Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
25161
Resting state BOLD-perfusion coupling patterns using multiband multi-echo pseudo-continuous arterial spin label imaging
Published 2025-01-01“…The variability, reproducibility, and reliability of the metrics were also computed in a multi-session subgroup. Areas of higher coupling were observed in the visual, motor, parietal, and frontal cortices and corresponded to major brain networks. …”
Get full text
Article -
25162
Improving Industrial Quality Control: A Transfer Learning Approach to Surface Defect Detection
Published 2025-01-01“…The results revealed that the two illumination modes employed widened the type of defects that could be identified with this system, while maintaining its lower computational complexity by performing multi-modal fusion at the decision level. …”
Get full text
Article -
25163
A high-valence bismuth(V) nanoplatform triggers cancer cell death and anti-tumor immune responses with exogenous excitation-free endogenous H2O2- and O2-independent ROS generation
Published 2025-01-01“…NaBiVO3-PEG intravenously administered can efficiently accumulate at the tumor site for further real-time computed tomography monitoring, immunotherapy, or alternative synergistic immune-radiotherapy. …”
Get full text
Article -
25164
An adaptive NMPC for ROVs trajectory tracking with environmental disturbances and model uncertainties
Published 2025-01-01“…Control increments are computed as inputs to this nonlinear optimization problem. …”
Get full text
Article -
25165
Evolution of the Web: from Web 1.0 to 4.0
Published 2021-06-01“…Big data, augmented reality, machine-to-machine communication (M2M), cloud computing, and artificial intelligence (AI) technologies, as well as smart agents, will be able to integrate in the future years. …”
Get full text
Article -
25166
The framing of the Belt and Road Initiative in Indo-Pakistani media
Published 2025-01-01“…The present study aimed to examine the representation of the BRI in Indo-Pakistani newspapers, specifically the Daily Dawn Pakistan and the Times of India, by employing computational framing analysis. A total of 2081 news reports from the Daily Dawn and 587 news reports from The Times of India were collected using the Lexis Advance database between March 23, 2013, and December 1, 2019. …”
Get full text
Article -
25167
Crack propagation and CT imaging of internal cracks in rocks damaged by pre-compression under explosive loading
Published 2025-03-01“…Innovatively, multi-level cyclic static pre-compression is applied to simulate the random damage distribution in engineering-scale rocks, combined with high-resolution computed tomography (CT) imaging to achieve non-destructive 3D visualization of internal crack morphologies under explosive loading. …”
Get full text
Article -
25168
Numerical Simulation of Interaction between Large-Scale Congestion and Vent during the Natural Gas Explosion in a Kitchen
Published 2021-01-01“…The influence of large-scale congestion on a confined natural gas explosion in a typical Chinese kitchen was studied using the computational fluid dynamics technology. It was found that opening the explosion venting surface promotes the development of turbulence, flame propagation velocity, and multipeak overpressure in the explosion flow field. …”
Get full text
Article -
25169
Minimally Invasive Technique for PMMA Augmentation of Fenestrated Screws
Published 2015-01-01“…Retrospective evaluation of cement extravasation and screw loosening was carried out in postoperative plain radiographs and thin-sliced triplanar computed tomography scans. Results. Twenty-seven, largely prevertebral cement extravasations were detected in 157 screws (17.2%). …”
Get full text
Article -
25170
Time to Exhale: Additional Value of Expiratory Chest CT in Chronic Obstructive Pulmonary Disease
Published 2018-01-01“…Until now, inspiratory chest computed tomography (CT) has been considered as the preferred imaging method in these patients. …”
Get full text
Article -
25171
Primary Intimal (Spindle Cell) Sarcoma of the Heart: A Case Report and Review of the Literature
Published 2013-01-01“…Subsequent abdominal computed tomography (CT) scan revealed an abdominal wall mass and intracardiac lesion; the cardiac mass was further characterized by transesophageal echo (TEE), magnetic resonance imaging (MRI), and dedicated cardiac CT. …”
Get full text
Article -
25172
Experimental Biomechanics of Neonatal Brachial Plexus Avulsion Injuries Using a Piglet Model
Published 2025-01-01“…Conclusion: The obtained data are required to understand the avulsion injury biomechanics and provide the necessary experimental data for computational model development that serves as an ideal surrogate for understanding complicated birthing injuries in newborns.…”
Get full text
Article -
25173
First principle investigation of Cr doping effect on the stability of NiFe2O4
Published 2025-01-01“…In this work, density functional theory was utilized to compute the effect of Cr doping on electronic structures of NiFe2O4. …”
Get full text
Article -
25174
A framework for understanding the path to achieve high resilience of maritime supply chain
