Search alternatives:
transform » transport (Expand Search)
Showing 3,741 - 3,760 results of 6,775 for search 'different transform methods', query time: 0.17s Refine Results
  1. 3741

    Aligning to the teacher: multilevel feature-aligned knowledge distillation by Yang Zhang, Pan He, Chuanyun Xu, Jingyan Pang, Xiao Wang, Xinghai Yuan, Pengfei Lv, Gang Li

    Published 2025-08-01
    “…In order to effectively reduce the feature differences between teacher–student models, we propose a Multilevel Feature Alignment Knowledge Distillation method (MFAKD), which includes a spatial dimension alignment module and a multibranch channel alignment (MBCA) module. …”
    Get full text
    Article
  2. 3742

    Non-Complex Statistics-Driven Algorithm for Enhancement of Grayscale and Color Images by Ahmed Mohammed, Zohair Al-Ameen

    Published 2022-06-01
    “…The proposed algorithm consists of five stages, where the first and second stages include the use of two different statistical s-curve transformations, the third stage combines the outputs of the aforesaid stage, the fourth stage improves the brightness, and the fifth stage reallocates the pixels to the natural interval. …”
    Get full text
    Article
  3. 3743
  4. 3744

    Coverage intensity of optimal sensors for common, isolated, and integrated steel structures using novel approach of FEM-MAC-TTFD by Mehdi Firoozbakht, Hamidreza Vosoughifar, Alireza Ghari Ghoran

    Published 2019-08-01
    “…This approach was proposed based on combination of common optimal sensor placement algorithm and nonlinear time history analysis. A new method called transformed time history to frequency domain approach was evaluated to transform nonlinear time history analysis results to frequency domain and then the effective frequencies according the maximum range of Fourier amplitude were selected. …”
    Get full text
    Article
  5. 3745

    A dual attentional skip connection based Swin‐UNet for real‐time cloud segmentation by Fuhao Wei, Shaofan Wang, Yanfeng Sun, Baocai Yin

    Published 2024-10-01
    “…Existing deep learning based cloud segmentation methods involve two shortcomings. (a): They tend to produce discontinuous boundaries and fail to capture less salient feature, which corresponds to thin cloud pixels; (b): they are unrobust towards different scenarios. …”
    Get full text
    Article
  6. 3746

    Internet News Headlines: Ontological and Orthological Aspects by E. N. Shirokova

    Published 2021-12-01
    “…When solving this problem, special attention is paid to the formation of correlative paradigms of headings, united by a common denotative meaning. Methods of semantic interaction of heading paradigms based on different types of topic-rhematic deployment are described. …”
    Get full text
    Article
  7. 3747

    Traveling Plants: by Francesca Genna

    Published 2024-11-01
    “…Nature, which had always influenced my work, in a quest for knowledge of things through direct observation of the different forms of life, becomes a structural part, the very material of manipulation and transformation, vital energy for the appearance of images. …”
    Get full text
    Article
  8. 3748

    СОВЕРШЕНСТВОВАНИЕ ГОСУДАРСТВЕННОГО РЕГУЛИРОВАНИЯ АГРАРНОГО РЫНКА ТРУДА (НА ПРИМЕРЕ АКМОЛИНСКОЙ ОБЛАСТИ)...

    Published 2019-06-01
    “…In the course of carrying out the work, the author used general methodological principles that made it possible to most fully and objectively investigate problems.The labor market of Kazakhstan at the present stage is significantly different from labor markets in other countries due to its underdevelopment, which was facilitated by a number of reasons, such as difficulties in trans-forming the social and political system, lack of experience in institutionalizing market transformations, etc. …”
    Get full text
    Article
  9. 3749

    A Comparative Analysis of the Fractional-Order Coupled Korteweg–De Vries Equations with the Mittag–Leffler Law by Noufe H. Aljahdaly, Ali Akgül, Rasool Shah, Ibrahim Mahariq, Jeevan Kafle

    Published 2022-01-01
    “…This article applies efficient methods, namely, modified decomposition method and new iterative transformation method, to analyze a nonlinear system of Korteweg–de Vries equations with the Atangana–Baleanu fractional derivative. …”
    Get full text
    Article
  10. 3750

    Depth classification based on affine-invariant, weighted and kernel-based spatial depth functions by Olusola Samuel Makinde

    Published 2021-04-01
    “…Spatial depth is known to be invariant only to spherical and shift transformations. In this paper, the possibility of using different versions of spatial depth in classification is considered. …”
    Get full text
    Article
  11. 3751

