, the study criticizes the habitual thinking of scholars that overemphasizes the tendency of early medieval Chinese Daoism to leave home, and argues that DXZ takes the protagonists in the biographies as models to convey the ethical concept of striving to reconcile the Daoist concept of leaving home to pursue religion aim with the family harmony advocated by traditional Confucianism, and it offers some feasible ideas for resolving the Confucian–Daoist ethical tensions. Ma Shu’s biographical strategy, reflecting his own Confucian-educated background engaged with Daoist belief, positions Lu as an exemplar of this balance. By contextualizing these accounts within social realities and compiler intentionality, the study advances a revised understanding of early medieval Daoist ethics, that is, an effort to pursue the harmonious coexistence of religious pursuits and family care. Full article
Back to TopTop