Suggested Topics within your search.
Suggested Topics within your search.
-
4781
-
4782
Compassionate Care with Autonomous AI Humanoid Robots in Future Healthcare Delivery: A Multisensory Simulation of Next-Generation Models
Published 2024-11-01“…The study employs computational simulations using mathematical and agent-based modeling to analyze human–robot interactions (HRIs) surpassing Tetsuya Tanioka’s TRETON. …”
Get full text
Article -
4783
-
4784
-
4785
-
4786
-
4787
Intersection theory, relative cohomology and the Feynman parametrization
Published 2025-05-01Get full text
Article -
4788
Development of a software and hardware solution to identify trends in demand for goods
Published 2023-05-01“…To evaluate the effectiveness of the obtained data processing model, a sample obtained from open sources is used.Result. As a result of the study, a technical solution has been developed that allows analyzing the demand for goods in a given time range based on data from open sources.Conclusion. …”
Get full text
Article -
4789
Multidimensional Small Baseline Subset (MSBAS) Software for Constrained and Unconstrained Deformation Analysis of Partially Coherent DInSAR and Speckle Offset Data
Published 2024-12-01“…Differential Interferometric Synthetic Aperture Radar (DInSAR) and speckle offset data are used to measure ground deformation. Computing deformation time series from these data can be challenging due to varying radar line-of-sight acquisition geometry, rapid coherence loss, and the large datasets involved requiring computationally intensive processing. …”
Get full text
Article -
4790
Addressing the dynamic nature of reference data: a new nucleotide database for robust metagenomic classification
Published 2025-04-01“…These new databases, made available as pre-built Centrifuge indexes, respond to the need for an open, robust, nt-based pipeline for taxonomic classification in metagenomics. …”
Get full text
Article -
4791
Transfer learning from inorganic materials to ivory detection
Published 2025-05-01Get full text
Article -
4792
CABAD: A video dataset for benchmarking child aggression recognition
Published 2025-08-01“…Addressing this gap, we introduce a new dataset Child Aggression Behavior Analysis Dataset (CABAD), comprising 900 videos collected from open-source platforms. CABAD comprises six aggressive classes, including “Hitting,” “Throwing Object,” “Kicking Surface,” “Breaking Object,” “Slamming Door,” and “Pushing”. …”
Get full text
Article -
4793
-
4794
Advanced Human Pose Estimation and Event Classification Using Context-Aware Features and XGBoost Classifier
Published 2024-01-01Get full text
Article -
4795
Resummed effective actions and heat kernels: the Worldline approach and Yukawa assisted pair creation
Published 2025-07-01Get full text
Article -
4796
-
4797
Modulation of electrical activity of proteinoid microspheres with chondroitin sulfate clusters.
Published 2024-01-01“…Our study might shed light on evolution of synaptic plasticity's molecular mechanisms and the role of extracellular matrix-protein interactions in learning, and open up possibilities for novel methods in unconventional computing and the development of adaptable, brain-inspired computational systems.…”
Get full text
Article -
4798
Integrable conformal defects in N $$ \mathcal{N} $$ = 4 SYM
Published 2025-07-01Get full text
Article -
4799
Fault-Tolerance Distributed Control Plane for Software Defined Networks
Published 2019-03-01“…The architecture of the high availability distributed control plane for SDN/OpenFlow networks are considered. High availability is achieved by redundancy of controller instances, active switch-controller communications, computing resources and tools for a controller instance failure and overloading detection and recovery. …”
Get full text
Article -
4800
Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters
Published 2012-07-01“…It is an open problem to combine many distinguishing characters to construct a distinguisher with more advantage.An optimal combined distinguisher based on multiple independent distinguishing characters was proposed.The computing method of distinguishing advantage of this combined distinguisher was presented and the conclusion was given that the data complexity decreased on the condition of same distinguishing advantage,and the distinguishing advantage increased on the condition of the same data complexity when more distinguishing characters were used in distinguishing attack.Let N denote the data complexity of distinguisher with only one character,then the data complexity of combined distinguisher with k-independent characters was about N/k for special case that all distinguishing advantages of k-independent characters were equal.…”
Get full text
Article