Showing 8,341 - 8,360 results of 21,428 for search '"computing"', query time: 0.07s Refine Results
  1. 8341
  2. 8342

    PC-CS-YOLO: High-Precision Obstacle Detection for Visually Impaired Safety by Jincheng Li, Menglin Zheng, Danyang Dong, Xing Xie

    Published 2025-01-01
    “…The system improves the backbone network by adopting the partial convolutional feed-forward network (PCFN) to reduce computational redundancy. Additionally, to enhance the network’s robustness in multi-scale feature fusion, we introduce the Cross-Scale Attention Fusion (CSAF) mechanism, which integrates features from different sensory domains to achieve superior performance. …”
    Get full text
    Article
  3. 8343

    An Empirical Study of Macroeconomic Factors and Stock Returns in the Context of Economic Uncertainty News Sentiment Using Machine Learning by Ayesha Jabeen, Muhammad Yasir, Yasmeen Ansari, Sadaf Yasmin, Jihoon Moon, Seungmin Rho

    Published 2022-01-01
    “…In addition, we only computed EUNS for the period of the fiscal budget announcement for the US, Turkey, and Hong Kong. …”
    Get full text
    Article
  4. 8344
  5. 8345
  6. 8346
  7. 8347

    Equilibrium Points and Related Periodic Motions in the Restricted Three-Body Problem with Angular Velocity and Radiation Effects by E. A. Perdios, V. S. Kalantonis, A. E. Perdiou, A. A. Nikaki

    Published 2015-01-01
    “…Also, for certain values of the parameters of the problem for which the equilibrium points are stable, the short and long period families have been computed. To do so, semianalytical expressions have been found for the determination of appropriate initial conditions. …”
    Get full text
    Article
  8. 8348

    Revocable identity‐based matchmaking encryption in the standard model by Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian

    Published 2023-07-01
    “…In particular, the authors give an effective and simple construction of RIB‐ME in the standard model, whose security is reduced to the hardness of decisional bilinear Diffie—Hellman problem and computational Diffie—Hellman problem. In addition, the authors show two extensions of our RIB‐ME scheme to consider chosen‐ciphertext security and forward privacy.…”
    Get full text
    Article
  9. 8349
  10. 8350
  11. 8351
  12. 8352
  13. 8353

    Swin-transformer for weak feature matching by Yuan Guo, Wenpeng Li, Ping Zhai

    Published 2025-01-01
    “…Abstract Feature matching in computer vision is crucial but challenging in weakly textured scenes due to the lack of pattern repetition. …”
    Get full text
    Article
  14. 8354
  15. 8355
  16. 8356

    Pose Measurement of the EndoWrist Round Tip Scissor Instrument with Optical Coherence Tomography by Schöne Sandra, Pol Nirmal, Kahrs Lueder A.

    Published 2024-09-01
    “…These image sequences were further processed through computer vision methods of the individual images followed by point cloud generation. …”
    Get full text
    Article
  17. 8357
  18. 8358
  19. 8359
  20. 8360