Showing 4,521 - 4,540 results of 5,159 for search 'Deool~', query time: 1.33s Refine Results
  1. 4521

    Structural and Morphological Studies of V2O5/MWCNTs and ZrO2/MWCNTs Composites as Photocatalysts by Sajid Iqbal, Tanveer Hussain Bokhari, Shoomaila Latif, Muhammad Imran, Ayesha Javaid, Liviu Mitu

    Published 2021-01-01
    “…The TMOs (ZrO2, V2O5) were decorated on MWCNTs by the hydrothermal method to yield V2O5/MWCNTs and ZrO2/MWCNTs composites. …”
    Get full text
    Article
  2. 4522

    A New Efficient Ordering Scheme for Sphere Detection by Cao Haiyan, Li Jun

    Published 2011-01-01
    “…The decoding order has a deep impact in the complexity of sphere detection. …”
    Get full text
    Article
  3. 4523

    W kierunku dwujęzyczności w edukacji wczesnoszkolnej – problemy nauczania czytania w języku obcym na przykładzie języka angielskiego by Monika Kusiak-Pisowacka

    Published 2017-02-01
    “…Most attention is given to phonological awareness at the decoding stage of reading and its role in beginning reading. …”
    Get full text
    Article
  4. 4524

    Structure and mechanism of biosynthesis of Streptococcus mutans cell wall polysaccharide by Jeffrey S. Rush, Svetlana Zamakhaeva, Nicholas R. Murner, Pan Deng, Andrew J. Morris, Cameron W. Kenner, Ian Black, Christian Heiss, Parastoo Azadi, Konstantin V. Korotkov, Göran Widmalm, Natalia Korotkova

    Published 2025-01-01
    “…SCC consists of a polyrhamnose backbone of →3)α-Rha(1 → 2)α-Rha(1→ repeats with glucose (Glc) side-chains and glycerol phosphate (GroP) decorations. This study reveals that SCC has one predominant and two more minor Glc modifications. …”
    Get full text
    Article
  5. 4525

    Adaptive Multihypothesis Prediction Algorithm for Distributed Compressive Video Sensing by Jinxiu Zhu, Ning Cao, Yu Meng

    Published 2013-05-01
    “…Meanwhile, a mode decision algorithm is applied in CS-blocks via block-based correlation measurements at the decoder. The inter-frame MH mode is selected for the current block wherein the interframe correlation coefficient value exceeds a predetermined threshold. …”
    Get full text
    Article
  6. 4526

    Ustor: cloud storage system based on regenerating codes by Qing LIU, Dan FENG, Bai LI

    Published 2014-04-01
    “…Observations can be drawn from the experimental re-sults: first, erasure coding guarantees data reliability, increasing 5%~10% response time compared with non-coding; sec-ond, speed of FRC encode, decode and repair are a little slower than Reed-Solomon(RS) code, and the time gap of en-coding 256MB by two codes is less than 0.5 seconds; third, compared with traditional RS codes, FRC reduces more than 25% data amount needed to download during a repair in the experiment.…”
    Get full text
    Article
  7. 4527

    Juventud lapidada: el caso de los ninis by José Eduardo Borunda Escobedo

    Published 2013-01-01
    “…Resumen El artículo es producto de una serie de reflexiones sobre la categoría “nini”, la cual ha sido parte del discurso público en los últimos años, pero cuya construcción es incipiente. …”
    Get full text
    Article
  8. 4528

    An Efficient Genome Fragment Assembling Using GA with Neighborhood Aware Fitness Function by Satoko Kikuchi, Goutam Chakraborty

    Published 2012-01-01
    “…To decode a long genome sequence, shotgun sequencing is the state-of-the-art technique. …”
    Get full text
    Article
  9. 4529

    Non-orthogonal multiple access wireless energy harvesting cooperative system by Xiaoping JIN, Qing WU, Wenchao ZHAI, Jianrong BAO

    Published 2021-04-01
    “…Non-orthogonal multiple access (NOMA) has recently attracted wide attention as a promising multiple access technology adopted in 5G cellular networks.In order to improve the spectrum efficiency, coverage and anti-noise performance of NOMA technology, while reduce the energy consumption of the system, a simultaneous wireless information and power transfer (SWIPT) cooperative network uplink NOMA transmission system based on orthogonal index modulation multiple access (IMMA) technology was designed, hereafter was denoted as QIMMA-SWIPT.Specifically, the QIMMA system was formed by multiple remote users, and it improved the spectrum efficiency and anti-noise performance as well as expanded the communication coverage and reduced the energy consumption of the system by decoding and forwarding relay cooperative transmission with SWIPT technology.The theoretical upper bound of the average bit error rate of QIMMA-SWIPT was derived.Simulation and analysis demonstrate that, under the same spectrum efficiency, the bit error rate performance of the cooperative QIMMA-SWIPT system is better than that of the cooperative IMMA-SWIPT and SCMA-SWIPT systems.In addition, the effects of power cut factor and source-to-relay distance on bit error performance were also deeply analyzed.…”
    Get full text
    Article
  10. 4530

    Intelligent temperature detection system based on“5G+AI” by Shan JIANG, Guocheng GONG, Tengyuan MA, Long XIAO

    Published 2022-05-01
    “…An intelligent temperature measurement solution based on “5G+AI” for the prevention and control of epidemic situation in COVID-19 was presented.Intelligent temperature measurement has a wide range of application scenarios in areas with dense traffic such as airports, railway stations and stations.A new AI temperature measurement architecture was proposed.The camera and infrared thermometer was used to measure temperature.The preprocessing module included image decoding, color space transformation, image correction and image normalization.Head detection model need to undergo off-line model training.Finally, through the temperature calculation module, the structured information was output.The development process of the model included data collection and annotation, model construction, model training, model optimization and model deployment.A comprehensive intelligent temperature measurement system was constructed, which integrated 5G temperature measurement hardware, OneNET access platform, monitoring application platform and mobile App.Finally, “5G+AI” intelligent temperature measurement products were successfully deployed in many cities and different application scenarios across the country.…”
    Get full text
    Article
  11. 4531

