Showing 25,161 - 25,180 results of 28,739 for search '"computer"', query time: 0.11s Refine Results
  1. 25161

    Resting state BOLD-perfusion coupling patterns using multiband multi-echo pseudo-continuous arterial spin label imaging by Alexander D. Cohen, Stefano Moia, G. Bruce Pike, César Caballero-Gaudes, Yang Wang

    Published 2025-01-01
    “…The variability, reproducibility, and reliability of the metrics were also computed in a multi-session subgroup. Areas of higher coupling were observed in the visual, motor, parietal, and frontal cortices and corresponded to major brain networks. …”
    Get full text
    Article
  2. 25162

    Improving Industrial Quality Control: A Transfer Learning Approach to Surface Defect Detection by Ângela Semitela, Miguel Pereira, António Completo, Nuno Lau, José P. Santos

    Published 2025-01-01
    “…The results revealed that the two illumination modes employed widened the type of defects that could be identified with this system, while maintaining its lower computational complexity by performing multi-modal fusion at the decision level. …”
    Get full text
    Article
  3. 25163

    A high-valence bismuth(V) nanoplatform triggers cancer cell death and anti-tumor immune responses with exogenous excitation-free endogenous H2O2- and O2-independent ROS generation by Yizhang Tang, Xujiang Yu, Liangrui He, Meng Tang, Wenji Yue, Ruitong Chen, Jie Zhao, Qi Pan, Wanwan Li

    Published 2025-01-01
    “…NaBiVO3-PEG intravenously administered can efficiently accumulate at the tumor site for further real-time computed tomography monitoring, immunotherapy, or alternative synergistic immune-radiotherapy. …”
    Get full text
    Article
  4. 25164

    An adaptive NMPC for ROVs trajectory tracking with environmental disturbances and model uncertainties by Yi Zhang, Jianing Zhang, Zhiyang Guo, Lei Zhang, Yuchen Shang

    Published 2025-01-01
    “…Control increments are computed as inputs to this nonlinear optimization problem. …”
    Get full text
    Article
  5. 25165

    Evolution of the Web: from Web 1.0 to 4.0 by Asaad Khaleel Ibrahim

    Published 2021-06-01
    “…Big data, augmented reality, machine-to-machine communication (M2M), cloud computing, and artificial intelligence (AI) technologies, as well as smart agents, will be able to integrate in the future years. …”
    Get full text
    Article
  6. 25166

    The framing of the Belt and Road Initiative in Indo-Pakistani media by Jianxun Chu, Zameer Hassan, Syed Muhammad Sikandar

    Published 2025-01-01
    “…The present study aimed to examine the representation of the BRI in Indo-Pakistani newspapers, specifically the Daily Dawn Pakistan and the Times of India, by employing computational framing analysis. A total of 2081 news reports from the Daily Dawn and 587 news reports from The Times of India were collected using the Lexis Advance database between March 23, 2013, and December 1, 2019. …”
    Get full text
    Article
  7. 25167

    Crack propagation and CT imaging of internal cracks in rocks damaged by pre-compression under explosive loading by Qiangqiang Zheng, Pingfeng Li, Ying Xu, Bing Cheng, Hao Hu, Hao Shi, Shoudong Xie

    Published 2025-03-01
    “…Innovatively, multi-level cyclic static pre-compression is applied to simulate the random damage distribution in engineering-scale rocks, combined with high-resolution computed tomography (CT) imaging to achieve non-destructive 3D visualization of internal crack morphologies under explosive loading. …”
    Get full text
    Article
  8. 25168

    Numerical Simulation of Interaction between Large-Scale Congestion and Vent during the Natural Gas Explosion in a Kitchen by Lei Pang, Mengjie Jin, Qianran Hu, Kai Yang

    Published 2021-01-01
    “…The influence of large-scale congestion on a confined natural gas explosion in a typical Chinese kitchen was studied using the computational fluid dynamics technology. It was found that opening the explosion venting surface promotes the development of turbulence, flame propagation velocity, and multipeak overpressure in the explosion flow field. …”
    Get full text
    Article
  9. 25169

