Showing 3,061 - 3,080 results of 14,284 for search 'function construction', query time: 0.13s Refine Results
  1. 3061

    A Self-Supervised Adversarial Deblurring Face Recognition Network for Edge Devices by Hanwen Zhang, Myun Kim, Baitong Li, Yanping Lu

    Published 2025-07-01
    “…The model employs a generative adversarial network (GAN) as the core algorithm, optimizing its generation and recognition modules by decomposing the global loss function and incorporating a feature pyramid, thereby solving the balance challenge in GAN training. …”
    Get full text
    Article
  2. 3062

    Attitude Practical Stabilization of Underactuated Autonomous Underwater Vehicles in Vertical Plane by Yuliang Wang, Han Bao, Yiping Li, Hongbin Zhang

    Published 2024-10-01
    “…Due to the singularity of Euler angles and the ambiguity of quaternions, to further expand the attitude reachable range of underactuated AUVs in the vertical plane, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>S</mi><mi>O</mi><mo>(</mo><mn>3</mn><mo>)</mo></mrow></semantics></math></inline-formula> is used to represent the attitude change of underactuated AUVs. The transverse function of the attitude on <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>S</mi><mi>O</mi><mo>(</mo><mn>3</mn><mo>)</mo></mrow></semantics></math></inline-formula> is designed, and the exponential mapping method is used to construct the attitude kinematic controller of underactuated AUVs. …”
    Get full text
    Article
  3. 3063

    An innovative complex-valued encoding black-winged kite algorithm for global optimization by Chengtao Du, Jinzhong Zhang, Jie Fang

    Published 2025-01-01
    “…Abstract The black-winged kite algorithm (BKA) constructed on the black-winged kites’ migratory and predatory instincts is a revolutionary swarm intelligence method that integrates the Leader tactic with the Cauchy variation procedure to retrieve the expansive appropriate convergence solution. …”
    Get full text
    Article
  4. 3064

    Remote Sensing Discrimination Algorithm for Transmission Line Forest Fire Based on Fuzzy Comprehensive Evaluation Method by Bo TANG, Yaowei LI, Li YE, Li HUANG, Fating YUAN, Hao CHEN, Peng FENG

    Published 2019-11-01
    “…Then, the factor set is established as input with the six hazard factors, and the membership function is constructed and the weight vector is set. …”
    Get full text
    Article
  5. 3065

    A Novel Method for Inverting Deep-Sea Sound-Speed Profiles Based on Hybrid Data Fusion Combined with Surface Sound Speed by Qiang Yuan, Weiming Xu, Shaohua Jin, Xiaohan Yu, Xiaodong Ma, Tong Sun

    Published 2025-04-01
    “…The artificial lemming algorithm (ALA) is introduced to optimize the inversion of empirical orthogonal function (EOF) coefficients, enhancing global search efficiency while avoiding local optimization. …”
    Get full text
    Article
  6. 3066
  7. 3067

    Music intervention mitigates LPS-induced gut barrier disruption and immune stress in broilers via TLR4/NF-κB regulation by Shengzi Jin, Haowen Wang, Haiyue Gong, Lu Guo, Haoran Zhang, Jiaqi Zhang, Qingqing Chang, Jianhong Li, Runxiang Zhang, Jun Bao

    Published 2025-07-01
    “…In this study, we investigated the effects of a music-enriched environment on growth performance, intestinal barrier function, and inflammatory responses in lipopolysaccharide (LPS)-induced immunostressed broilers. …”
    Get full text
    Article
  8. 3068

    Approaches for Reducing Expert Burden in Bayesian Network Parameterization by Bodille P. M. Blomaard, Gabriela F. Nane, Anca M. Hanea

    Published 2025-05-01
    “…To lighten the elicitation burden, several methods have previously been developed to construct CPTs using a limited number of input parameters, such as InterBeta, the Ranked Nodes Method (RNM), and Functional Interpolation. …”
    Get full text
    Article
  9. 3069

