Showing 901 - 920 results of 9,903 for search '"minimalism"', query time: 0.05s Refine Results
  1. 901

    A Simple Gaussian Measurement Bound for Exact Recovery of Block-Sparse Signals by Zhi Han, Jianjun Wang, Jia Jing, Hai Zhang

    Published 2014-01-01
    “…The obtained results extend those known for the standard lq minimization and the mixed l2/l1 minimization methods to the mixed l2/lq  (0<q≤1) minimization method in the context of block-sparse signal recovery.…”
    Get full text
    Article
  2. 902

    Weak Sharp Minima in Set-Valued Optimization Problems by Ming-hao Jin, Jun-xiang Wang, Shu Xu

    Published 2012-01-01
    “…We introduce the notion of a weak ψ-sharp minimizer for set-valued optimization problems. We present some sufficient and necessary conditions that a pair point is a weak ψ-sharp minimizer through the outer limit of set-valued map and develop the characterization of the weak ψ-sharp minimizer in terms of a generalized nonlinear scalarization function. …”
    Get full text
    Article
  3. 903
  4. 904
  5. 905
  6. 906
  7. 907
  8. 908
  9. 909
  10. 910
  11. 911

    POSITIVE, NEGATIVE RULE AND APPLICATION by Nguyễn Đức Thuần, Phạm Quang Tùng, Hồ Thị Thu Sa

    Published 2018-09-01
    “…In this paper, we introduce the concepts of extended negative rule, minimal rule and their properties. Then, an algorithm to generate all minimal positive and minimal negative rules is introduced. …”
    Get full text
    Article
  12. 912

    Percutaneous Method of Management of Simple Bone Cyst by O. P. Lakhwani

    Published 2013-01-01
    “…The case report illustrates the surgical technique of minimally invasive method of treatment. Case Study. …”
    Get full text
    Article
  13. 913

    On a family of dendrites by Janusz J. Charatonik

    Published 2001-01-01
    “…We show that only two members of ℱ are minimal and only one of them is unique minimal with respect to open mappings.…”
    Get full text
    Article
  14. 914

    Removal of a fractured file beyond the apical foramen using robot-assisted endodontic microsurgery: a clinical report by Mei Fu, Shen Zhao, Xubing Zhou, Benxiang Hou, Chen Zhang

    Published 2025-01-01
    “…It is often challenging to precisely and minimally remove a fractured file. Recently the use of dental autonomous robotic system (ATR) has shown promise in precisely and minimally in dental surgery. …”
    Get full text
    Article
  15. 915

    The Feasibility of Societal Cost Equivalence between Robotic Hysterectomy and Alternate Hysterectomy Methods for Endometrial Cancer by Neel T. Shah, Kelly N. Wright, Gudrun M. Jonsdottir, Selena Jorgensen, Jon I. Einarsson, Michael G. Muto

    Published 2011-01-01
    “…Sensitivity analysis and Monte Carlo simulation were performed using a cost-minimization model. Results. 40 (17.1%) of hysterectomies for endometrial cancer were robotic, 91 (38.9%), were abdominal, and 103 (44.0%) were laparoscopic. 96.3% of the variation in operative cost between patients was predicted by operative time (𝑅=0.963, 𝑃<0.01). …”
    Get full text
    Article
  16. 916

    Adversarial example defense algorithm for MNIST based on image reconstruction by Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN

    Published 2022-02-01
    “…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&amp;W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
    Get full text
    Article
  17. 917

    Reducing Subspaces of Some Multiplication Operators on the Bergman Space over Polydisk by Yanyue Shi, Na Zhou

    Published 2015-01-01
    “…We prove that each reducing subspace of MzN is a direct sum of some minimal reducing subspaces. We also characterize the minimal reducing subspaces in the cases that α=0 and α∈(-1,+∞)∖Q, respectively. …”
    Get full text
    Article
  18. 918
  19. 919
  20. 920