Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5961
EM-based blind LDPC identification in multipath channels
Published 2018-09-01“…As the advent of cognitive radios,blind encoder identification has attracted increasingly attentions since it plays an important role.The existing works mainly focus on additive white Gaussian noise (AWGN) channel,while the blind identification in multipath scenarios has not been sufficiently investigated.Considering the blind low density parity-check (LDPC) codes identification in the presence of unknown multipath fading channel,a likelihood-based classifier was proposed using the expectation maximization (EM) algorithm to obtain the maximum likelihood estimates of the unknown parameters.Then,an average log-likelihood ratio (LLR) estimator was adopted to classify the unknown encoder.Numerical results show that the proposed algorithm provides promising identification performance in multipath channels,especially in the low signal-to-noise ratio region.…”
Get full text
Article -
5962
Teaching Evaluation Algorithm Based on Grey Relational Analysis
Published 2021-01-01“…Grey correlation analysis uses grey correlations to describe the strength, magnitude, and order of relationships among factors. The data sequence of the drmined data is used as a reference data string, and the data sequence matrix of each influence factor is used as a control data matrix to calculate the correlation between the data sequence and the reference of each factor in the control data matrix. …”
Get full text
Article -
5963
Distributed Sensor Network-Based Virtual FDR System
Published 2013-11-01“…To verify the validity of the proposed application, we conducted experiments using actual system data. The functionality of the proposed system was also verified by establishing a ZigBee-based wireless network for power monitoring and diagnosis of disturbances.…”
Get full text
Article -
5964
Ideal Illumination for Smartphone-based Trabeculectomy Bleb Photography
Published 2021-07-01“…Abstract Purpose: Ophthalmology has seen numerous novel uses for smartphones over the years including fundus photography, telemedicine, and operative videography. …”
Get full text
Article -
5965
Interleukin 2-Based Fusion Proteins for the Treatment of Cancer
Published 2021-01-01“…Interleukin 2 (IL-2) plays a fundamental role in both immune activation and tolerance and has revolutionized the field of cancer immunotherapy since its discovery. …”
Get full text
Article -
5966
Implementation architecture of mimic security defense based on SDN
Published 2017-10-01“…To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncertainty of system so as to improve network security.Based on the software defined networking (SDN),an implementation architecture of MSD was proposed.First,diverse functional equivalent variants for the protected target were constructed,then leverage the rich programmability and flexibility of SDN to realize the dynamic scheduling and decision-making functions on SDN controller.Simulation and experimental results prove the availability and the intrusion tolerant ability of the architecture.…”
Get full text
Article -
5967
Corrosion Performance of Cu-Based Coins in Artificial Sweat
Published 2016-01-01“…In general, nickel has a detrimental effect due to the formation of highly soluble Ni-based corrosion products.…”
Get full text
Article -
5968
Retracted: Study on the Macroeconomic Model Based on the Genetic Algorithm
Published 2023-01-01Get full text
Article -
5969
Zero-correlation zone complementary sets based on iteration
Published 2011-01-01“…Based on orthogonal matrices and interleaving iteration,two constructions of zero correlation zone comple-mentary(Z-complementary) sets were presented.The Z-complementary sets proposed not only have ideal auto-correlation and cross-correlation in a zone,but also have larger set sizes compared with the conventional comple-mentary sets.Moreover,their set sizes can achieve the theoretical bound.…”
Get full text
Article -
5970
Management of the User Experience Based on the Big Data Analysis
Published 2013-03-01Subjects: “…big data…”
Get full text
Article -
5971
Path recommendation based on geographic coordinates and trajectory data
Published 2017-05-01Subjects: Get full text
Article -
5972
Justification of Administrative Decisions on the Basis of Management Accounting Data
Published 2016-12-01Get full text
Article -
5973
Safety Profile of the New 5-ASA Based Compounds
Published 1990-01-01“…Diarrhea is more common with olsalazine, and it is due to the effect of olsalazine itself on the small bowel. not the 5-ASA component. There are case reports of pancreatitis, pericarditis and bronchospasm, retrosternal chest pain, mild neutropenia, nephrotic syndrome and hair loss associated with 5-ASA treatment. …”
Get full text
Article -
5974
Bioinspired Microhinged Actuators for Active Mechanism‐Based Metamaterials
Published 2025-01-01Subjects: Get full text
Article -
5975
Construction and Analysis of Emotion Computing Model Based on LSTM
Published 2021-01-01“…Long short-term memory (LSTM) processes the temporal characteristics of data and is mostly used for emotional text and speech recognition. …”
Get full text
Article -
5976
Brittleness Evaluation of Shale Based on the Brazilian Splitting Test
Published 2018-01-01“…Brittleness is an important mechanical parameter of shale reservoirs and has a significant effect on hydraulic fracturing. …”
Get full text
Article -
5977
Geotourism study of Ghezelowzan basin based on Fassoulas method
Published 2020-12-01“…Iran's vast country has different geographic conditions. …”
Get full text
Article -
5978
Multirotor UAV-Based Photogrammetric Mapping for Road Design
Published 2018-01-01“…This study involves four phases which consist of preliminary study, data collection, data processing, and analysis. This study focuses on the UAV as a tool to capture data of the ground from a certain altitude. …”
Get full text
Article -
5979
Broad-based Participatory Inquiry into the Definition and Scope of Disaster
Published 2017-07-01“…A "Disaster Definition and Scope Scale [DDSS]" developed by the researchers to inquire into the definition and scope of disasters was used as a data collection instrument. …”
Get full text
Article -
5980
Noise-attention-based forgery face detection method
Published 2023-08-01“…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
Get full text
Article