Suggested Topics within your search.
Suggested Topics within your search.
- History 4
- Economic aspects 3
- Economic development 3
- Political aspects 3
- Public administration 3
- 44.83 rheumatology, orthopedics 2
- Civil war 2
- Customer relations 2
- Customer services 2
- English language 2
- Foreign speakers 2
- Information technology 2
- Interior decoration 2
- Internet in public administration 2
- Leadership 2
- Management 2
- Orthopedics 2
- Politics and government 2
- Technique 2
- Telemedicine 2
- African influences 1
- Africans 1
- Agriculture 1
- Antiques 1
- Antiques in interior decoration 1
- Antiquities 1
- Automobiles 1
- Autonomy and independence movements 1
- COMPUTERS / Desktop Applications / Suites 1
- CRAFTS & HOBBIES / Pottery & Ceramics 1
-
4801
A lightweight multi scale fusion network for IGBT ultrasonic tomography image segmentation
Published 2025-01-01“…LMFNet adopts a deep U-shaped encoder-decoder architecture, with the backbone designed using inverted residual blocks to optimize feature transmission while maintaining model compactness. …”
Get full text
Article -
4802
Unlocking biological complexity: the role of machine learning in integrative multi-omics
Published 2024-11-01“… The increasing complexity of biological systems demands advanced analytical approaches to decode the underlying mechanisms of health and disease. …”
Get full text
Article -
4803
Insect Pest occurrence on Cultivated Amaranthus Spp in Benin City, Edo State, Nigeria
Published 2015-07-01“…Majority of the pests are defoliators, except Cletus sp. and Aspavia armigera that attack grains. …”
Get full text
Article -
4804
Synthesis and Empirical Analysis of the Thermophysical Characteristics of GO-Ag Aqueous Hybrid Nanofluid Using Environmentally Friendly Reducing and Stabilizing Agents
Published 2023-01-01“…Overall, the results suggest that the silver nanoparticles-decorated aqueous graphene oxide hybrid nanofluid has promising potential as an innovative heat transfer fluid in various heat transfer applications.…”
Get full text
Article -
4805
Le lit provenant du château d’Effiat (Puy-de-Dôme) conservé au musée du Louvre
Published 2019-09-01“…The bed which originally came from the Effiat chateau in the Puy-de-Dôme department and which is presented today in the Louvre, in the rooms of the department devoted to art objects, is well known as one of the rare surviving examples of a ‘French-style’ bed of the seventeenth century. …”
Get full text
Article -
4806
DFCNformer: A Transformer Framework for Non-Stationary Time-Series Forecasting Based on De-Stationary Fourier and Coefficient Network
Published 2025-01-01“…For the seasonal component, a Transformer-based encoder–decoder architecture with De-stationary Fourier Attention (DSF Attention) captures temporal features, using differentiable attention weights to restore non-stationary information. …”
Get full text
Article -
4807
Selection of Smart Manure Composition for Smart Farming Using Artificial Intelligence Technique
Published 2022-01-01“…Farmers’ dependence on instinct, trial and mistake, mystery, and assessing significantly includes major wasteful aspects such as efficiency misfortunes, asset squandering, and expanded natural defilement due to the complexity of deciding the perfect preparing extend. …”
Get full text
Article -
4808
Automated Generation of Custom Processor Core from C Code
Published 2012-01-01“…We demonstrate the efficiency of our technique on wide range of applications, from standard academic benchmarks to industrial size examples like the MP3 decoder. Each processor core was constructed and refined in under a minute, allowing the designer to explore several different configurations in much less time than needed for manual design. …”
Get full text
Article -
4809
NOMA Performance Improvement with Downlink Sectorization
Published 2025-02-01“…The results demonstrate that sectorization can significantly boost the system’s sum rate by up to 25% and reduce decoding errors by as much as 51%, particularly when the number of users per sector is kept under 20. …”
Get full text
Article -
4810
ClassWise-SAM-Adapter: Parameter-Efficient Fine-Tuning Adapts Segment Anything to SAR Domain for Semantic Segmentation
Published 2025-01-01“…The proposed CWSAM freezes most of SAM's parameters and incorporates lightweight adapters for parameter-efficient fine-tuning, and a classwise mask decoder is designed to achieve semantic segmentation task. …”
Get full text
Article -
4811
A Distribution Adaptive Feedback Training Method to Improve Human Motor Imagery Ability
Published 2025-01-01“…In contrast with studies about decoding methods, less work was reported about training users to improve the performance of MI-BCIs. …”
Get full text
Article -
4812
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition
Published 2022-03-01“…HandSegNet employs a new CNN architecture consisting of an encoder–decoder model with a pyramid pooling module. Through performance evaluation using a set of synthesised hand images, HandSegNet exhibited the best segmentation results of 98.90% and 93.20% for accuracy and intersection over union, respectively. …”
Get full text
Article -
4813
Lassan a testtel, avagy a személyek konstitúciós elméletének kritikája
Published 2021-10-01“…Célom megmutatni, hogy népszerűsége ellenére a konstitúciós nézet igen gyenge lábakon áll, mert egyrészt ellentmondásos, másrészt nehezen hihető állítások következnek belőle. A személyek konstitúciós nézete azt állítja, hogy mi, emberek a személyek ontológiai kategóriájába tartozunk, és minket a testünk konstituál. …”
Get full text
Article -
4814
Multiview Shooting Geometry for Multiscopic Rendering with Controlled Distortion
Published 2010-01-01Get full text
Article -
4815
Distributed Compressed Hyperspectral Sensing Imaging Incorporated Spectral Unmixing and Learning
Published 2022-01-01“…Compressed hyperspectral imaging is a powerful technique for satellite-borne and airborne sensors that can effectively shift the complex computational burden from the resource-constrained encoding side to a presumably more capable base-station decoder. Reconstruction algorithms play a pivotal role in compressive imaging systems. …”
Get full text
Article -
4816
Perturbative Stability and Error-Correction Thresholds of Quantum Codes
Published 2025-02-01“…We connect the two notions of stability by constructing classical statistical mechanics models for decoding general Calderbank-Shor-Steane codes and classical linear codes. …”
Get full text
Article -
4817
Meningskonstruktion under læsning af litterære tekster: Verbal Reports fra elever i læseforståelsesvanskeligheder
Published 2025-02-01“…Følgelig er studiets teoretiske rammeværk flerfokalt og omfatter dels kognitionspsykologisk teori om læseforståelsesprocessen samt sociokognitiv teori om læsning af litterære tekster i en skolekontekst. …”
Get full text
Article -
4818
Covid-19 and the South African Pentecostal Landscape: Historic Shift from Offline Liturgical Practice to Online Platforms
Published 2021-12-01“… The Coronavirus (Covid-19) disease resulted in an epic shift from offline liturgical practice to online platforms where South African Pentecostal churches are worshiping, using online tools such as Zoom. This article explores how offline liturgical practices, traditional power dynamics, and the performative and communication characteristics of Pentecostalism are decoded into the digital space, and the impact it has on congregants and church leadership. …”
Get full text
Article -
4819
A new Maxwell-Log logistic distribution and its applications for mortality rate data
Published 2025-05-01Get full text
Article -
4820
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article