Showing 3,901 - 3,920 results of 5,905 for search 'Enfusion~', query time: 2.96s Refine Results
  1. 3901

    GGSYOLOv5: Flame recognition method in complex scenes based on deep learning. by Fucai Sun, Liping Du, Yantao Dai

    Published 2025-01-01
    “…Firstly, a global attention mechanism (GAM) was added to the CSP1 module in the backbone part of the YOLOv5 network, and then a parameterless attention mechanism was added to the feature fusion part. Finally, packet random convolution (GSConv) was used to replace the original convolution at the output end. …”
    Get full text
    Article
  2. 3902

    Populisme et gestion national-populaire du pouvoir en Bolivie : l’expérience du Mouvement nationaliste révolutionnaire – MNR– (1952-1964) by Christine Delfour

    Published 2005-09-01
    “…Furthermore it is characterized by porosity and even fusion between the public and the private, which thrives on the traditional links of social reciprocity and State domination – and thus generates a specific mode of political management. …”
    Get full text
    Article
  3. 3903

    Improved GOA-based fuzzy PI speed control of PMSM with predictive current regulation. by Taochang Li, Ang Li, Limin Hou

    Published 2025-01-01
    “…First, the diversity of the population and the global exploration capability of the algorithm are enhanced through the integration of the Cauchy mutation strategy and uniform distribution strategy. Subsequently, the fusion of Cauchy mutation and opposition-based learning, along with modifications to the optimal position, further improves the algorithm's ability to escape local optima. …”
    Get full text
    Article
  4. 3904

    Poetry as Pagan Pilgrimage: the ‘Animative Impulse’ of Thomas Hardy’s Verse by Laurence Estanove

    Published 2014-09-01
    “…Hardy’s interest in the fusion of Pagan and Christian beliefs, present in the surfacing traces of the past, actually depends on the human associations to be found there. …”
    Get full text
    Article
  5. 3905

    Dysregulation of Mitochondrial Homeostasis in Cardiovascular Diseases by Ricky Patil, Hui Wang, Matthew Kazaleh, Gorav Ailawadi, Morgan Salmon

    Published 2025-01-01
    “…In this review, we will discuss these imbalances and, in particular, the potential role of mitochondrial fusion, fission, biogenesis, and mitophagy in the context of vascular diseases and how the dysregulation of normal function might contribute to disease progression. …”
    Get full text
    Article
  6. 3906

    Spoof speech detection based on context information and attention feature by Jia CHEN, Jianwu ZHANG, Zheliang ZHANG

    Published 2023-02-01
    “…With the rapid development of speech synthesis and speech conversion technology, methods of spoof speech detection still have problems such as low spoof detection accuracy and poor generality.Therefore, an end-to-end spoof detection method based on context information and attention feature was proposed.Based on deep residual shrinkage network (DRSN), the proposed method used the dual-branch context information coordination fusion module (DCCM) to aggregate rich context information, and fused features based on coordinate time-frequency attention (CTFA) to obtain cross-dimensional interaction features with context information, thus maximizing the potential of capturing artifacts.Compared with the best baseline system, in the ASVspoof 2019 LA dataset, the proposed method had reduced the EER and t-DCF performance indicators by 68% and 65% respectively, in the ASVspoof 2021 LA dataset, the EER and t-DCF of the proposed method were 4.81 and 0.311 5 and dropped by 48% and 10% separately.The experimental results show that this method can effectively improve the accuracy and generalization ability of spoof speech detection.…”
    Get full text
    Article
  7. 3907

    Multi-data fusionaided indoor localization based on continuous action space deep reinforcement learning by Xuechen CHEN, Jiaxuan YI, Aixiang WANG, Xiaoheng DENG

    Published 2024-03-01
    “…Significant attention has been paid to indoor localization using smartphones in both research and industry.However, the accuracy and robustness of localization remain challenging issues, particularly in complex indoor environments.In light of the prevalent incorporation of pedestrian dead reckoning (PDR) devices in contemporary smartphones, an advanced indoor localization fusion method, anchored in the twin delayed deep deterministic policy gradient (TD3) framework, was proposed.In this approach, a seamless integration of Wi-Fi information and PDR data was achieved.The localization process of PDR was modeled as a Markov process, and a comprehensive continuous action space was introduced for the agent.To evaluate the performance of the proposed method, experiments were conducted and this approach was compared with three state-of-the-art deep Q network (DQN) based indoor localization methods.The experimental results demonstrate that the proposed method significantly reduces localization errors and enhances overall localization accuracy.…”
    Get full text
    Article
  8. 3908

    Abnormal traffic detection method based on multi-scale attention feature enhancement by YANG Hongyu, ZHANG Haohao, CHENG Xiang

    Published 2024-11-01
    “…Finally, a feature enhancement network was used to increase the distinctiveness and expressiveness of local and global features, which were then fused using a weighted fusion approach to achieve abnormal traffic detection. …”
    Get full text
    Article
  9. 3909

    Network Anomaly Detection System with Optimized DS Evidence Theory by Yuan Liu, Xiaofeng Wang, Kaiyu Liu

    Published 2014-01-01
    “…Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
    Get full text
    Article
  10. 3910

    Object Detection Techniques in Autonomous Driving by Yu Jianlei

    Published 2025-01-01
    “…The review emphasizes the importance of developing more robust and adaptive models, and it outlines future directions such as enhancing sensor fusion methods, optimizing model architectures, and employing open-world learning to prepare for unexpected scenarios, ultimately aiming to improve the reliability and safety of autonomous driving technologies.…”
    Get full text
    Article
  11. 3911

