Suggested Topics within your search.
Suggested Topics within your search.
- Aged 1
- Aging 1
- Digital techniques 1
- Diseases 1
- Photography 1
- Physical Therapy Modalities 1
- Spinal Diseases 1
- Spine 1
- Treatment 1
- diagnosis 1
- physiology 1
- surgery 1
- therapy 1
-
901
A Simple Gaussian Measurement Bound for Exact Recovery of Block-Sparse Signals
Published 2014-01-01“…The obtained results extend those known for the standard lq minimization and the mixed l2/l1 minimization methods to the mixed l2/lq (0<q≤1) minimization method in the context of block-sparse signal recovery.…”
Get full text
Article -
902
Weak Sharp Minima in Set-Valued Optimization Problems
Published 2012-01-01“…We introduce the notion of a weak ψ-sharp minimizer for set-valued optimization problems. We present some sufficient and necessary conditions that a pair point is a weak ψ-sharp minimizer through the outer limit of set-valued map and develop the characterization of the weak ψ-sharp minimizer in terms of a generalized nonlinear scalarization function. …”
Get full text
Article -
903
Relevance of Lumbar Subcutaneous Edema and Local Lordosis
Published 2024-12-01Get full text
Article -
904
-
905
The role of inflammation in pathogenesis and treatment of colorectal cancer
Published 2018-12-01Get full text
Article -
906
Sex-related association between smoke exposure and gallstones in a US population: a cross-sectional study
Published 2025-01-01Get full text
Article -
907
-
908
-
909
-
910
-
911
POSITIVE, NEGATIVE RULE AND APPLICATION
Published 2018-09-01“…In this paper, we introduce the concepts of extended negative rule, minimal rule and their properties. Then, an algorithm to generate all minimal positive and minimal negative rules is introduced. …”
Get full text
Article -
912
Percutaneous Method of Management of Simple Bone Cyst
Published 2013-01-01“…The case report illustrates the surgical technique of minimally invasive method of treatment. Case Study. …”
Get full text
Article -
913
On a family of dendrites
Published 2001-01-01“…We show that only two members of ℱ are minimal and only one of them is unique minimal with respect to open mappings.…”
Get full text
Article -
914
Removal of a fractured file beyond the apical foramen using robot-assisted endodontic microsurgery: a clinical report
Published 2025-01-01“…It is often challenging to precisely and minimally remove a fractured file. Recently the use of dental autonomous robotic system (ATR) has shown promise in precisely and minimally in dental surgery. …”
Get full text
Article -
915
The Feasibility of Societal Cost Equivalence between Robotic Hysterectomy and Alternate Hysterectomy Methods for Endometrial Cancer
Published 2011-01-01“…Sensitivity analysis and Monte Carlo simulation were performed using a cost-minimization model. Results. 40 (17.1%) of hysterectomies for endometrial cancer were robotic, 91 (38.9%), were abdominal, and 103 (44.0%) were laparoscopic. 96.3% of the variation in operative cost between patients was predicted by operative time (𝑅=0.963, 𝑃<0.01). …”
Get full text
Article -
916
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&amp;W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
917
Reducing Subspaces of Some Multiplication Operators on the Bergman Space over Polydisk
Published 2015-01-01“…We prove that each reducing subspace of MzN is a direct sum of some minimal reducing subspaces. We also characterize the minimal reducing subspaces in the cases that α=0 and α∈(-1,+∞)∖Q, respectively. …”
Get full text
Article -
918
Pioneering case: Robotic single port (SP) transvaginal NOTES (RSP-vNOTES) for hysterectomy in ten steps
Published 2024-01-01Get full text
Article -
919
Feasibility and Safety of Single-Incision Laparoscopic Surgery in Gastric Benign and Malignant Diseases
Published 2014-01-01Get full text
Article -
920