-
81
Study of kinematics of spatial 5R mechanism with 4 cyclic motion
Published 2022-04-01Subjects: Get full text
Article -
82
-
83
Voir les fantômes. Sentir la multiplicité temporelle de la ville grâce aux œuvres d’art
Published 2017-10-01Subjects: “…ghosts…”
Get full text
Article -
84
The Narrative Structure of Amy Tan’s ‘The Bonesetter’s Daughter’: Myth as a Critical Element
Published 2015-04-01Subjects: Get full text
Article -
85
Padding-enabled real-time high-fidelity temporal single pixel imaging
Published 2025-01-01Subjects: Get full text
Article -
86
Media, Materiality and Memory : grounding the groove /
Published 2015Table of Contents: “…Music, material culture and archaeologies -- Sarah Records (1987-1995) and the everyday -- Ghost Box Records (2004-) : materiality, technological mediation and the birth of ghosts -- From collecting to curating and reissuing the recorded past : Finders Keepers (2004-) and reissue record labels -- Youtube archivists, e-collectors and digital flâneurs : the internet and the future of phonography -- Conclusion. …”
View in OPAC
Book -
87
Breast mass lesion area detection method based on an improved YOLOv8 model
Published 2024-10-01“…The YOLOv8-GHOST model incorporates GHOSTConv and C3GHOST modules into the original YOLOv8 model to capture richer feature information while using only 57% of the number of parameters required by the original model. …”
Get full text
Article -
88
Living-with Shakespeare?
Published 2010-10-01“…Rereading Bloom’s considerations on Shakespeare in The Anxiety of Influence and comparing them with Jacques Derrida’s Specters of Marx, this article shows that rather than thinking of Shakespeare as a cursing ghost, Harryette Mullen’s, Stephen Ratcliffe’s and Jen Bervin’s texts reveal Shakespeare as a ghost and a host. …”
Get full text
Article -
89
GreyFan:a network attack framework using Wi-Fi covert channel
Published 2019-09-01“…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
Get full text
Article -
90
Le revenant dans l’œuvre de Toni Morrison : ou le corps hanté de la mémoire
Published 2016-06-01“…By fear and distress, one disguised way to build memory and root out old past ghosts, because more than living ones, chained up to their secrets, ghosts have so much things to say, that their simple apparition can shout. …”
Get full text
Article -
91
A Night at the Pictures : A Christmas Carol et la séduction du simulacra
Published 2006-12-01“…But A Christmas Carol, as a ghost story, unashamedly belongs to the popular tradition of romance, a genre known to foster pathos and lull the reader into an intellectual slumber through exotic images of far-away lands and heroic adventures. …”
Get full text
Article -
92
Monstrous to our human reason. The empty grave of the Winter’s tale
Published 2011-12-01“…Earlier Antigonus indeed described the ‘queen’s ghost’ with eyes like ‘two spouts’, as ‘with shrieks / She melted into air’. …”
Get full text
Article -
93
Feature enhancement and bilinear feature vector fusion for text detection of mobile industrial containers
Published 2022-07-01“…In the real factory environment, due to factors such as dim light, irregular text, and limited equipment, text detection becomes a challenging task.Aiming at this problem, a feature vector fusion module based on bilinear operation was designed and combined with feature enhancement and semi-convolution to form a lightweight text detection network RGFFD (ResNet18 + Ghost Module + FPEM(feature pyramid enhancement module)) + FFM(feature fusion module) + DB (differentiable binarization)).Among them, the Ghost module was embedded with a feature enhancement module to improve the feature extraction capability, the bilinear feature vector fusion module fused multi-scale information, and an adaptive threshold segmentation algorithm was added to improve the segmentation capability of the DB module.In the real industrial environment, the RGFFD detection speed reached 6.5 f/s, when using the embedded device UP2 board for text detection of container numbers.At the same time, the detection speed on the public datasets ICDAR2015 and Total-text reached 39.6 f/s and 49.6 f/s, respectively.The accuracy rate on the custom dataset reached 88.9%, and the detection speed was 30.7 f/s.…”
Get full text
Article -
94
Experimental assessment of damage and microplastic release during cyclic loading of clear aligners.
Published 2025-01-01“…Three different aligners (Essix Ace, Ghost Aligner and Invisalign) are tested to simulate swallowing conditions over the aligner usage period. …”
Get full text
Article -
95
Unveiling chemical industry secrets: Insights gleaned from scientific literatures that examine internal chemical corporate documents-A scoping review.
Published 2025-01-01“…Results were categorized and analyzed using Marc-Andre Gagnon and Sergio Sismondo's ghost management framework.<h4>Results</h4>The final results included and analyzed 18 scientific papers. …”
Get full text
Article -
96
Research on the lightweight detection method of rail internal damage based on improved YOLOv8
Published 2025-01-01“…Abstract To address the challenges of high computational costs, large storage demands, and low detection accuracy in internal rail damage identification, we propose a lightweight detection model, GhostMicroNet-YOLOv8n, as an enhancement of YOLOv8n. …”
Get full text
Article -
97
Comparative evaluation of calretinin immunohistochemical expression in calcifying odontogenic cyst and ameloblastoma
Published 2025-01-01“…Conclusions it is concluded that calretinin does not play a role in the pathogenesis and histogenesis of COC epithelium, but since ghost cells are caused by a degenerative process, the possibility of involving calretinin as an apoptotic factor in the formation of these cells is supported.…”
Get full text
Article -
98
СИСТЕМА ЛЕЙТМОТИВОВ В СБОРНИКЕ ИОСИФА БРОДСКОГО НОВЫЕ СТАНСЫ К АВГУСТЕ
Published 2018-10-01“…Deep analysis of recurring poetic image, such as ghost, the motif of light and shadow, and most of all the motif of time, reveals the complicated web of interrelations and the evolution of “common places”. …”
Get full text
Article -
99
Awareness, usage and perceptions of authorship guidelines: an international survey of biomedical authors
Published 2020-09-01“…However, 2859 respondents (74%) reported that they had been involved in a study at least once where someone was added as an author who had not contributed substantially (honorary authorship), and 1305 (34%) where someone was not listed as an author but had contributed substantially (ghost authorship). Only 740 (19%) reported that they had never experienced either honorary or ghost authorship; 1115 (29%) reported that they had experienced both at least once. …”
Get full text
Article -
100
Pest Ants
Published 1997-02-01“…It covers species such as the acrobat ant, Argentine ant, bigheaded ant, crazy ant, Florida carpenter ant, ghost ant, imported fire ant, little fire ant, native fire ant, pharaoh ant, and white-footed ant. …”
Get full text
Article