Showing 1 - 20 results of 4,889 for search 'KDFW~', query time: 2.81s Refine Results
  1. 1

    KDFF-DETR: Knowledge-Driven Feature Fusion DETR for Spaceborne Infrared Ship Detection by Yifei Peng, Ze Tao, Jian Zhang, Rongchang Zhao, Chao Liu, Hui Sun

    Published 2025-01-01
    “…To address these challenges, we propose a knowledge-driven feature fusion detection transformer (KDFF-DETR) for spaceborne infrared ship detection. …”
    Get full text
    Article
  2. 2
  3. 3

    Trajectory Clustering in an Intersection by GDTW by Lei Gao, Lu Wei, Jian Yang, Jinhong Li

    Published 2022-01-01
    “…We propose a unified generalized DTW algorithm (GDTW) by extending the boundary constraint and continuity constraint of DTW and using the weighted local distance to normalize the cumulative distance. …”
    Get full text
    Article
  4. 4
  5. 5

    KDFE: Robust KNN-Driven Fusion Estimator for LEO-SoOP Under Multi-Beam Phased-Array Dynamics by Jiaqi Yin, Ruidan Luo, Xiao Chen, Linhui Zhao, Hong Yuan, Guang Yang

    Published 2025-07-01
    “…Both simulations and field tests demonstrate KDFE’s dual superiority: Doppler estimation errors were reduced by 26.3% (vs. …”
    Get full text
    Article
  6. 6

    Sense of Belonging, DFW Reduction, and Student Success: Centering Student Experience in Groups with Ethnographic Methods by Jennifer Meta Robinson, Rachel Seymour, Seonmi Jin, Rodney S. Whiteman

    Published 2025-04-01
    “…Despite substantial instructional attention to large-enrollment university courses in science, technology, engineering, and mathematics (STEM), they tend to have high rates of D, F, and Withdraw (DFW) at the introductory level that disproportionally disadvantage historically minoritized and underrepresented students, such as students identified as women, low-income, first-generation, or of color. …”
    Get full text
    Article
  7. 7

    A Novel KDF1 Variant is Associated With Multiple Natal Teeth, Tooth Agenesis, and Root Maldevelopment by John M. Graham, Jr., Pedro A. Sanchez-Lara, Atsushi Ohazama, Katsushige Kawasaki, Stefan T. Arold, Piranit Nik Kantaputra

    Published 2025-08-01
    “…Conclusions: Our study demonstrates for the first time that natal teeth, tooth agenesis, and root maldevelopment are caused by a KDF1 variant. Our study highlights the important role of KDF1 in tooth formation and eruption.…”
    Get full text
    Article
  8. 8
  9. 9

    The Fat Men of Wat Ko Kaew Suttharam by Winnie Lim

    Published 2025-03-01
    “… The murals of Wat Ko Kaew Suttharam, Phetchaburi have been well-studied. …”
    Get full text
    Article
  10. 10

    Design and Implementation of File Deduplication Framework on HDFS by Ruey-Kai Sheu, Shyan-Ming Yuan, Win-Tsung Lo, Chan-I Ku

    Published 2014-04-01
    “…File systems are designed to control how files are stored and retrieved. Without knowing the context and semantics of file contents, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. …”
    Get full text
    Article
  11. 11

    Elephant numbers in Kafue National Park, Zambia by Robert Guldemond, Emily Lehman, Sam Ferreira, Aarde, van

    Published 2005-12-01
    “… This article compares aerial survey data from the Kafue NP and surrounding GMAs from 1991 to 2004. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    HDFS-oriented cryptographic key resource control mechanism by Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG

    Published 2022-09-01
    “…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
    Get full text
    Article
  17. 17

    Župnijske kronike — kdaj slovenščina prevlada nad nemščino? by Matija Ogrin

    Published 2024-12-01
    “… V članku se lotevamo vprašanja, kdaj je v župnijskih kronikalnih besedilih nemščino nasledila slovenščina in nad njo postopoma prevladala ter v katerih zvrsteh kronik se je to v slovenskih deželah dogodilo prej, v katerih pozneje? …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20