-
1
Loss Architecture Search for Few-Shot Object Recognition
Published 2020-01-01“…Few-shot object recognition, which exploits a set of well-labeled data to build a classifier for new classes that have only several samples per class, has received extensive attention from the machine learning community. …”
Get full text
Article -
2
Studying Forgetting in Faster R-CNN for Online Object Detection: Analysis Scenarios, Localization in the Architecture, and Mitigation
Published 2025-01-01“…Online Object Detection (OOD) requires learning new object categories from a stream of images, similar to an agent exploring new environments. …”
Get full text
Article -
3
Waking the ruin: Graham Harman’s object-oriented ontology, photogrammetry and the dami of Imbros
Published 2025-12-01“…Graham Harman’s object-oriented ontology (OOO) finds increasing interest across the arts and humanities, and offers a number of novel ways to rethink our relationship to architecture. …”
Get full text
Article -
4
New Figurations in Architecture Theory: From Queer Performance to Becoming Trans
Published 2017-12-01“…After a brief discussion of the history of exchanges between queer studies and architectural history and theory, the authors propose to complement the notion of queering with the new developments in the field of trans studies, which propose to rethink architecture in terms of a materialist understanding of buildings as bodies which are in a constant flux of change and becoming instead of fixed and stable objects or identities.…”
Get full text
Article -
5
A multi-task genetic programming approach for online multi-objective container placement in heterogeneous cluster
Published 2024-11-01“…Moreover, some container placement tasks often have similar characteristics (e.g., resource request types and physical machine types), but traditional single-task optimization modeling cannot exploit potential common knowledge, resulting in repeated optimization during resource allocation. Therefore, a new multi-task genetic programming method is proposed to solve the online multi-objective container placement problem (MOCP-MTGP). …”
Get full text
Article -
6
DA draws a circle: on document architecture and its relation to library and information science education and research
Published 2000-01-01“…Digital production and distribution reframe the ways in which objects and meta-objects might be construed. The mismatch of traditional library institutions and systems (where the printed codex book and its derivatives have been the standard of measurement) and digital carriers for bodies of text and the different architectures of these, suggests our great need for new fields of LIS research, where DA might prove a valuable tool. …”
Get full text
Article -
7
Space-ground integrated satellite communication network architecture for global energy internet
Published 2018-12-01“…The system monitoring and scheduling,time service and synchronization,object location and other businesses of global energy internet all need reliable communication networks,which are able to provide wide area coverage and ubiquitous flexible access services.According to the requirement,various new businesses and their data features with the background of the global energy interconnection were firstly analyzed,and then the unique characteristics of satellite communication technology and how it highly accords with the demands of the global energy internet were discussed.Then a space-ground integrated network architecture by the integration of satellite communication networks was presented.Based on IP technology,each network layer interconnects through various communication links,including satellite to satellite,space to ground,ground cable,wireless link,etc.…”
Get full text
Article -
8
Narkomfin’s new life. A ‘prosthesis’ for Ginzburg and Milinis’s masterpiece
Published 2021-06-01Get full text
Article -
9
New Evaluations and Restitution Suggestions for the Small Bath Structure at Phaselis
Published 2023-11-01Get full text
Article -
10
Digitally-Driven Architecture
Published 2010-01-01“…Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means. …”
Get full text
Article -
11
Internet of Things: Architectures, Protocols, and Applications
Published 2017-01-01Get full text
Article -
12
Review of next generation network architecture
Published 2010-01-01“…Diversities in mobility,ambienty,trusty and virtuality of heterogenous networks lead to a lot of research and new design in network architecture.The problems and challenges of network architecture in control,security and data plane were analyzed,and some proposed solutions such as those for Internet,telecommunication and military networks were summerized.Based on the network evolution history,it is pointed that the future development direction of network architecture is to extend in the planes of control,management,security and service.The flexible application(e.g.adaptation or nesting) and smart implementation(e.g.object/service/role oriented) of layered network architecture will enrich the paradigms of networks.…”
Get full text
Article -
13
An Update on Corneal Biomechanics and Architecture in Diabetes
Published 2019-01-01“…The objective of this review is to describe the advances in the knowledge of the corneal alterations that diabetes can induce.…”
Get full text
Article -
14
DEFINING THE CONCEPTS & APPROACHES IN VERNACULAR ARCHITECTURE STUDIES
Published 2020-12-01“…Phenomenology, hermeneutics, semiotics, gender studies, and feminism set new horizons for vernacular architectural research. …”
Get full text
Article -
15
Design and research of service customized networking architecture
Published 2024-02-01“…A new network architecture of SCN (service customized networking) was systematically expounded, which provided a novel network underlying capability and usage method for Internet applications.TCP/IP network architecture served the application with “best effort” quality of service, while SCN converted the subject-object relationship between the application and network that allowed the application to “on-demand customize” the QoS of networks.From the perspective of applications, three major connotations “declarable”, “fine-grained” and “end-to-end” were excavated to deduce the overall design of SCN, where a concrete SCN architecture and a feasible SCN system realization were present.In future, SCN can be applied in scenarios of man-machine-things, such as remote industrial control, and augment reality, to provide a novel and ideal means for NaaS (network as a service).…”
Get full text
Article -
16
SAILOR: perceptual anchoring for robotic cognitive architectures
Published 2025-01-01“…It provides a semantic world modeling approach using two deep learning-based sub-symbolic robotic skills: object recognition and matching function. The object recognition skill allows the robot to recognize and identify objects in its environment, while the matching function enables the robot to decide if new perceptual data corresponds to existing symbolic data. …”
Get full text
Article -
17
INFORMATION MODELING OF CONSTRUCTION OBJECTS: FEATURES OF APPLICATION AND DEVELOPMENT
Published 2020-09-01“…The concept of database creation (modeling) of a building object (Building Information Model further – BIM) – an approach to erection, equipment, support, operation and repair of a building, which includes collection and complex processing during the design process of architectural, technological, economic and other information about the building under construction has been considered. …”
Get full text
Article -
18
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
19
Evaluation of Turbojet Engine with Water Injection for Aircraft Use as Controlled Object
Published 2024-12-01“…The system’s quality was evaluated by performing studies that concern the turbojet’s main parameters (speed and combustor temperature) and time behavior (system response at step input), which led to some results and conclusions regarding how the water injection changed the properties of the engine as a controlled object: the engine has become slower with bigger static errors for the studied parameters (affecting the stabilization at their values imposed by the new operating regime). …”
Get full text
Article -
20
BWFER-YOLOv8: An Enhanced Cascaded Framework for Concealed Object Detection
Published 2025-01-01“…The nonuniform illumination also generates a higher false positive rate due to the limited ability to differentiate small hidden objects from the background of images. Several concealed object detection models have demonstrated outstanding performance but failed to combat the above-mentioned challenges concurrently. …”
Get full text
Article