Showing 4,501 - 4,520 results of 5,159 for search 'Deool~', query time: 1.36s Refine Results
  1. 4501

    Unconventional broadening of Rashba spin splitting in a Au2Sb surface alloy with periodic structural defects by Jinbang Hu, Xiansi Wang, Anna Cecilie Åsland, Justin W. Wells

    Published 2025-01-01
    “…Here, we report a novel 2D Au2Sb surface alloy decorated with periodic structural defects that exhibits modulation on the Rashba spin-orbit coupling band. …”
    Get full text
    Article
  2. 4502

    Improved Synthesis of Reduced Graphene Oxide-Titanium Dioxide Composite with Highly Exposed {001} Facets and Its Photoelectrochemical Response by Gregory S. H. Thien, Fatin Saiha Omar, Nur Ily Syuhada Ahmad Blya, Wee Siong Chiu, Hong Ngee Lim, Ramin Yousefi, Farid-Jamali Sheini, Nay Ming Huang

    Published 2014-01-01
    “…An improved synthesis by solvothermal route has been employed for the formation of TiO2 with highly exposed 001 facets decorated on reduced graphene oxide (RGO) sheets. The RGO-TiO2 composite could be produced with high yield by following a stringently methodical yet simple approach. …”
    Get full text
    Article
  3. 4503

    Heavy and Lightweight Deep Learning Models for Semantic Segmentation: A Survey by Cristina Carunta, Alina Carunta, Calin-Adrian Popa

    Published 2025-01-01
    “…The methods involved are described from the architectural design perspective, including encoder-decoder architectures, multi-resolution branches approaches, two-pathway encoder architectures, attention-based models, and pyramid-based models. …”
    Get full text
    Article
  4. 4504

    Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay by Ling Yang, Weiwei Yang, Liang Tang, Liwei Tao, Xingbo Lu, Zhengyun He

    Published 2022-01-01
    “…In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses zero-forcing beamforming to send interference signals to the warden to ensure covert transmission. …”
    Get full text
    Article
  5. 4505

    Performance Comparison of Doppler Scale Estimation Methods for Underwater Acoustic OFDM by Lei Wan, Zhaohui Wang, Shengli Zhou, T. C. Yang, Zhijie Shi

    Published 2012-01-01
    “…In addition, a pilot-aided method and a decision-aided method are applicable based on cross-correlation with templates constructed from symbols on pilot subcarriers only and from symbols on all subcarriers after data decoding, respectively. This paper carries out extensive comparisons among these methods using both simulated and real experimental data. …”
    Get full text
    Article
  6. 4506

    Eye Tracking and Semantic Evaluation for Ceramic Teapot Product Modeling by Wei Liu, Ziyan Hu, Yinan Fei, Jiaqi Chen, Changlong Yu

    Published 2024-12-01
    “…In addition to their practical and aesthetic qualities, ceramic teapots are highly decorative and stylish. Based on the theory of perceptual engineering, this study employs eye-tracking technology and semantic-difference methods to investigate user preferences for ceramic teapot shapes. …”
    Get full text
    Article
  7. 4507

    A Semantic Segmentation Method for Remote Sensing Images Based on an Improved TransDeepLab Model by Jinxin Wang, Manman Wang, Kaiwei Cong, Zilong Qin

    Published 2024-12-01
    “…The model introduces a GAM attention mechanism in the coding stage, and incorporates a multi-level linear up-sampling strategy in the decoding stage. These enhancements allow the model to fully utilize multi-level semantic information and small target details in high-resolution remote sensing images, thereby effectively improving the segmentation accuracy of target objects. …”
    Get full text
    Article
  8. 4508

    Source-independent quantum random number generators with integrated silicon photonics by Yongqiang Du, Xin Hua, Zhengeng Zhao, Xiaoran Sun, Zhenrong Zhang, Xi Xiao, Kejin Wei

    Published 2025-01-01
    “…Our SI-QRNG system achieves a low error rate of only 0.21%, thanks to the inherent stability of the silicon-based decoder chip and its excellent polarization extinction ratio. …”
    Get full text
    Article
  9. 4509

    À l’intérieur des images by Joséphine Alida Jacquier

    Published 2010-12-01
    “…The characteristics that according to Creuzer constitute the symbol – suddenness, appearance and clarity – structure not only Flaubertʼs descriptions of hallucinations and artistic visions, but also reveal themselves as essential elements of the epiphanean défilé of the gods. The dissecting character of science and the symbolical way of thinking form the hybrid structure of the Tentation. …”
    Get full text
    Article
  10. 4510

    Quantifying the regulatory potential of genetic variants via a hybrid sequence-oriented model with SVEN by Yu Wang, Nan Liang, Ge Gao

    Published 2024-12-01
    “…Abstract Deciphering how noncoding DNA determines gene expression is critical for decoding the functional genome. Understanding the transcription effects of noncoding genetic variants are still major unsolved problems, which is critical for downstream applications in human genetics and precision medicine. …”
    Get full text
    Article
  11. 4511

    Information Analysis of Catchment Hydrologic Patterns across Temporal Scales by Baoxiang Pan, Zhentao Cong