    Minimally Invasive Technique for PMMA Augmentation of Fenestrated Screws by Jan-Helge Klingler, Christoph Scholz, Evangelos Kogias, Ronen Sircar, Marie T. Krüger, Florian Volz, Christian Scheiwe, Ulrich Hubbe

    Published 2015-01-01
    “…Retrospective evaluation of cement extravasation and screw loosening was carried out in postoperative plain radiographs and thin-sliced triplanar computed tomography scans. Results. Twenty-seven, largely prevertebral cement extravasations were detected in 157 screws (17.2%). …”
    Get full text
    Article
  10. 25170
  11. 25171

    Primary Intimal (Spindle Cell) Sarcoma of the Heart: A Case Report and Review of the Literature by A. Ibrahim, A. Luk, P. Singhal, Bo Wan, A. Zavodni, R. J. Cusimano, J. Butany

    Published 2013-01-01
    “…Subsequent abdominal computed tomography (CT) scan revealed an abdominal wall mass and intracardiac lesion; the cardiac mass was further characterized by transesophageal echo (TEE), magnetic resonance imaging (MRI), and dedicated cardiac CT. …”
    Get full text
    Article
  12. 25172

    Experimental Biomechanics of Neonatal Brachial Plexus Avulsion Injuries Using a Piglet Model by Anita Singh, Kalyani Ghuge, Yashvy Patni, Sriram Balasubramanian

    Published 2025-01-01
    “…Conclusion: The obtained data are required to understand the avulsion injury biomechanics and provide the necessary experimental data for computational model development that serves as an ideal surrogate for understanding complicated birthing injuries in newborns.…”
    Get full text
    Article
  13. 25173

    First principle investigation of Cr doping effect on the stability of NiFe2O4 by Tianhao Rui, Yulin Lan, Congyi Li, Haibin Zhang, Xiaojing Liu

    Published 2025-01-01
    “…In this work, density functional theory was utilized to compute the effect of Cr doping on electronic structures of NiFe2O4. …”
    Get full text
    Article
  14. 25174

    A framework for understanding the path to achieve high resilience of maritime supply chain by Xiuqian Chen, Liangyong Chu, Mengyao Wang, Qion Chen

    Published 2025-01-01
    “…The paper proposes a methodological framework based on the structural equation model (SEM), Necessary Condition Analysis (NCA), fuzzy set qualitative comparative analysis (fsQCA), and utilizes questionnaire data from the maritime industry in China to evaluate the resilience in MSC. The computational results indicate that: (1) The high resilience of MSC is the result of the synergistic interaction among multiple factors, and these factors boost MSC resilience through diverse paths; (2) There are four pathways for high MSC resilience: the ‘collaboration + carbon reduction + digitization’ path, the ‘early warning + collaboration’ path, the ‘agility + early warning’ path, and the ‘carbon reduction’ path; (3) Digitization level can play a catalytic role in increasing the resilience of MSC by helping other factors. …”
    Get full text
    Article
  15. 25175

    Abdominal Cocoon Syndrome: Two Cases of an Anatomical Abnormality by Apostolos Sovatzidis, Eirini Nikolaidou, Anastasios Katsourakis, Iosif Chatzis, George Noussios

    Published 2019-01-01
    “…Neither of these patients had any previous operations. The computed tomography scan of the first patient showed considerable distension of the small bowel, suggestive of internal herniation. …”
    Get full text
    Article
  16. 25176

    Function approximation method based on weights gradient descent in reinforcement learning by Xiaoyan QIN, Yuhan LIU, Yunlong XU, Bin LI

