Showing 4,801 - 4,820 results of 5,159 for search 'Deool~', query time: 1.41s Refine Results
  1. 4801

    A lightweight multi scale fusion network for IGBT ultrasonic tomography image segmentation by Meng Song, Zhaoba Wang, Youxing Chen, Ya Li, Yong Jin, Bei Jia

    Published 2025-01-01
    “…LMFNet adopts a deep U-shaped encoder-decoder architecture, with the backbone designed using inverted residual blocks to optimize feature transmission while maintaining model compactness. …”
    Get full text
    Article
  2. 4802

    Unlocking biological complexity: the role of machine learning in integrative multi-omics by Ravindra Kumar, Rajrani Ruhel, Andre J. van Wijnen

    Published 2024-11-01
    “… The increasing complexity of biological systems demands advanced analytical approaches to decode the underlying mechanisms of health and disease. …”
    Get full text
    Article
  3. 4803

    Insect Pest occurrence on Cultivated Amaranthus Spp in Benin City, Edo State, Nigeria by AE Ezeh, ABO Ogedegbe, SA Ogedegbe

    Published 2015-07-01
    “…Majority of the pests are defoliators, except Cletus sp. and Aspavia armigera that attack grains. …”
    Get full text
    Article
  4. 4804

    Synthesis and Empirical Analysis of the Thermophysical Characteristics of GO-Ag Aqueous Hybrid Nanofluid Using Environmentally Friendly Reducing and Stabilizing Agents by M. Armstrong, M. Sivasubramanian, N. Selvapalam, R. Pavitra, P. Rajesh Kanna, Haiter Lenin

    Published 2023-01-01
    “…Overall, the results suggest that the silver nanoparticles-decorated aqueous graphene oxide hybrid nanofluid has promising potential as an innovative heat transfer fluid in various heat transfer applications.…”
    Get full text
    Article
  5. 4805

    Le lit provenant du château d’Effiat (Puy-de-Dôme) conservé au musée du Louvre by Agnès Bos

    Published 2019-09-01
    “…The bed which originally came from the Effiat chateau in the Puy-de-Dôme department and which is presented today in the Louvre, in the rooms of the department devoted to art objects, is well known as one of the rare surviving examples of a ‘French-style’ bed of the seventeenth century. …”
    Get full text
    Article
  6. 4806

    DFCNformer: A Transformer Framework for Non-Stationary Time-Series Forecasting Based on De-Stationary Fourier and Coefficient Network by Yuxin Jin, Yuhan Mao, Genlang Chen

    Published 2025-01-01
    “…For the seasonal component, a Transformer-based encoder–decoder architecture with De-stationary Fourier Attention (DSF Attention) captures temporal features, using differentiable attention weights to restore non-stationary information. …”
    Get full text
    Article
  7. 4807

    Selection of Smart Manure Composition for Smart Farming Using Artificial Intelligence Technique by Danish Ather, Suman Madan, Manjushree Nayak, Rohit Tripathi, Ravi Kant, Sapna Singh Kshatri, Rituraj Jain

    Published 2022-01-01
    “…Farmers’ dependence on instinct, trial and mistake, mystery, and assessing significantly includes major wasteful aspects such as efficiency misfortunes, asset squandering, and expanded natural defilement due to the complexity of deciding the perfect preparing extend. …”
    Get full text
    Article
  8. 4808

    Automated Generation of Custom Processor Core from C Code by Jelena Trajkovic, Samar Abdi, Gabriela Nicolescu, Daniel D. Gajski

    Published 2012-01-01
    “…We demonstrate the efficiency of our technique on wide range of applications, from standard academic benchmarks to industrial size examples like the MP3 decoder. Each processor core was constructed and refined in under a minute, allowing the designer to explore several different configurations in much less time than needed for manual design. …”
    Get full text
    Article
  9. 4809

    NOMA Performance Improvement with Downlink Sectorization by Hurianti Vidyaningtyas, . Iskandar, . Hendrawan, Aloysius A. Pramudita

