Showing 81 - 100 results of 209 for search '"Ghost"', query time: 0.04s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85
  6. 86

    Media, Materiality and Memory : grounding the groove / by Roy, Elodie A.

    Published 2015
    Table of Contents: “…Music, material culture and archaeologies -- Sarah Records (1987-1995) and the everyday -- Ghost Box Records (2004-) : materiality, technological mediation and the birth of ghosts -- From collecting to curating and reissuing the recorded past : Finders Keepers (2004-) and reissue record labels -- Youtube archivists, e-collectors and digital flâneurs : the internet and the future of phonography -- Conclusion. …”
    View in OPAC
    Book
  7. 87

    Breast mass lesion area detection method based on an improved YOLOv8 model by Yihua Lan, Yingjie Lv, Jiashu Xu, Yingqi Zhang, Yanhong Zhang

    Published 2024-10-01
    “…The YOLOv8-GHOST model incorporates GHOSTConv and C3GHOST modules into the original YOLOv8 model to capture richer feature information while using only 57% of the number of parameters required by the original model. …”
    Get full text
    Article
  8. 88

    Living-with Shakespeare? by Vincent Broqua

    Published 2010-10-01
    “…Rereading Bloom’s considerations on Shakespeare in The Anxiety of Influence and comparing them with Jacques Derrida’s Specters of Marx, this article shows that rather than thinking of Shakespeare as a cursing ghost, Harryette Mullen’s, Stephen Ratcliffe’s and Jen Bervin’s texts reveal Shakespeare as a ghost and a host. …”
    Get full text
    Article
  9. 89

    GreyFan:a network attack framework using Wi-Fi covert channel by Dongjie MA, Chengqiang JIN, ·uan CHEN, Tieming CHEN

    Published 2019-09-01
    “…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
    Get full text
    Article
  10. 90

    Le revenant dans l’œuvre de Toni Morrison : ou le corps hanté de la mémoire by Vanessa Sylvanise

    Published 2016-06-01
    “…By fear and distress, one disguised way to build memory and root out old past ghosts, because more than living ones, chained up to their secrets, ghosts have so much things to say, that their simple apparition can shout. …”
    Get full text
    Article
  11. 91

    A Night at the Pictures : A Christmas Carol et la séduction du simulacra by Florent Christol

    Published 2006-12-01
    “…But A Christmas Carol, as a ghost story, unashamedly belongs to the popular tradition of romance, a genre known to foster pathos and lull the reader into an intellectual slumber through exotic images of far-away lands and heroic adventures. …”
    Get full text
    Article
  12. 92

    Monstrous to our human reason. The empty grave of the Winter’s tale by Richard Wilson

    Published 2011-12-01
    “…Earlier Antigonus indeed described the ‘queen’s ghost’ with eyes like ‘two spouts’, as ‘with shrieks / She melted into air’. …”
    Get full text
    Article
  13. 93

    Feature enhancement and bilinear feature vector fusion for text detection of mobile industrial containers by Haiyang HU, Zepin LI, Zhongjin LI

    Published 2022-07-01
    “…In the real factory environment, due to factors such as dim light, irregular text, and limited equipment, text detection becomes a challenging task.Aiming at this problem, a feature vector fusion module based on bilinear operation was designed and combined with feature enhancement and semi-convolution to form a lightweight text detection network RGFFD (ResNet18 + Ghost Module + FPEM(feature pyramid enhancement module)) + FFM(feature fusion module) + DB (differentiable binarization)).Among them, the Ghost module was embedded with a feature enhancement module to improve the feature extraction capability, the bilinear feature vector fusion module fused multi-scale information, and an adaptive threshold segmentation algorithm was added to improve the segmentation capability of the DB module.In the real industrial environment, the RGFFD detection speed reached 6.5 f/s, when using the embedded device UP2 board for text detection of container numbers.At the same time, the detection speed on the public datasets ICDAR2015 and Total-text reached 39.6 f/s and 49.6 f/s, respectively.The accuracy rate on the custom dataset reached 88.9%, and the detection speed was 30.7 f/s.…”
    Get full text
    Article
  14. 94

    Experimental assessment of damage and microplastic release during cyclic loading of clear aligners. by Claudia Barile, Claudia Cianci, Vimalathithan Paramsamy Kannan, Giovanni Pappalettera, Carmine Pappalettere, Caterina Casavola, Michele Laurenziello, Domenico Ciavarella

    Published 2025-01-01
    “…Three different aligners (Essix Ace, Ghost Aligner and Invisalign) are tested to simulate swallowing conditions over the aligner usage period. …”
    Get full text
    Article
  15. 95

    Unveiling chemical industry secrets: Insights gleaned from scientific literatures that examine internal chemical corporate documents-A scoping review. by Miaoran Dong, Marc-André Gagnon

    Published 2025-01-01
    “…Results were categorized and analyzed using Marc-Andre Gagnon and Sergio Sismondo's ghost management framework.<h4>Results</h4>The final results included and analyzed 18 scientific papers. …”
    Get full text
    Article
  16. 96

    Research on the lightweight detection method of rail internal damage based on improved YOLOv8 by Xiaochun Wu, Shuzhan Yu

    Published 2025-01-01
    “…Abstract To address the challenges of high computational costs, large storage demands, and low detection accuracy in internal rail damage identification, we propose a lightweight detection model, GhostMicroNet-YOLOv8n, as an enhancement of YOLOv8n. …”
    Get full text
    Article
  17. 97

    Comparative evaluation of calretinin immunohistochemical expression in calcifying odontogenic cyst and ameloblastoma by Maryam Mahdizadeh, Nazanin Mahdavi, Ali Bijani, Fatima Bijani

    Published 2025-01-01
    “…Conclusions it is concluded that calretinin does not play a role in the pathogenesis and histogenesis of COC epithelium, but since ghost cells are caused by a degenerative process, the possibility of involving calretinin as an apoptotic factor in the formation of these cells is supported.…”
    Get full text
    Article
  18. 98

    СИСТЕМА ЛЕЙТМОТИВОВ В СБОРНИКЕ ИОСИФА БРОДСКОГО НОВЫЕ СТАНСЫ К АВГУСТЕ by СНЕЖАНА КРЫЛОВА

    Published 2018-10-01
    “…Deep analysis of recurring poetic image, such as ghost, the motif of light and shadow, and most of all the motif of time, reveals the complicated web of interrelations and the evolution of “common places”. …”
    Get full text
    Article
  19. 99

    Awareness, usage and perceptions of authorship guidelines: an international survey of biomedical authors by Sara Schroter, Tobias Kurth, Ilaria Montagni, M Eikermann, Elke Schäffner

    Published 2020-09-01
    “…However, 2859 respondents (74%) reported that they had been involved in a study at least once where someone was added as an author who had not contributed substantially (honorary authorship), and 1305 (34%) where someone was not listed as an author but had contributed substantially (ghost authorship). Only 740 (19%) reported that they had never experienced either honorary or ghost authorship; 1115 (29%) reported that they had experienced both at least once. …”
    Get full text
    Article
  20. 100

    Pest Ants by P.G. Koehler, R.M. Pereira, J.L. Castner

    Published 1997-02-01
    “…It covers species such as the acrobat ant, Argentine ant, bigheaded ant, crazy ant, Florida carpenter ant, ghost ant, imported fire ant, little fire ant, native fire ant, pharaoh ant, and white-footed ant. …”
    Get full text
    Article