Showing 481 - 493 results of 493 for search 'FIELD’s model of transfer', query time: 0.08s Refine Results
  1. 481

    Super‐Intense Geomagnetic Storm on 10–11 May 2024: Possible Mechanisms and Impacts by S. Tulasi Ram, B. Veenadhari, A. P. Dimri, J. Bulusu, M. Bagiya, S. Gurubaran, N. Parihar, B. Remya, G. Seemala, Rajesh Singh, S. Sripathi, S. V. Singh, G. Vichare

    Published 2024-12-01
    “…With a peak negative excursion of Sym‐H below −500 nT, this storm is the second largest of the space era. Solar wind energy transferred through radiation and mass coupling affected the entire Geospace. …”
    Get full text
    Article
  2. 482

    La villégiature anglaise et l’invention de la Côte d’Azur by Alain Bottaro

    Published 2014-07-01
    “…The introduction of seabathing on the Riviera before 1860 is emblematic of these British cultural transfers. The originality of Nice lies in the double influence of Italian and British models which are interwoven in local bathing practices and architecture.…”
    Get full text
    Article
  3. 483

    A Block-Based and Highly Parallel CNN Accelerator for Seed Sorting by Xiaoting Sang, Zhenghui Hu, Huanyu Li, Chunlei Li, Zhoufeng Liu

    Published 2022-01-01
    “…The seed sorting methods based on convolutional neural networks (CNNs) have achieved excellent recognition accuracy on large-scale pretrained network models. However, CNN inference is a computationally intensive process that often requires hardware acceleration to operate in real time. …”
    Get full text
    Article
  4. 484

    Deep Learning Algorithms for Detection and Classification of Gastrointestinal Diseases by Mosleh Hmoud Al-Adhaileh, Ebrahim Mohammed Senan, Waselallah Alsaade, Theyazn H. H Aldhyani, Nizar Alsharif, Ahmed Abdullah Alqarni, M. Irfan Uddin, Mohammed Y. Alzahrani, Elham D. Alzain, Mukti E. Jadhav

    Published 2021-01-01
    “…In the classification stage, pretrained convolutional neural network (CNN) models are tuned by transferring learning to perform new tasks. …”
    Get full text
    Article
  5. 485

    Novel analytical superposed nonlinear wave structures for the eighth-order (3+1)-dimensional Kac-Wakimoto equation using improved modified extended tanh function method by Wafaa B. Rabie, Hamdy M. Ahmed, Taher A. Nofal, E. M. Mohamed

    Published 2024-11-01
    “…Higher-order nonlinear partial differential equations, such as the eighth-order Kac-Wakimoto model, are useful for studying wave turbulence in fluids, where energy transfers across a range of wave numbers. …”
    Get full text
    Article
  6. 486

    From Bench to Brain: A Metadata-driven Approach to Research Data Management in a Collaborative Neuroscientific Research Center by Marlene Pacharra, Tobias Otto, Nina Olivia Caroline Winter

    Published 2025-01-01
    “…This framework can serve as a transferable model for other collaborative research initiatives lacking predefined metadata schemas or repositories. …”
    Get full text
    Article
  7. 487
  8. 488

    Controlling Embedded Systems Remotely via Internet-of-Things Based on Emotional Recognition by Mohammad J. M. Zedan, Ali I. Abduljabbar, Fahad Layth Malallah, Mustafa Ghanem Saeed

    Published 2020-01-01
    “…The methodology is achieved by combining machine learning (for smiling recognition) and embedded systems (for remote control IoT) fields. In terms of the smiling recognition, GENKl-4K database is exploited to train a model, which is built in the following sequenced steps: real-time video, snapshot image, preprocessing, face detection, feature extraction using HOG, and then finally SVM for the classification. …”
    Get full text
    Article
  9. 489

    Consensus for Operating Room Multimodal Data Management: Identifying Research Priorities for Data-Driven Surgery by Alain Garcia Vazquez, MD, Juan Verde, MD, Ariosto Hernandez Lara, MD, Didier Mutter, MD, Lee Swanstrom, MD, 5G-OR Research Committee, 5G-OR Consensus Panel, Ariosto Hernandez Lara, Barbara Seeliger, Daniel Hashimoto, Deepak Alapatt, Joel Lavanchy, Juan Verde, Lise Lecointre, Pietro Mascagni, Pr.Danail Stoyanov, Didier Mutter, MD, Dirk Willhelm, MD, Pr.Gerald Fried, MD, Gretchen Jackson, MD, PhD, Jean-Paul Mazellier, PhD, Lee Swanstrom, MD, Pr.Lena Maier-Hein, Pr.Nicolas Padoy, PhD, Pr.Sascha Treskatsch, MD, Pr.Silvana Perretta, MD, PhD, Pr.Stefanie Speidel, Pr.Teodor Grantcharov, Annika Mareike Engel, BSc, MEng, Axel Boese, DrIng, Carla M. Pugh, MD, PhD, Cesare Hassan, Fabian Dietrich, PhD, Felix Nickel, MD, MME, Franziska Jurosch, MSc, Guido Beldi, MD, Henriette Hegermann, Dr, Johannes Horsch, Dipl-Ing, Julian Rosenkranz, Ing, MSc, Keno Sponheuer, DrMed, Luca Milone, MD, PhD, FACS, Nariaki Okamoto, MD, PhD, Patrick Seeling, PhD, Pedro Filipe Pereira Gouveia, MD, PhD, Roland Croner, Prof.Dr, Sandra Keller, PhD, Sharona B Ross, Taiga Wakabayashi, MD, Ph.D, Takeaki Ishizawa, MD, PhD, Takeshi Urade, MD, PhD, Thomas Schnelldorfer, MD, PhD, Thorge Lackner, MSc, and MEng

    Published 2024-09-01
    “…The roadmap prioritizes standardizing OR data formats, integrating OR data with patient information, ensuring regulatory compliance, standardizing surgical AI models, and securing data transfers in the next generation of wireless networks. …”
    Get full text
    Article
  10. 490

    戶外冒險教育課程對大學生心理賦能之 成效研究 Effects of Integrating Psychological Empowerment Into an Outdoor Adventure Education Curriculum for College Students... by 蕭如軒 Ru-Syuan Hsia, 吳崇旗 Chung-Chi Wu

    Published 2024-12-01
    “…Template analysis was employed to explore themes such as the cross-domain application of empowerment, learning transfer, and concept extension, with the findings complementing the quantitative findings. …”
    Get full text
    Article
  11. 491
  12. 492

    Neural quantum propagators for driven-dissipative quantum dynamics by Jiaji Zhang, Carlos L. Benavides-Riveros, Lipeng Chen

    Published 2025-01-01
    “…Furthermore, by appropriately configuring the external fields, our trained NQP can be transferred to systems governed by different Hamiltonians. …”
    Get full text
    Article
  13. 493

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article