    A Rare Occurrence of Bilateral Single-Rooted Mandibular First Molar by Urvashi Ujariya, Rajendra Bharatiya, Anjali Kothari, Viraj Shah, Mishri Parikh, Kruti Pandey, Dhara Mehta, Nishi Amin

    Published 2022-01-01
    “…There are few studies related to a lower number of roots and root canals, but the occurrence of bilateral mandibular first and second molars with the presence of root fusion resulting in a single root is very rare. This case report presents the nonsurgical endodontic management of the left and right mandibular first molars with the presence of a single root confirmed using a CBCT and treated by placing an apical MTA plug followed by backfill using thermoplasticised gutta percha.…”
    Get full text
    Article
  12. 3912

    Radar Selection Method Based on an Improved Information Filter in the LPI Radar Network by Zhenkai Zhang, Bing Zhang, Zhibin Xie, Yi Yang

    Published 2018-01-01
    “…Finally, the weight parameters for the tracking fusion are designed after the error covariance prediction of every working radar, in order to improve the IMM-IF. …”
    Get full text
    Article
  13. 3913

    A Wideband Hybrid Fractal Ring Antenna for WLAN Applications by Atif Jamil, Muhammad Rauf, Abdul Sami, Arsalan Ansari, Muhammad Dawood Idrees

    Published 2022-01-01
    “…This hybrid geometry is a fusion of meander and Koch curve shapes. The geometrical construction of the proposed antenna is compared to the standard Koch curve geometry. …”
    Get full text
    Article
  14. 3914

    A survey on Wi-Fi signal based identification technology by Zhongcheng WEI, Xinqiu ZHANG, Bin LIAN, Wei WANG, Jijun ZHAO

    Published 2021-12-01
    “…With the constant progress of the information technology, the research on identification is developing towards unawareness and automation, and applied widely in many fields, such as human-computer interaction, smart home and intelligent security.As a non-contact wireless sensing technology, Wi-Fi signal based identification is progressively evolving towards the directions of multi-attribute identification and legality verification.Firstly, the principle of wireless signal-based identification was introduced, and reviews pretreatment processes from the viewpoint of signal processing were reviewed.Then, identification implementation was discussed from two different bases of walking and daily activities.Two major development trends of identification which were multi-attribute identification and legality verification were discussed from function evolution’s views.Finally, the multiple research areas were indicated including hyper-level feature extraction, daily activities’ analysis, identification model construction, and multi-technology fusion as future directions of realizing more robust, diversify and universal identification, which would provide the important support for the research and development of Internet of things perception layer.…”
    Get full text
    Article
  15. 3915

    Delayed Hypersensitivity Reaction: An Increasingly Recognized Complication of Metal-on-Metal Total Disc Replacement by Mélodie-Anne Karnoub, Fahed Zairi, Rabih Aboukais, Richard Assaker

    Published 2015-01-01
    “…The prosthesis has been removed and a fusion achieved using a cage filled with bone graft. …”
    Get full text
    Article
  16. 3916

    Review on Fault Diagnosis Technology for High-speed EMU Gearboxes by Zhang Jianchao, Chen Xiangsong, Hao Rujiang, Gu Xiaohui, Ren Bin

    Published 2023-03-01
    “…The single diagnosis technology can not accurately diagnose the multi-type failures of the gearbox due to its limitations, and the fusion of multiple techniques based on advanced intelligent algorithms is expected to be one of the research focuses for fault diagnosis in this field in the future.…”
    Get full text
    Article
  17. 3917

    Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key by Xincheng YAN, Yue CHEN, Hongyong JIA, Yanru CHEN, Xinyue ZHANG

    Published 2018-05-01
    “…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
    Get full text
    Article
  18. 3918

    Application of Full Vector Deep Learning in Bearing Fault Diagnosis by Chen Chaoyu, Chen Lei, Zhang Wang, Han Jie

    Published 2019-01-01
    “…Firstly,full vector spectrum is used to fuze the binary channel signal,the main vibration vector data after full vector fusion is acquired,the disadvantage of incomplete single channel vibration signal is overcome. …”
    Get full text
    Article
  19. 3919

    Research on traffic identification and scheduling based on optical interconnection architecture in data center by Bingli GUO, Ning ZHAO, Zhiwen ZHU, Fan NING, Shanguo HUANG

    Published 2018-09-01
    “…In order to solve the data center link congestion problem,based on the characteristics of the flow distribution and flow types,a flow identification and scheduling scheme based on optical interconnect structure,named HCFD (host-controller flow detection),was proposed to identify the elephant flow which has a large impact on the network performance,and use the SDN controller to make forward strategy,and schedule the network traffic reasonably.The implementation of the scheme was to use the Netfilter framework in Linux kernel protocol on the host side to mark the flow that exceeds the threshold amount.Then,the classification model was used in the controller side to classify the marked flow.Finally,the appropriate forwarding strategy was developed based on the above results.With the advantage of the photoelectric network,mechanisms of flow depth fusion and switching could be realized.The scheme which integrates the advantage of the existing research results,was expected to identify elephant flow more accurately and comprehensively.It can effectively alleviate the network congestion,make full use of network bandwidth,reduce end-to-end delay and packet loss rate.…”
    Get full text
    Article
  20. 3920

    Design of a mass-customization-based cost-effective Internet of Things sensor system in smart building spaces by Sanguk Park, Sangmin Park, Jinsung Byun, Sehyun Park

    Published 2016-08-01
    “…In the coming Internet of Things era, billions of users and devices will be connected to the Internet; this will lead beyond the era of super-connection to the era of super-fusion. In this era, it is more important than ever to design a highly scalable Internet of Things infrastructure by mass customization for cost-effective production of exponentially increasing numbers of Internet of Things systems to provide more intelligent service in smart spaces. …”
    Get full text
    Article