Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 3
- Sociolinguistics 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Agriculture 1
- Beauty operators 1
- Celebrities 1
- Collectors and collecting 1
- Coming of Age 1
- Community development 1
- Criticism 1
- Economic aspects 1
- Economic development 1
- FICTION 1
- Fashion 1
- History 1
- History and criticism 1
- Humorous 1
- Image consultants 1
- LITERARY CRITICISM / General 1
- LITERARY CRITICISM / Semiotics & Theory 1
- Literature 1
- Methodology 1
- Philosophy 1
- Research 1
- Research methods 1
- Social aspects 1
- Social research 1
- Social sciences 1
- Soil chemistry 1
- Sound recording industry 1
-
3861
Etno-show Quando l’antropologia andò in scena, un’antropologia bella da vedere
Published 2017-07-01“…On closer inspection, it is indeed a reciprocal exchange: these means of entertainment too, in turn willingly draw from ethnography to put on stage an exoticism which is more and more alluring, prurient, feral, and also revolting, but which does pay well at the box office. It is a variegated Otherness which turns up, sometimes near, some other three-dimensional and tangible, in other words “alive”; it follows postures and is in relation with activities, situations and environments which instead hypostasize and strictly control it, thus reasserting the hegemony of a western perspective which depicts intriguing “postcards” of this otherness, and puts a price on it with the complicity of Anthropology; rather with a certain Anthropology which embellishes the world, changing it in a sort of ethno-show. …”
Get full text
Article -
3862
Future vehicular fog computing networks
Published 2020-06-01“…Facing the requirements of secure and reliable vehicle driving,internet of vehicles requires high real-time information transmission and processing,high data storage and security using capacity,and high flexibility and inclusiveness of network architecture.The future vehicular fog computing network can reduce the data transmission and processing delay based on the characteristics of fog computing deployed at the edge of the network,can ensure data security based on the characteristics of fog computing black box operation,and can make heterogeneous facilities connect with other devices and make sure resource sharing between vehicle nodes based on the fog computing distributed architecture.The future vehicular fog computing networks were reviewed,the architecture,challenges,and key technologies of vehicle fog computing were introduced,the communication and computing resource sharing and task collaboration in the mobile state,vehicle fog computing security,and vehicle fog computing heterogeneity of facilities were focused on .Finally,a three-level management and control architecture for vehicular fog computing networks were proposed to promote the development of internet of vehicles to on-networking collaborative decision-making and control.…”
Get full text
Article -
3863
'Micro-Gold' Miniature Dwarf Tomato
Published 2005-04-01“…It is also ideal for window boxes or garden borders because the plant canopy diameter is only 19 cm (spring) to 26 cm (fall) (Table 1). …”
Get full text
Article -
3864
Optimization of ready-to-drink Chrysanthemum flower tea formulation based on bioactive compounds and sensory properties
Published 2025-01-01“…This study aims to optimize the formulation of ready-to-drink Chrysanthemum flower tea using Response Surface Methodology-Box Behnken Design (RSM-BBD) to meet modern consumer preferences for health-oriented and convenient beverages. …”
Get full text
Article -
3865
A Novel Approach to Reduce the Unicast Bandwidth of an IPTV System in a High-Speed Access Network
Published 2017-01-01“…An interesting channel change acceleration scheme based on peer-assisted delivery was recently proposed, which consists of deploying one FCC server (Fast Channel Change Server) in the IP backbone in order to send the unicast stream to the STB (Set-Top Box) before sending the normal multicast stream after each channel change. …”
Get full text
Article -
3866
Assessment of fluidity retention, mechanical strength and cost production of blended cement self-compacting concrete using the concept of a performance index
Published 2022-04-01“…The tests at the fresh state were slump flow, L-box and sieve segregation. To assess the fluidity retention, slump flow loss was measured after 30, 60 and 90 minutes. …”
Get full text
Article -
3867
KRAS Mutation in Serous Borderline Tumor of the Testis: Report of a Case and Review of the Literature
Published 2020-01-01“…The tumor cells express cytokeratin 7 (CK7), cytokeratin 5-6 (CK5-6), cancer antigen 125 (CA125), estrogen (ER), progesterone (PR), Wilm’s tumor gene (WT1), paired box gene 8 (PAX8), Ber-EP4, and epithelial membrane antigen (EMA). …”
