-
581
REDETR-RISTD: Real-Time Long-Range Infrared Small Target Detection Network Based on the Reparameterized Efficient Detection Transformer
Published 2025-04-01“…REDETR-RISTD maintains accuracy while significantly reducing computational complexity. First, we introduce a self-developed reparameterized multi-scale feature extraction module (RMSFE). …”
Get full text
Article -
582
Express method for contactless measurement of parameters of thermoelectric materials
Published 2015-08-01“…Its distinctive feature is the ability to determine the symmetric and asymmetric components of the electric conductivity of the material values. …”
Get full text
Article -
583
LH-YOLO: A Lightweight and High-Precision SAR Ship Detection Model Based on the Improved YOLOv8n
Published 2024-11-01“…LH-YOLO features only 1.862 M parameters, representing a 38.1% reduction compared to YOLOv8n. …”
Get full text
Article -
584
Classifying seismic event parameters using artificial intelligence
Published 2025-05-01Get full text
Article -
585
YOLO-Dynamic: A Detection Algorithm for Spaceborne Dynamic Objects
Published 2024-11-01“…SC_Block_C2f, developed in this study, integrates StarNet and Convolutional Gated Linear Unit (CGLU) operations, improving small-object recognition and feature extraction. Meanwhile, LASF_Neck employs a lightweight multi-scale architecture for optimized feature fusion and faster detection. …”
Get full text
Article -
586
Channel computation based on multi-scale attention residual network
Published 2025-05-01Get full text
Article -
587
Mechanistic computational modeling of sFLT1 secretion dynamics.
Published 2025-08-01Get full text
Article -
588
A computational study of stimulus driven epileptic seizure abatement.
Published 2014-01-01Get full text
Article -
589
COMPUTED TOMOGRAPHY IN STUDYING THE SURGICAL ANATOMY OF THE POSTERIOR CRANIAL FOSSA
Published 2016-02-01“…Objective: to determine the individual roentgenometric parameters of the posterior cranial fossa and the specific features of the location of brain structures on computed tomography scans in terms of their possible use on planning surgical approaches.Material and methods. …”
Get full text
Article -
590
Investigation of a Markov Model for Computer System Security Threats
Published 2017-08-01“…In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. …”
Get full text
Article -
591
Ten recommendations for scanning foraminifera by X-ray computed tomography
Published 2025-04-01“…</p> <p>In our case study, the highest beam power resulted in the widest contrast between the subject of interest and the background, allowing the easiest threshold-based segmentation of the object and aiding computers in automated feature extraction.</p> <p>The values of these parameters can exhibit significant variability across individuals, based on the specific needs of the study, the equipment used, and the unique attributes of the samples under consideration. …”
Get full text
Article -
592
Copula Approximate Bayesian Computation Using Distribution Random Forests
Published 2024-09-01“…This <i>Stats</i> invited feature article introduces and provides an extensive simulation study of a new approximate Bayesian computation (ABC) framework for estimating the posterior distribution and the maximum likelihood estimate (MLE) of the parameters of models defined by intractable likelihoods, that unifies and extends previous ABC methods proposed separately. …”
Get full text
Article -
593
Matrix computation over homomorphic plaintext-ciphertext and its application
Published 2024-02-01“…Those homomorphic encryption schemes supporting single instruction multiple data (SIMD) operations effectively enhance the amortized efficiency of ciphertext computations, yet the structure of ciphertexts leads to high complexity in matrix operations.In many applications, employing plaintext-ciphertext matrix operations can achieve privacy-preserving computing.Based on this, a plaintext-ciphertext matrix multiplication scheme for matrices of arbitrary dimension was proposed.The resulting ciphertext was computed through steps such as encoding the plaintext matrix, transforming the dimensions of the encrypted matrix, etc.Compared to the best-known encrypted matrix multiplication algorithm for square matrices proposed by Jiang et al., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
Get full text
Article -
594
Enhanced detection of malaria infected red blood cells through phase driven classification
Published 2025-08-01Get full text
Article -
595
Phenotypic and genetic characteristics of retinal vascular parameters and their association with diseases
Published 2024-11-01Get full text
Article -
596
On the Effects of Parameters on Galaxy Properties in CAMELS and the Predictability of Ωm
Published 2025-01-01Get full text
Article -
597
Lightweight rice leaf spot segmentation model based on improved DeepLabv3+
Published 2025-08-01“…Meanwhile, the PagFm-Ghostconv Feature Fusion (PGFF) module was proposed to significantly reduce the computational overhead of the model. …”
Get full text
Article -
598
PolSAR image classification using complex-valued multiscale attention vision transformer (CV-MsAtViT)
Published 2025-03-01“…The model also demonstrates efficient computational performance, minimizing the number of parameters while preserving high accuracy. …”
Get full text
Article -
599
Quantitative analysis of gait parameters in Parkinson’s disease and the clinical significance
Published 2025-08-01Get full text
Article -
600
Monitoring of an Electromechanical Prototype Material for Environmental Parameters Using IoT
Published 2022-01-01“…The article describes a computer prototype for monitoring and controlling the environmental parameters of a communication equipment room. …”
Get full text
Article