Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
25361
Perception of Polish accent in a re-synthesized speech signal
Published 2014-05-01“…The utterance /vidzitceteras/ was spoken, in three versions, with the accent (I) on the first, (II) on the second and (IV) on the fourth syllable. Using a package of computer programs for speech processing which executes analysis and synthesis by linear prediction, the fundamental frequency parameter, or F_0, was mutually exchaned among the three versions, in two listening experiments. …”
Get full text
Article -
25362
Adaptive Refinement of Segmented Object Contour Based on the Brightness of Neighboring Pixels Using the Ensemble Method
Published 2024-12-01“…Improving the accuracy of computer vision algorithms plays a significant role in the tasks of medical image segmentation. …”
Article -
25363
Application of Fast Kurtosis Spectrum in Fault Feature Extraction of Compound Planetary Gear
Published 2019-01-01“…Fast kurtosis specturm has fast detection ability for transient impulse signal and is widely used in fault feature extraction of rotating machinery. A process of extracting mechanical fault feature based on fast computation of kurtogram is proposed and which is applied to the fault feature extraction of composite planetary gears of a tank gearbox. …”
Get full text
Article -
25364
Negative feedback and transcriptional overshooting in a regulatory network for horizontal gene transfer.
Published 2014-02-01“…This ability, however, poses specific requisites on plasmid physiology, in particular the need to overcome a multilevel selection process with opposing demands. We analyzed the transcriptional network of plasmid R388, one of the most promiscuous plasmids in Proteobacteria. …”
Get full text
Article -
25365
THE STRENGTH MODELING OF BOGIE WELDED FRAME AND ITS INFLUENCE ON LIFE PREDICTION
Published 2018-01-01“…In order to discuss the rationality of fatigue analysis models of bogie welded frame,this paper regards box girder as the research object and establishes nominal stress model,structure stress model and notch stress model by aiming at different processing methods of main weld. Through stress characteristics,fatigue assessment,cumulative damage,and weld parameter influence of three models are compared. …”
Get full text
Article -
25366
LMAD-YOLO: A vehicle image detection algorithm for drone aerial photography based on multi-scale feature fusion.
Published 2025-01-01“…In the process of UAV small target vehicle detection, it is difficult to extract the features because of the small target shape of the vehicle, the environment noise is big, the vehicles are dense and easy to miss detection. …”
Get full text
Article -
25367
Envisioning Archival Images with Artificial Intelligence
Published 2024-11-01“…The review highlights the potential of AI, particularly computer vision (CV), to address the challenges associated with processing large volumes of digital images. …”
Get full text
Article -
25368
Logical Noise Bias in Magic State Injection
Published 2025-06-01“…Fault-tolerant architectures aim to reduce the noise of a quantum computation. Despite such architectures being well studied a detailed understanding of how noise is transformed in a fault-tolerant primitive such as magic state injection is currently lacking. …”
Get full text
Article -
25369
Advanced hybrid machine learning based modeling for prediction of properties of ionic liquids at different temperatures
Published 2025-07-01“…Abstract Ionic liquids have attracted much attention in different fields such as chemical and pharmaceutical industries for green processing. Their physicochemical properties should be estimated via advanced methods to save time and costs of experimentation. …”
Get full text
Article -
25370
Social Worked-Examples Technique to Enhance Student Engagement in Program Visualization
Published 2019-06-01“…Learning programming is among the top challenges in computer science education. A part of that, program visualization (PV) is used as a tool to overcome the high failure and drop-out rates in an introductory programming course. …”
Get full text
Article -
25371
A weighted and distributed algorithm for multi-hop localization
Published 2019-06-01“…The iterative process of each unknown sensor to re-estimate its own location allows a significant reduction of initial position estimates. …”
Get full text
Article -
25372
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01“…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
Get full text
Article -
25373
Comparison of Triple-Tube Heat Exchanger and Spherical Ice Balls for Energy Storage Performance: A Numerical Study
Published 2025-08-01“…The TTHE design was first analyzed theoretically, then optimized using Computational Fluid Dynamics (CFD) simulations, and validated by the literature. …”
Get full text
Article -
25374
Valuation of the Prepayment Option of a Perpetual Corporate Loan
Published 2013-01-01“…The default intensity of the firm is supposed to follow a CIR process. We assume that the contractual margin of the loan is defined by the credit quality of the borrower and the liquidity cost that reflects the funding cost of the bank. …”
Get full text
Article -
25375
Semantic mapping techniques for indoor mobile robots: Review and prospect
Published 2025-03-01“…With the continuous development of robotics and computer vision technology, mobile robots have been widely applied in various fields. …”
Get full text
Article -
25376
-
25377
Revisiting non-fungible token (NFT) research trends: a bibliometric study and future research directions
Published 2025-12-01Get full text
Article -
25378
-
25379
Experimental Study of Interphase Heat Transfer with Free Vapor Bubble Condensation Caused by Rapid Pressure Increase
Published 2025-06-01“…A processing method for the interphase coefficient in the rapid pressure change process was proposed in the experiment. …”
Article -
25380
Three-Dimensional Semantic Segmentation of Palatal Rugae and Maxillary Teeth and Motion Evaluation of Orthodontically Treated Teeth Using Convolutional Neural Networks
Published 2025-06-01“…Neither pre- nor post-processing of the data was required to enhance segmentation. …”
Get full text
Article