Showing 421 - 440 results of 11,011 for search 'CNOH~', query time: 2.95s Refine Results
  1. 421

    A new clothing image retrieval algorithm based on sketch component segmentation in mobile visual sensors by Haopeng Lei, Yugen Yi, Yuhua Li, Guoliang Luo, Mingwen Wang

    Published 2018-11-01
    “…Nowadays, the state-of-the-art mobile visual sensors technology makes it easy to collect a great number of clothing images. Accordingly, there is an increasing demand for a new efficient method to retrieve clothing images by using mobile visual sensors. …”
    Get full text
    Article
  2. 422

    GravelSens: A Smart Gravel Sensor for High-Resolution, Non-Destructive Monitoring of Clogging Dynamics by Kaan Koca, Eckhard Schleicher, André Bieberle, Stefan Haun, Silke Wieprecht, Markus Noack

    Published 2025-01-01
    “…In this paper, we present a novel method for non-destructive, real-time measurements of pore-scale sediment deposition and monitoring of clogging by using wire-mesh sensors (WMSs) embedded in spheres, forming a smart gravel bed (GravelSens). …”
    Get full text
    Article
  3. 423
  4. 424

    Solving Phosphorus Fertilization-Related Drip Irrigation Emitter Clogging by Adding Mn<sup>2+</sup> by Tianyu Xu, Sanlin Bao, Qiuyue Yu, Yu Gao

    Published 2025-01-01
    “…Moreover, 2 mg/L of Mn<sup>2+</sup> was proposed to alleviate the clogging characteristics of APP4. This study could provide reference for improving the efficiency of the Songhua River drip irrigation system.…”
    Get full text
    Article
  5. 425

    IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions by Yuze Wang, Peng Liu, Yingtao Jiang

    Published 2022-07-01
    “…To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IMSC employs an ISA monitor to discover and correct any potential threats imposed by undocumented instructions, and it relies on a secure cache to ensure the credibility of the system. …”
    Get full text
    Article
  6. 426
  7. 427
  8. 428
  9. 429

    A Protective Role of Canonical Wnt/β-Catenin Pathway in Pathogenic Bacteria-Induced Inflammatory Responses by Zhongjia Jiang, Weiping Zhou, Xing Tian, Peng Zou, Ning Li, Chunmeng Zhang, Yanting Li, Guangyan Liu

    Published 2024-01-01
    “…Evidence accumulated so far has supported a repressive effect of the canonical Wnt/β-catenin pathway on microbial-triggered inflammation via diverse mechanisms, although that consequence is dependent on the cellular context, types of stimuli, and cytokine environment. …”
    Get full text
    Article
  10. 430

    Robust fully distributed file caching for delay-tolerant networks: A reward-based incentive mechanism by Sidi Ahmed Ezzahidi, Essaid Sabir, Sara Koulali, El-Houssine Bouyakhf

    Published 2017-04-01
    “…We model this distributed network interaction as a non-cooperative game. Namely, the source node offers to the relay nodes a positive reward if they accept to cache and to forward a given file successfully to a target destination, whereas the relay nodes may either accept or reject the source deal, depending on the reward attractiveness and on their battery status (their actual energy level). …”
    Get full text
    Article
  11. 431
  12. 432
  13. 433
  14. 434
  15. 435
  16. 436
  17. 437
  18. 438
  19. 439
  20. 440

    Empirical Research on the Relationship between Industry Working Capital Shortfall and Company Cash Holding in the Same Industry by Zhaohua Li, Junyi Jiang, Lijuan Xia, Chien-Chi Chu

    Published 2022-01-01
    “…From the perspective of preventive motivation of corporate cash holding, we creatively use the industry working capital shortfall as the explanatory variable to construct an Extended Cash Holding Model and a Cash Holding Value Regression Model. …”
    Get full text
    Article