Search alternatives:
additive » addition (Expand Search), adaptive (Expand Search)
Showing 81 - 100 results of 370 for search 'Additive computational modification', query time: 0.08s Refine Results
  1. 81
  2. 82

    Multi-Disciplinary Investigations on the Best Flying Wing Configuration for Hybrid Unmanned Aerial Vehicles: A New Approach to Design by Janani Priyadharshini Veeraperumal Senthil Nathan, Martin Navamani Chellapandian, Vijayanandh Raja, Parvathy Rajendran, It Ee Lee, Naveen Kumar Kulandaiyappan, Beena Stanislaus Arputharaj, Subhav Singh, Deekshant Varshney

    Published 2025-07-01
    “…The optimization process continues to add more desired modifications to the model, to finalize the best design of flying wing frame for the chosen application and mission profile. …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    Real Estate Attribute Value Extraction Using Large Language Models by Michal Kvet, Miroslav Potocar, Slavomir Tatarka

    Published 2025-01-01
    “…Applying all tested input modifications (Oracle Attributes, Oracle Sentences, and Additional Descriptions) allowed the largest model tested to achieve a micro F1 score of 97.92%, demonstrating the effectiveness of these techniques in improving extraction accuracy and efficiency. …”
    Get full text
    Article
  6. 86

    Deep-m6Am: a deep learning model for identifying N6, 2′-O-Dimethyladenosine (m6Am) sites using hybrid features by Islam Uddin, Salman A. AlQahtani, Sumaiya Noor, Salman Khan

    Published 2025-03-01
    “…The proposed framework employs a comprehensive feature extraction process, i.e., integrating pseudo single nucleotide composition (PseSNC), pseudo dinucleotide composition (PseDNC), and pseudo trinucleotide composition (PseTNC) to capture complex sequence patterns. To enhance computational efficiency and eliminate noisy or redundant features, a supervised SHAP (SHapley Additive exPlanations) algorithm is utilized, ensuring the selection of the most informative features. …”
    Get full text
    Article
  7. 87

    A Combination of Hill Cipher and LSB for Image Security by Ibnu Utomo Wahyu Mulyono, Ajib Susanto, Muhamad Rizky Fajar Febrian, Ghaitsa Ardelia Rosyida

    Published 2020-06-01
    “…The maximum value obtained to test the encrypt hill cipher uses the avalanche effect with modification of one, two, three, and four key matrices 35.71%, therefore an additional security technique is needed. …”
    Get full text
    Article
  8. 88

    Radiofrequency ablation of hepatocellular carcinoma guided by real-time physics-based ablation simulation: a prospective study by Eric K. Hoffer, Mary C. Drinane, Vikrant Bhatnagar, Riya Mehta, David P. Munger, Andrea Borsic

    Published 2024-12-01
    “…Procedure planning and intraprocedural modifications were guided by computer simulation of each ablation. …”
    Get full text
    Article
  9. 89

    High-throughput phenotyping tools for blueberry count, weight, and size estimation based on modified YOLOv5s by Xingjian Li, Sushan Ru, Zixuan He, James D. Spiers, Lirong Xiang

    Published 2025-01-01
    “…The second pipeline deployed YOLOv5 models with additional modifications using the Ghost module and bi-Feature Pyramid Network (biFPN). …”
    Get full text
    Article
  10. 90

    Structural Component Identification and Damage Localization of Civil Infrastructure Using Semantic Segmentation by Piotr Tauzowski, Mariusz Ostrowski, Dominik Bogucki, Piotr Jarosik, Bartłomiej Błachowski

    Published 2025-07-01
    “…With the increasing capabilities of computers, deep neural networks have become a standard tool and can be used for structural health inspections. …”
    Get full text
    Article
  11. 91

    Efficient Transformer-Based Road Scene Segmentation Approach with Attention-Guided Decoding for Memory-Constrained Systems by Bartas Lisauskas, Rytis Maskeliunas

    Published 2025-05-01
    “…Accurate object detection and an understanding of the surroundings are key requirements when applying computer vision systems in the automotive or robotics industries, namely with autonomous vehicles or self-driving robots. …”
    Get full text
    Article
  12. 92
  13. 93

    Detection of Masses in Mammogram Images Based on the Enhanced RetinaNet Network With INbreast Dataset by Wang M, Liu R, Luttrell IV J, Zhang C, Xie J

    Published 2025-02-01
    “…Mingzhao Wang,1 Ran Liu,1 Joseph Luttrell IV,2 Chaoyang Zhang,2 Juanying Xie1 1School of Computer Science, Shaanxi Normal University, Xian, People’s Republic of China; 2School of Computing Sciences and Computer Engineering, University of Southern Mississippi, Hattiesburg, MS, USACorrespondence: Juanying Xie, School of Computer Science, Shaanxi Normal University, No. 620, West Chang’an Avenue, Chang’an District, Xi’an, 710119, Shaanxi, People’s Republic of China, Tel +86 13088965815, Email xiejuany@snnu.edu.cn Chaoyang Zhang, School of Computing Sciences and Computer Engineering, University of Southern Mississippi, 118 College Drive, Hattiesburg, MS, 39406-0001, USA, Email chaoyang.zhang@usm.eduPurpose: Breast cancer is the most common major public health problems of women in the world. …”
    Get full text
    Article
  14. 94

    Efficient attention vision transformers for monocular depth estimation on resource-limited hardware by Claudio Schiavella, Lorenzo Cirillo, Lorenzo Papa, Paolo Russo, Irene Amerini

    Published 2025-07-01
    “…More specifically, optimization has been applied not only to the entire network but also independently to the encoder and decoder to assess the model’s sensitivity to these modifications. Additionally, this paper introduces the use of the Pareto Frontier as an analytic method to get the optimal trade-off between the two objectives of quality and inference time. …”
    Get full text
    Article
  15. 95
  16. 96
  17. 97
  18. 98

    HELP OPTIONS AND MULTIMEDIA LISTENING: STUDENTS’ USE OF SUBTITLES AND THE TRANSCRIPT by Maja Grgurović, Volker Hegelheimer

    Published 2007-02-01
    “…As multimedia language learning materials become prevalent in foreign and second language classrooms, their design is an important avenue of research in Computer-Assisted Language Learning (CALL). Some argue that the design of the pedagogical materials should be informed by theory such as the interactionist SLA theory, which suggests that input modification can help comprehension, but does not provide specific guidance regarding choices designers should make when they attempt to implement theory-based features like modified input. …”
    Get full text
    Article
  19. 99
  20. 100

    Standardization of Lung CT Number Using COPD Gene2 Phantom Under Various Scanning Protocols by Hoondong Song, Hanjoo Jang, Jongduk Baek

    Published 2025-05-01
    “…Lung computed tomography (CT) images are widely used to diagnose chronic obstructive pulmonary disease (COPD) by evaluating signs of lung tissue destruction. …”
    Get full text
    Article