Showing 581 - 600 results of 2,900 for search '(feature OR features) parameters computational', query time: 0.20s Refine Results
  1. 581

    REDETR-RISTD: Real-Time Long-Range Infrared Small Target Detection Network Based on the Reparameterized Efficient Detection Transformer by Ning Li, Daozhi Wei

    Published 2025-04-01
    “…REDETR-RISTD maintains accuracy while significantly reducing computational complexity. First, we introduce a self-developed reparameterized multi-scale feature extraction module (RMSFE). …”
    Get full text
    Article
  2. 582

    Express method for contactless measurement of parameters of thermoelectric materials by A. A. Ashcheulov, I. A. Buchkovskii, I. S. Romanyuk

    Published 2015-08-01
    “…Its distinctive feature is the ability to determine the symmetric and asymmetric components of the electric conductivity of the material values. …”
    Get full text
    Article
  3. 583

    LH-YOLO: A Lightweight and High-Precision SAR Ship Detection Model Based on the Improved YOLOv8n by Qi Cao, Hang Chen, Shang Wang, Yongqiang Wang, Haisheng Fu, Zhenjiao Chen, Feng Liang

    Published 2024-11-01
    “…LH-YOLO features only 1.862 M parameters, representing a 38.1% reduction compared to YOLOv8n. …”
    Get full text
    Article
  4. 584
  5. 585

    YOLO-Dynamic: A Detection Algorithm for Spaceborne Dynamic Objects by Haiying Zhang, Zhengyang Li, Chunyan Wang

    Published 2024-11-01
    “…SC_Block_C2f, developed in this study, integrates StarNet and Convolutional Gated Linear Unit (CGLU) operations, improving small-object recognition and feature extraction. Meanwhile, LASF_Neck employs a lightweight multi-scale architecture for optimized feature fusion and faster detection. …”
    Get full text
    Article
  6. 586
  7. 587
  8. 588
  9. 589

    COMPUTED TOMOGRAPHY IN STUDYING THE SURGICAL ANATOMY OF THE POSTERIOR CRANIAL FOSSA by S. V. Ishkov

    Published 2016-02-01
    “…Objective: to determine the individual roentgenometric parameters of the posterior cranial fossa and the specific features of the location of brain structures on computed tomography scans in terms of their possible use on planning surgical approaches.Material and methods. …”
    Get full text
    Article
  10. 590

    Investigation of a Markov Model for Computer System Security Threats by Alexey A. A. Magazev, Valeria F. Tsyrulnik

    Published 2017-08-01
    “…In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. …”
    Get full text
    Article
  11. 591

    Ten recommendations for scanning foraminifera by X-ray computed tomography by A. Searle-Barnes, A. Brombacher, A. Brombacher, O. Katsamenis, O. Katsamenis, K. Rankin, M. Mavrogordato, T. Ezard

    Published 2025-04-01
    “…</p> <p>In our case study, the highest beam power resulted in the widest contrast between the subject of interest and the background, allowing the easiest threshold-based segmentation of the object and aiding computers in automated feature extraction.</p> <p>The values of these parameters can exhibit significant variability across individuals, based on the specific needs of the study, the equipment used, and the unique attributes of the samples under consideration. …”
    Get full text
    Article
  12. 592

    Copula Approximate Bayesian Computation Using Distribution Random Forests by George Karabatsos

    Published 2024-09-01
    “…This <i>Stats</i> invited feature article introduces and provides an extensive simulation study of a new approximate Bayesian computation (ABC) framework for estimating the posterior distribution and the maximum likelihood estimate (MLE) of the parameters of models defined by intractable likelihoods, that unifies and extends previous ABC methods proposed separately. …”
    Get full text
    Article
  13. 593

    Matrix computation over homomorphic plaintext-ciphertext and its application by Yang LIU, Linhan YANG, Jingwei CHEN, Wenyuan WU, Yong FENG

    Published 2024-02-01
    “…Those homomorphic encryption schemes supporting single instruction multiple data (SIMD) operations effectively enhance the amortized efficiency of ciphertext computations, yet the structure of ciphertexts leads to high complexity in matrix operations.In many applications, employing plaintext-ciphertext matrix operations can achieve privacy-preserving computing.Based on this, a plaintext-ciphertext matrix multiplication scheme for matrices of arbitrary dimension was proposed.The resulting ciphertext was computed through steps such as encoding the plaintext matrix, transforming the dimensions of the encrypted matrix, etc.Compared to the best-known encrypted matrix multiplication algorithm for square matrices proposed by Jiang et al., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
    Get full text
    Article
  14. 594
  15. 595
  16. 596
  17. 597

    Lightweight rice leaf spot segmentation model based on improved DeepLabv3+ by Jianian Li, Long Gao, Xiaocheng Wang, Jiaoli Fang, Zeyang Su, Yuecong Li, Shaomin Chen

    Published 2025-08-01
    “…Meanwhile, the PagFm-Ghostconv Feature Fusion (PGFF) module was proposed to significantly reduce the computational overhead of the model. …”
    Get full text
    Article
  18. 598

    PolSAR image classification using complex-valued multiscale attention vision transformer (CV-MsAtViT) by Mohammed Q. Alkhatib

    Published 2025-03-01
    “…The model also demonstrates efficient computational performance, minimizing the number of parameters while preserving high accuracy. …”
    Get full text
    Article
  19. 599
  20. 600

    Monitoring of an Electromechanical Prototype Material for Environmental Parameters Using IoT by P. Bharat Siva Varma, Kothapalli Phani Varma, V. Anjani Kranthi, Anusha Rudraraju, Nalla Nandakishore

    Published 2022-01-01
    “…The article describes a computer prototype for monitoring and controlling the environmental parameters of a communication equipment room. …”
    Get full text
    Article