Published 2025-01-01“…The paper proposes a methodological framework based on the structural equation model (SEM), Necessary Condition Analysis (NCA), fuzzy set qualitative comparative analysis (fsQCA), and utilizes questionnaire data from the maritime industry in China to evaluate the resilience in MSC. The computational results indicate that: (1) The high resilience of MSC is the result of the synergistic interaction among multiple factors, and these factors boost MSC resilience through diverse paths; (2) There are four pathways for high MSC resilience: the ‘collaboration + carbon reduction + digitization’ path, the ‘early warning + collaboration’ path, the ‘agility + early warning’ path, and the ‘carbon reduction’ path; (3) Digitization level can play a catalytic role in increasing the resilience of MSC by helping other factors. …”
Get full text
Article -
25175
Abdominal Cocoon Syndrome: Two Cases of an Anatomical Abnormality
Published 2019-01-01“…Neither of these patients had any previous operations. The computed tomography scan of the first patient showed considerable distension of the small bowel, suggestive of internal herniation. …”
Get full text
Article -
25176
Function approximation method based on weights gradient descent in reinforcement learning
Published 2023-08-01“…Function approximation has gained significant attention in reinforcement learning research as it effectively addresses problems with large-scale, continuous state, and action space.Although the function approximation algorithm based on gradient descent method is one of the most widely used methods in reinforcement learning, it requires careful tuning of the step size parameter as an inappropriate value can lead to slow convergence, unstable convergence, or even divergence.To address these issues, an improvement was made around the temporal-difference (TD) algorithm based on function approximation.The weight update method was enhanced using both the least squares method and gradient descent, resulting in the proposed weights gradient descent (WGD) method.The least squares were used to calculate the weights, combining the ideas of TD and gradient descent to find the error between the weights.And this error was used to directly update the weights.By this method, the weights were updated in a new manner, effectively reducing the consumption of computing resources by the algorithm enhancing other gradient descent-based function approximation algorithms.The WGD method is widely applicable in various gradient descent-based reinforcement learning algorithms.The results show that WGD method can adjust parameters within a wider space, effectively reducing the possibility of algorithm divergence.Additionally, it achieves better performance while improving the convergence speed of the algorithm.…”
Get full text
Article -
25177
Comparison of Weighted Lag Adaptive LASSO with Autometrics for Covariate Selection and Forecasting Using Time-Series Data
Published 2022-01-01“…The simulation experiment indicates that, compared to Autometrics and other regularization approaches, the WLAdaLASSO outperforms the others in covariate selection and forecasting, especially when there is a greater linear dependency between predictors. In contrast, the computational efficiency of Autometrics decreases with a strong linear dependency between predictors. …”
Get full text
Article -
25178
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01“…Model extraction attack focuses on reverse engineering architecture and weights of DNN model deployed in edge.Model extraction attack is a basic security problem in AI security, it underlies advanced attacks as data provider, such as adversarial sample and data poisoning.A novel method named Cluster-based SCA was proposed,this method did not need leakage model.Cluster-based SCA was based on vulnerability of quantized inference.There exist a phenomenon in multiplication operation in quantized inference, which the output of different weights were not equivalent in respect of classification.It can be used to distinguish different weights.The proposed method computed output activations of each DNN layer with guessing weight.Then acquired side channel signal were classified into different class, the taxonomy was corresponding output activations' value.Average dispersion of all classes <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mover accent="true"> <mi>σ</mi> <mo>¯</mo> </mover> </math></inline-formula> was used to decide whether guess was right.The effectiveness of Cluster-based SCA method was verified by simulation experiment and HW model was used as target leakage model.For all weights from first convolution layer of target CNN model, TOP2 recovery rate was 52.66%.And for large weights in significant interval,TOP2 recover rate was 100%.…”
Get full text
Article -
25179
Dynamic Characteristics Analysis of 3D Blade Tip Clearance for Turbine Blades with Typical Cracks
Published 2022-01-01“…Then, a novel dynamic computation method is proposed to calculate the 3D-BTC based on the blade deformation. …”
Get full text
Article -
25180
Robust H-Infinity Filter and PSO-SVM Based Monitoring of Power Quality Disturbances System
Published 2024-01-01“…Twelve different statistical features are extracted by passing the disturbances through robust H-infinity filter in order to minimize the data size and computational complexities. The statistical properties of PQ disturbances are initially categorized using the Fast Generalized Fuzzy-C means (FGFCM) clustering approach. …”
Get full text
Article