    Published 2023-08-01
    “…Function approximation has gained significant attention in reinforcement learning research as it effectively addresses problems with large-scale, continuous state, and action space.Although the function approximation algorithm based on gradient descent method is one of the most widely used methods in reinforcement learning, it requires careful tuning of the step size parameter as an inappropriate value can lead to slow convergence, unstable convergence, or even divergence.To address these issues, an improvement was made around the temporal-difference (TD) algorithm based on function approximation.The weight update method was enhanced using both the least squares method and gradient descent, resulting in the proposed weights gradient descent (WGD) method.The least squares were used to calculate the weights, combining the ideas of TD and gradient descent to find the error between the weights.And this error was used to directly update the weights.By this method, the weights were updated in a new manner, effectively reducing the consumption of computing resources by the algorithm enhancing other gradient descent-based function approximation algorithms.The WGD method is widely applicable in various gradient descent-based reinforcement learning algorithms.The results show that WGD method can adjust parameters within a wider space, effectively reducing the possibility of algorithm divergence.Additionally, it achieves better performance while improving the convergence speed of the algorithm.…”
    Get full text
    Article
  17. 25177

    Comparison of Weighted Lag Adaptive LASSO with Autometrics for Covariate Selection and Forecasting Using Time-Series Data by Sara Muhammadullah, Amena Urooj, Faridoon Khan, Mohammed N Alshahrani, Mohammed Alqawba, Sanaa Al-Marzouki

    Published 2022-01-01
    “…The simulation experiment indicates that, compared to Autometrics and other regularization approaches, the WLAdaLASSO outperforms the others in covariate selection and forecasting, especially when there is a greater linear dependency between predictors. In contrast, the computational efficiency of Autometrics decreases with a strong linear dependency between predictors. …”
    Get full text
    Article
  18. 25178

    Using side-channel and quantization vulnerability to recover DNN weights by Jinghai LI, Ming TANG, Chengxuan HUANG

    Published 2021-08-01
    “…Model extraction attack focuses on reverse engineering architecture and weights of DNN model deployed in edge.Model extraction attack is a basic security problem in AI security, it underlies advanced attacks as data provider, such as adversarial sample and data poisoning.A novel method named Cluster-based SCA was proposed,this method did not need leakage model.Cluster-based SCA was based on vulnerability of quantized inference.There exist a phenomenon in multiplication operation in quantized inference, which the output of different weights were not equivalent in respect of classification.It can be used to distinguish different weights.The proposed method computed output activations of each DNN layer with guessing weight.Then acquired side channel signal were classified into different class, the taxonomy was corresponding output activations' value.Average dispersion of all classes <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mover accent="true"> <mi>σ</mi> <mo>¯</mo> </mover> </math></inline-formula> was used to decide whether guess was right.The effectiveness of Cluster-based SCA method was verified by simulation experiment and HW model was used as target leakage model.For all weights from first convolution layer of target CNN model, TOP2 recovery rate was 52.66%.And for large weights in significant interval,TOP2 recover rate was 100%.…”
    Get full text
    Article
  19. 25179

    Dynamic Characteristics Analysis of 3D Blade Tip Clearance for Turbine Blades with Typical Cracks by Xiaodong Zhang, Yiwei Xiong, Xin Huang, Bochao Fan, Zhen Zhao, Jiahao Zhu

    Published 2022-01-01
    “…Then, a novel dynamic computation method is proposed to calculate the 3D-BTC based on the blade deformation. …”
    Get full text
    Article
  20. 25180

    Robust H-Infinity Filter and PSO-SVM Based Monitoring of Power Quality Disturbances System by Prakash K. Ray, Harish Kumar Sahoo, Asit Mohanty, Javed Khan Bhutto, Abdulwasa Bakr Barnawi, Abdulmjeed Ali Alshaya

    Published 2024-01-01
    “…Twelve different statistical features are extracted by passing the disturbances through robust H-infinity filter in order to minimize the data size and computational complexities. The statistical properties of PQ disturbances are initially categorized using the Fast Generalized Fuzzy-C means (FGFCM) clustering approach. …”
    Get full text
    Article