    Detection of Flight Target via Multistatic Radar Based on Geosynchronous Orbit Satellite Irradiation by Jia Dong, Peng Liu, Bingnan Wang, Yaqiu Jin

    Published 2024-12-01
    “…Secondly, based on the aforementioned target multi-view detection data, the linear least square (LLS) multistatic positioning method combining bistatic range positioning (BR) and time difference of arrival positioning (TDOA) is used, which constructs the BR and TDOA measurement equations and linearizes by mathematical transformation. …”
    Get full text
    Article
  12. 3752

    Swimmer’s Head Detection Based on a Contrario and Scaled Composite JTC Approaches by D. Benarab, T. Napoléon, A. Alfalou, A. Verney, P. Hellard

    Published 2020-01-01
    “…To do that, we calibrate the pool using DLT (Direct Linear Transform) technique, extract the concerned lane, apply the frame difference approach to detect the moving objects, and then decompose the lane into blocs and classify them into swimmer motion or noise. …”
    Get full text
    Article
  13. 3753

    THE CONCEPT OF STATE ADMINISTRATION BY N. MACHIAVELLI by Alexander V. Butov

    Published 2017-09-01
    “…The article shows the key types of state structure in countries of the Ancient world and Medieval Europe, describes their advantages and disadvantages and investigates the round of different forms of state power. Frequent state transformations could lead to wars, long political and economic crises. …”
    Get full text
    Article
  14. 3754

    Multidimensional scale of meaningful work: construction and validation by Aleksandra Batuchina, Inga Iždonaitė-Medžiūnienė, Rron Lecaj

    Published 2025-03-01
    “…However, there is no unified definition of meaningful work as different fields attribute different dimensions to the concept. …”
    Get full text
    Article
  15. 3755

    A Content Analysis of Published Articles in Montenegrin Journal of Sports Science and Medicine from 2019 to 2020 by Marija Bubanja, Marina Vukotic, Ivan Vasiljevic

    Published 2020-04-01
    “…Also, results published in the magazine “Montenegrin Journal of Sports Science and Medicine” in the field of Sports training could be beneficial in monitoring athletes, notifying corrections during training methods, estimating and improving capability differences among athletes from different sports orientations.…”
    Get full text
    Article
  16. 3756

    Security access permission authentication simulation of multi-source network big data based on blockchain by Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO

    Published 2024-02-01
    “…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
    Get full text
    Article
  17. 3757

    Investigation of the Acceleration Spectrum of a Vibratory Roller in the Process of Soil Compaction by Evgenij A. Shishkin, Alexander A. Smolyakov

    Published 2025-04-01
    “…There are several indicators that are determined by the different harmonics of the acceleration frequency spectrum use. …”
    Get full text
    Article
  18. 3758

    Blended Learning in the Law Classroom: Design, Implementation and Evaluation of an Intervention in the First Year Curriculum Design by Melissa Castan, Ross Hyams

    Published 2017-01-01
    “…The authors use different general and specific scientific methods in conducting their research. …”
    Get full text
    Article
  19. 3759

    Kinematics of the Normal Knee during Dynamic Activities: A Synthesis of Data from Intracortical Pins and Biplane Imaging by Xavier Gasparutto, Florent Moissenet, Yoann Lafon, Laurence Chèze, Raphaël Dumas

    Published 2017-01-01
    “…This study aims at synthesising the tibiofemoral kinematics measured with gold standard measurement methods. Published kinematic data were transformed in the standard recommended by the International Society of Biomechanics (ISB), and a clustering method was applied to investigate whether the couplings between the degrees of freedom (DoFs) are consistent among the different activities and measurement methods. …”
    Get full text
    Article
  20. 3760

    Summarizing Online Patient Conversations Using Generative Language Models: Experimental and Comparative Study by Rakhi Asokkumar Subjagouri Nair, Matthias Hartung, Philipp Heinisch, Janik Jaskolski, Cornelius Starke-Knäusel, Susana Veríssimo, David Maria Schmidt, Philipp Cimiano

    Published 2025-04-01
    “…MethodsIn our experimental and comparative study, we applied 3 different language models (Flan-T5, Generative Pretrained Transformer [GPT], GPT-3, and GPT-3.5) in combination with various prompting strategies to the task of summarizing posts from patients in online communities. …”
    Get full text
    Article