Get full text
Article -
3868
Smoking Hot: the Odalisque’s eroticizing Cigarette
Published 2018-05-01“…Sold in eye-catching tin boxes, the Egyptian landscape illustrations soon changed into better selling eastern beauties, obviously tempting potential male users. …”
Get full text
Article -
3869
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01“…To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.…”
Get full text
Article -
3870
The Role of Protein Modifications of T-Bet in Cytokine Production and Differentiation of T Helper Cells
Published 2014-01-01“…T-Bet (T-box protein expressed in T cells, also called as TBX21) was originally cloned as a key transcription factor involved in the commitment of T helper (Th) cells to the Th1 lineage. …”
Get full text
Article -
3871
A DOE (Response Surface Methodology) Approach to Predict the Strength Properties of Concrete Incorporated with Jute and Bamboo Fibres and Silica Fumes
Published 2022-01-01“…To obtain the optimal combination of progression variables, the effect of progression variable on the strength properties of concrete, Box–Behnken design of Response Surface Methodology was adopted. …”
Get full text
Article -
3872
Online Parameter Identification of the Lithium-Ion Battery with Refined Instrumental Variable Estimation
Published 2020-01-01“…The RIV estimation is implemented in a bootstrap form, which alternates between the estimation in the system model and the noise model. The Box-Jenkins model of the Li-ion battery transformed from the two RC ECM is selected as the transfer function model for the RIV estimation in this paper. …”
Get full text
Article -
3873
An English Teaching Pronunciation Detection and Recognition Algorithm Based on Cluster Analysis and Improved SSD
Published 2022-01-01“…Aiming at the poor effect and slow speed of the original SSD (Single Shot MultiBox Detector) algorithm in English teaching pronunciation detection, this paper proposes a clustering and improved SSD algorithm for English teaching pronunciation detection and recognition. …”
Get full text
Article -
3874
EC-PFN: a multiscale woven fusion network for industrial product surface defect detection
Published 2024-12-01“…The Loss Ranking Module (LRM) is incorporated to optimize the target-oriented loss, improving performance by omitting low-confidence bounding boxes. Extensive experiments on a light guide plate defect dataset demonstrate that EC-PFN achieves a detection accuracy (mAP) of 98.9%, a detection speed of 92 FPS, and a computational cost of 14.5 GFLOPs, outperforming mainstream surface defect detection models.…”
Get full text
Article -
3875
Towards Pedestrian Target Detection with Optimized Mask R-CNN
Published 2020-01-01“…In addition, according to the statistical law, the length-width ratio of the anchor box is modified to make it more accord with the natural characteristics of the pedestrian target. …”
Get full text
Article -
3876
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.…”
Get full text
Article -
3877
Explainable vision transformer for automatic visual sleep staging on multimodal PSG signals
Published 2025-01-01“…While machine-learning models have improved PSG scoring, their clinical use is hindered by the ‘black-box’ nature. In this study, we present SleepXViT, an automatic sleep staging system using Vision Transformer (ViT) that provides intuitive, consistent explanations by mimicking human ‘visual scoring’. …”
Get full text
Article -
3878
'Micro-Gold' Miniature Dwarf Tomato
Published 2005-04-01“…It is also ideal for window boxes or garden borders because the plant canopy diameter is only 19 cm (spring) to 26 cm (fall) (Table 1). …”
Get full text
Article -
3879
The Effect of Government Subsidies on Firm R&D Investment in China: From Perspectives of Ownership and Market Power
Published 2022-01-01“…This study not only fills the theoretical black box of the relationship between government subsidies and enterprise innovation but also provides relatively new empirical evidence for the related research on innovation subsidies in developing countries.…”
Get full text
Article -
3880
Advanced Pedestrian Distance Estimation for ADAS with Canny Edge Detection and Stereo Vision
Published 2025-01-01“…The approach integrates Canny edge detection with ORB (Oriented FAST and Rotated BRIEF) feature matching to efficiently identify and track keypoints within pedestrian bounding boxes. This method not only improves the accuracy of distance estimation but also reduces computational demands, making it suitable for real-time applications. …”
Get full text
Article