    Wittgenstein y Ayer: lenguaje privado y memoria by Raúl Isaac Robles Chamorro

    Published 2014-12-01
    “…El enfoque que tal tratamiento recibirá corresponderá a la relación entre la memoria y tal tipo de lenguaje, tema destacado gracias al aporte realizado por Ayer, quien en gran medida fundamenta su postura a favor de la posibilidad del lenguaje privado por medio de su consideración despa la capacidad humana de recordar y reconocer, lo que constituye uno de los puntos débiles del argumento del lenguaje privado propuesto por Wittgenstein y sus seguidores. …”
    Get full text
    Article
  12. 4532

    Class-aware feature attention-based semantic segmentation on hyperspectral images. by Prabu Sevugan, Venkatesan Rudhrakoti, Tai-Hoon Kim, Megala Gunasekaran, Swarnalatha Purushotham, Ravikumar Chinthaginjala, Irfan Ahmad, Kumar A

    Published 2025-01-01
    “…Finally, the segmentation results are refined using the encoder-decoder structure. It enhances precision in delineating distinct land cover patterns. …”
    Get full text
    Article
  13. 4533

    Des enfants acteurs de leur vie ? Représentations des enfants par les adultes et conséquences sur leur modèle d’autonomie by Julie Delalande

    Published 2014-10-01
    “…These two perspectives help us to decode parental attitudes when their child go to middle school and gain some autonomy, given the social and the academic context change and encourage his/her maturity. …”
    Get full text
    Article
  14. 4534

    Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks by Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang

    Published 2015-10-01
    “…Moreover, two suboptimal algorithms are proposed to deal with these optimization problems. Furthermore, we analyze the transmission rate of SNs and allocate the relaying power, jamming power, and downlink and uplink transmit power for the asymptotic scenarios. …”
    Get full text
    Article
  15. 4535

    Proiecții (inter) textuale în opera lui Mircea Eliade by Grațiela Benga

    Published 2007-12-01
    “….), frames (the labyrinth, the Centre and periphery). After decoding the way in which all these elements evolve in Mircea Eliade’s work, it is easy to notice the Balkan complex that has fertilized two important directions: the denial of history and the denunciation of the great cultures’ limits. …”
    Get full text
    Article
  16. 4536

    A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application by Maryam Zolfaghari-Nejad, Mostafa Charmi, Hossein Hassanpoor

    Published 2022-01-01
    “…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
    Get full text
    Article
  17. 4537
  18. 4538

    Method based on contrastive incremental learning for fine-grained malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN, Yongliang ZHOU, Jiali MA

    Published 2023-03-01
    “…In order to protect against continuously emerging unknown threats, a new method based on contrastive incremental learning for fine-grained malicious traffic classification was proposed.The proposed method was based on variational auto-encoder (VAE) and extreme value theory (EVT), and the high accuracy could be achieved in known, few-shot and unknown malicious classes and new classes were also identified without using a large number of old task samples, which met the demand of storage and time cost in incremental learning scenarios.Specifically, the contrastive learning was integrated into the encoder of VAE, and the A-Softmax was used for known and few-shot malicious traffic classification, EVT and the decoder of VAE were used for unknown malicious traffic recognition, all classes could be recognized without a lot of old samples when learning new tasks by using VAE reconstruction and knowledge distillation methods.Experimental results indicate that the proposed method is efficient in known, few-shot and unknown malicious classes, and has greatly reduced the forgetting speed of old knowledge in incremental learning scenarios.…”
    Get full text
    Article
  19. 4539

    La herencia krausista en las modernas teorías penitenciarias y educativas de Concepción Arenal by Delia Manzanero

    Published 2020-01-01
    “…Este artículo se plantea un recorrido temático preciso de las principales contribuciones de Concepción Arenal en tres niveles principales de análisis: en el ámbito de la reforma del código penal, cuyo propósito correccionalista ofrece una visión social de la pena que busca reinsertar al delincuente; en el ámbito social, conciliando y armonizando las reivindicaciones obreras con las ideas tradicionalistas; y en el ámbito educativo, para ayudar a los más débiles, a los condenados por la justicia y los marginados por la sociedad, entre los que incluía a la mujer. …”
    Get full text
    Article
  20. 4540

    Generative blockchain-based covert communication model based on Markov chain by Wei SHE, Xinpeng RONG, Wei LIU, Zhao TIAN

    Published 2022-10-01
    “…To solve the problems of high channel construction risk, information crossover, and insufficient concealment in the blockchain covert communication, a generative blockchain-based covert communication model based on Markov chain was proposed.First, the text data set was used by sender to obtain the candidate words set and trained the Markov model to obtain the transition probability matrix, generated the Huffman tree set.Secret message to be transmitted was performed iterative Huffman decoding on the binary stream to obtain a set of highly readable carring-secret message statements that conformed to normal language and semantic characteristics, a generative steganography was used to complete secret message embedding.Then, the carring-secret message was ring-signed and published to the blockchain as a normal transaction packing and block generation were completed in the network.Finally, the same text data set was used by the receiver to obtain the Huffman tree of transition probability weights, the binary stream of secret message was obtained by reverse operation.Simulation results demonstrate that, compares with the current similar models, the proposed model can further improve the embedding strength and time efficiency, reduce the risk of covert channel construction, avoid information crossover, and improve the concealment.…”
    Get full text
    Article