    Evaluation of stress distribution patterns produced with the Advansync2 class II corrector - A finite element analysis by Meghna Mukhopadhyay, Agrima Thakur, Shubhnita Verma, Prasad Chitra

    Published 2023-05-01
    “…Methods: – A 3-D finite element model of the skull was constructed from images obtained from cone-beam computerized tomography images. …”
    Get full text
    Article
  10. 3070

    Verification of the person’s dynamic signature on a limited number of samples by V. V. Starovoitov

    Published 2024-06-01
    “…It is constructed using 5&lt;N&lt;20 samples of genuine human signatures. …”
    Get full text
    Article
  11. 3071
  12. 3072

    ‘Tiny but Mighty’ Conversational Elements: Explicating Non-lexical Backchannels in Spoken Turkish by Kadriye AYTAÇ DEMİRÇİVİ, Hale IŞIK-GÜLER

    Published 2023-12-01
    “…This paper analyzes the functions of non-lexical backchannels in the Spoken Turkish Corpus and the differences in their use in naturally formed combinatory groups of gender and age (young-middle aged-elderly). …”
    Get full text
    Article
  13. 3073

    The Role of Silence at the Retreats of a Buddhist Community by Orsolya Huszár

    Published 2016-12-01
    “…The present study will describe the communicative functions of silence through the findings of field work conducted at the retreats of a Buddhist community in Hungary, providing empirical input for the relevant theoretical constructs. …”
    Get full text
    Article
  14. 3074

    HARMONIC INTERPOLATING WAVELETS IN NEUMANN BOUNDARY VALUE PROBLEM IN A CIRCLE by Dmitry A. Yamkovoi

    Published 2019-07-01
    “…The representation by the interpolating wavelets is constructed by using an interpolation projection to subspaces of a multiresolution analysis with basis \(2 \pi\)-periodic scaling functions (more exactly, their binary rational compressions and shifts). …”
    Get full text
    Article
  15. 3075
  16. 3076

    Methods for Change Parallelism in Process of High-level VLSI Synthesis by Igor Nikolaevich Ryzhenko, Oleg Vladimirovich Nepomnyaschy, Aleksandr Ivanovich Legalov, Vladimir Viktorovich Shaidurov

    Published 2022-03-01
    “…The route of high-level VLSI synthesis is considered. The principle of constructing a VLSI hardware model based on the functional-flow programming paradigm is stated.The results of the development of methods and algorithms for transformation functional-parallel programs into programs in HDL languages that support the design process of digital chips are presented. …”
    Get full text
    Article
  17. 3077

    A Brief Overview of the Pawns Programming Language by Lee Naish

    Published 2024-11-01
    “…This analysis allows destructive update to be encapsulated: a function with no update annotations in its type signature is guaranteed to behave as a pure function, even though the value returned may have been constructed using destructive update within the function. …”
    Get full text
    Article
  18. 3078
  19. 3079

    Time-variant Granger causality analysis for intuitive perception collision risk in driving scenario: an EEG study by Zhe Wang, Jialong Liang, Shang Shi, Peng Zhai, Lihua Zhang, Lihua Zhang

    Published 2025-06-01
    “…By examining the node strength, we identify that the experienced drivers increase activation in intrinsic functional networks associated with visual attention and decision-making, which can be considered as the evidence for possessing better collision risk perception when compared to novice drivers. …”
    Get full text
    Article
  20. 3080

    Neurologopedic Correlates of Cognitive Ageing and Dementia by Joanna Rosińczuk, Magdalena Kazimierska-Zając, Robert Dymarek

    Published 2016-06-01
    “…Among people over 65 years old the spectrum of efficiency of cognitive functions can range from a lack of significant disorders through mild dysfunction to the processes of dementia, in which a reduction in the efficiency of intellectual makes unable the normal functioning in everyday life. …”
    Get full text
    Article