    Published 2016-01-01
    “…The Epistemic Uncertainty refers to the posterior uncertainty increase due to the imperfect observation decoding in models. Daily hydrometeorological observations in 24 catchments were aggregated from 10 days to 1 year before implementing the information analysis. …”
    Get full text
    Article
  12. 4512

    Improved chosen-plaintext power analysis attack against SM4 at the round-output by Zhi-bo DU, Zhen WU, Min WANG, Jin-tao RAO

    Published 2015-10-01
    “…The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However,the attack process was complex.There were many problems in the process,such as more power traces,more numbers of the chosen-plaintext and acquisition power traces.The correlation between the fixed data and the round key were presented,which could be used to decode the round key.Based on the correlation,the improved chosen-plaintext power analysis attack against SM4 at the round-output was proposed.The proposed method attacked the fixed data by analyzing the power traces of the special plaintext.And the round key was derived based on the correlation.The results show that the proposed attack algorithm is effective.The proposed method not only improves the efficiency of the attack by reducing number of power traces,number of the chosen-plaintext and number of acquisition power traces,but also can be applied to a chosen-plaintext power analysis attack against SM4 at the shift operation.…”
    Get full text
    Article
  13. 4513

    A new efficient genetic algorithm-Taguchi-based approach for multi-period inventory routing problem by Amin Farahbakhsh, Amir Saman Kheirkhah

    Published 2023-12-01
    “…This structure offers simplicity in encoding and decoding solutions, maintains feasibility after crossover and mutation operations, addresses both routing and inventory management in a single step, and consolidates information about each solution method comprehensively. …”
    Get full text
    Article
  14. 4514

    Urban Traffic Flow Forecast Based on FastGCRNN by Ya Zhang, Mingming Lu, Haifeng Li

    Published 2020-01-01
    “…Specifically, we use FastGCN unit to efficiently capture the topological relationship between the roads and the surrounding roads in the graph with reducing the computational complexity through importance sampling, combine GRU unit to capture the temporal dependency of traffic flow, and embed the spatiotemporal features into Seq2Seq based on the Encoder-Decoder framework. Experiments on large-scale traffic data sets illustrate that the proposed method can greatly reduce computational complexity and memory consumption while maintaining relatively high accuracy.…”
    Get full text
    Article
  15. 4515

    Manuscript Documentation and Conservation Treatment: A Mamluk Manuscript from the 15th Century by Nil Baydar

    Published 2013-11-01
    “…Abstract The conservation treatment of a 15,h century Mamluk manuscript decorated in a manner suitable to the period is considered in three parts. …”
    Get full text
    Article
  16. 4516

    Electrochemical Detection of Cadmium and Lead in Rice on Manganese dioxide Reinforced Carboxylated Graphene Oxide Nanofilm by Ali Osman Solak, Aslı Erkal, Zafer Üstündağ, İlknur Üstündağ

    Published 2018-12-01
    “…Manganese dioxide decorated carboxylated grapheneoxide (Mn-GO-COOH) attached onto the glassy carbon (GC) electrode to develop anew method for the simultaneous determination of Cd2+ and Pb2+ions in rice samples. …”
    Get full text
    Article
  17. 4517

    Graph clustering method based on structure entropy constraints by Zhiying ZHANG, Youliang TIAN

    Published 2021-12-01
    “…Aiming at the problem of how to decode the true structure of the network from the network embedded in the large-scale noise structure at the open information sharing platform centered on big data, and furthermore accurate mining results can be obtained in the mining related information process, the method of clustering based on structure entropy was proposed to realize divide the correlation degree of nodes in the graph.A solution algorithm for calculating two-dimensional structural information and a module division algorithm based on the principle of entropy reduction were proposed to divide the nodes in the graph structure to obtain corresponding modules.The K-dimensional structural information algorithm was used to further divide the divided modules to realize the clustering of nodes in the graph structure.An example analysis shows that the proposed graph clustering method can not only reflect the true structure of the graph structure, but also effectively mine the degree of association between nodes in the graph structure.At the same time, the other three clustering schemes are compared, and the experiment shows that this scheme has higher efficiency in execution time and guarantees the reliability of the clustering results.…”
    Get full text
    Article
  18. 4518

    Recognition and optimization of landscape genes in traditional settlements: a case of Meishan area by Huasha Xia, Feihu Chen

    Published 2025-02-01
    “…The results highlight topography and building decoration as dominant features that should be prioritized for preservation. …”
    Get full text
    Article
  19. 4519

    Monitoring of Ozone Risk for Forests in the Czech Republic: Preliminary Results by Vít Šrámek, Radek Novotný, Emilie Bednárová, Hana Uhlírová

    Published 2007-01-01
    “…The amount of epicuticular waxes on 1-year-old Norway spruce needles was the only factor showing significant correlation to O3 concentration. Defoliation of the stands depended only on the stand age. …”
    Get full text
    Article
  20. 4520

    Une figurine en terre cuite dorée d’époque romaine à Reims/Durocortorum by Loïc Androuin

    Published 2022-11-01
    “…The study of its iconography reveals it to be a novel decorative feature, representative of a new series within this preexisting iconographic theme. …”
    Get full text
    Article