    Published 2025-02-01
    “…The results demonstrate that sectorization can significantly boost the system’s sum rate by up to 25% and reduce decoding errors by as much as 51%, particularly when the number of users per sector is kept under 20. …”
    Get full text
    Article
  10. 4810

    ClassWise-SAM-Adapter: Parameter-Efficient Fine-Tuning Adapts Segment Anything to SAR Domain for Semantic Segmentation by Xinyang Pu, Hecheng Jia, Linghao Zheng, Feng Wang, Feng Xu

    Published 2025-01-01
    “…The proposed CWSAM freezes most of SAM's parameters and incorporates lightweight adapters for parameter-efficient fine-tuning, and a classwise mask decoder is designed to achieve semantic segmentation task. …”
    Get full text
    Article
  11. 4811

    A Distribution Adaptive Feedback Training Method to Improve Human Motor Imagery Ability by Yukun Zhang, Chuncheng Zhang, Rui Jiang, Shuang Qiu, Huiguang He

    Published 2025-01-01
    “…In contrast with studies about decoding methods, less work was reported about training users to improve the performance of MI-BCIs. …”
    Get full text
    Article
  12. 4812

    HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition by Koichi Ito, Yusei Suzuki, Hiroya Kawai, Takafumi Aoki, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi

    Published 2022-03-01
    “…HandSegNet employs a new CNN architecture consisting of an encoder–decoder model with a pyramid pooling module. Through performance evaluation using a set of synthesised hand images, HandSegNet exhibited the best segmentation results of 98.90% and 93.20% for accuracy and intersection over union, respectively. …”
    Get full text
    Article
  13. 4813

    Lassan a testtel, avagy a személyek konstitúciós elméletének kritikája by Ágnes Katona

    Published 2021-10-01
    “…Célom megmutatni, hogy népszerűsége ellenére a konstitúciós nézet igen gyenge lábakon áll, mert egyrészt ellentmondásos, másrészt nehezen hihető állítások következnek belőle. A személyek konstitúciós nézete azt állítja, hogy mi, emberek a személyek ontológiai kategóriájába tartozunk, és minket a testünk konstituál. …”
    Get full text
    Article
  14. 4814
  15. 4815

    Distributed Compressed Hyperspectral Sensing Imaging Incorporated Spectral Unmixing and Learning by Hua Xiao, Zhongliang Wang, Xueying Cui, Liping Wang, Hongsheng Yang, Yingbiao Jia

    Published 2022-01-01
    “…Compressed hyperspectral imaging is a powerful technique for satellite-borne and airborne sensors that can effectively shift the complex computational burden from the resource-constrained encoding side to a presumably more capable base-station decoder. Reconstruction algorithms play a pivotal role in compressive imaging systems. …”
    Get full text
    Article
  16. 4816

    Perturbative Stability and Error-Correction Thresholds of Quantum Codes by Yaodong Li, Nicholas O’Dea, Vedika Khemani

    Published 2025-02-01
    “…We connect the two notions of stability by constructing classical statistical mechanics models for decoding general Calderbank-Shor-Steane codes and classical linear codes. …”
    Get full text
    Article
  17. 4817

    Meningskonstruktion under læsning af litterære tekster: Verbal Reports fra elever i læseforståelsesvanskeligheder by Nina Berg Gøttsche

    Published 2025-02-01
    “…Følgelig er studiets teoretiske rammeværk flerfokalt og omfatter dels kognitionspsykologisk teori om læseforståelsesprocessen samt sociokognitiv teori om læsning af litterære tekster i en skolekontekst. …”
    Get full text
    Article
  18. 4818

    Covid-19 and the South African Pentecostal Landscape: Historic Shift from Offline Liturgical Practice to Online Platforms by John Mhandu and Vivian Ojong

    Published 2021-12-01
    “… The Coronavirus (Covid-19) disease resulted in an epic shift from offline liturgical practice to online platforms where South African Pentecostal churches are worshiping, using online tools such as Zoom. This article explores how offline liturgical practices, traditional power dynamics, and the performative and communication characteristics of Pentecostalism are decoded into the digital space, and the impact it has on congregants and church leadership. …”
    Get full text
    Article
  19. 4819
  20. 4820

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article