-
1261
Improving Indonesian students' mathematical literacy with brain-based learning: a comparative study of pisa scores
Published 2024-09-01“…The results of the n-gain analysis indicated that the data were normally distributed with homogeneous variances. …”
Get full text
Article -
1262
-
1263
Privacy-Preserving Spatial Crowdsourcing Drone Services for Postdisaster Infrastructure Monitoring: A Conditional Federated Learning Approach
Published 2025-01-01“…A key challenge in FL is the presence of nonindependent and identically distributed data across clients, which degrades global model performance. …”
Get full text
Article -
1264
A global Swin-Unet Sentinel-2 surface reflectance-based cloud and cloud shadow detection algorithm for the NASA Harmonized Landsat Sentinel-2 (HLS) dataset
Published 2025-06-01“…All the CloudSEN12 annotations with coincident HLS Sentinel-2 data were considered. A total of 8672 globally distributed 5 × 5 km data sets were used, 7362 to train the model, 464 for internal model validation, and 846 to independently assess the classification accuracy. …”
Get full text
Article -
1265
Signaling competence of agricultural businesses through social media presence to attract gen Z
Published 2025-06-01“…About 376 data units were collected and analyzed using the moderated mediation model in Hayes' PROCESS Macro. …”
Get full text
Article -
1266
STUDENTS' MATHEMATICAL REPRESENTATION AND REASONING SKILLS THROUGH AN ETHNOMATHEMATICS-BASED RME APPROACH
Published 2024-10-01“…The normality test showed that the data in both groups were normally distributed. The data homogeneity test also shows that the data in both groups are homogeneous. …”
Get full text
Article -
1267
Conformal Segmentation in Industrial Surface Defect Detection with Statistical Guarantees
Published 2025-07-01“…The detection model is improved by retraining with calibration data that is assumed to be independent and identically distributed (i.i.d) with the test data. …”
Get full text
Article -
1268
A sparse and invisible targeted backdoor attack in federated learning
Published 2025-07-01“…Abstract In distributed edge Computing scenarios within the Internet of Things (IoT), individual clients are susceptible to adversarial backdoor attacks, wherein malicious modifications to local data may be introduced. …”
Get full text
Article -
1269
SPLAS: An Autonomous Lightweight and Versatile Image Classification Robustness Benchmark
Published 2025-01-01“…It contains <inline-formula> <tex-math notation="LaTeX">$50\,000$ </tex-math></inline-formula> images evenly distributed over <inline-formula> <tex-math notation="LaTeX">$1\,000$ </tex-math></inline-formula> classes and evaluates a classification model in five aspects: accuracy on intrinsically difficult images, images with partial information, robustness against low resolution, adversarial attacks, and speckle noise. …”
Get full text
Article -
1270
Cooperative MAC protocol based on network coding and space-time coding
Published 2013-09-01“…Aiming at the problems in wireless ad hoc networks,such as relays’ low efficiency caused by cooperation and difficult to meet the different QoS requirements,a co e MAC protocol was proposed based on the combination of network coding and space-time coding(NSTCMAC).Based on NSTCMAC protocol with the combination of Network coding and space-time coding techniques,a kind of cooperative MAC transmission mechanism that could distinguish the type of DATA packet was designed in order to meet the QoS requirements of different types of transm Further more,cooperative transmission mechanism and its performance were analyzed through Markov chain model.When transmitting the non-real-time(NR) packets,network coding was adopted to improve the efficiency of relay nodes; when transmitting the real-time(R) packets,randomized distributed space-time coding(R-DSTC)was used to enhance the reliability of transmission.Simulation results show that NSTCMAC protocol can meet different QoS requirements better,and solve the problem of relays’ low efficiency more effectively,when compared with legacy DCF、COOPMAC and CD-MAC protocol.…”
Get full text
Article -
1271
Detection of water-rich areas and seepage channels via the transient electromagnetic method, electrical resistivity tomography, and self-potential method
Published 2025-05-01“…The transient electromagnetic data facilitated the construction of a three-dimensional geoelectric model of the mine, from which the planar distribution of resistivity in the medium to coarse sandstone layers—likely reservoirs of groundwater—was derived. …”
Get full text
Article -
1272
Control strategy evaluation for reactive power management in grid-connected photovoltaic systems under varying solar conditions
Published 2025-07-01“…This research addresses this gap by modeling the dependence of reactive power on solar irradiance using a data-driven curve-fitting approach. …”
Get full text
Article -
1273
DETERMINING KEY DETERMINANTS OF DEMAND FOR INTERNATIONAL RESERVES IN UKRAINE: COINTEGRATION ANALYSIS
Published 2015-07-01“…In this paper we searched for the most important determinants of reserve holdings inUkraineusing quarterly data from 2000 to 2013 years. We evaluated their importance using two econometric techniques: autoregressive distributed lag (ARDL) approach and Vector Error Correction model (VECM) approach. …”
Get full text
Article -
1274
Burden of mortality attributable to diurnal temperature range in Thailand: a nationwide case-crossover analysis from 2007 to 2021
Published 2025-06-01“…In the second stage, these province-specific estimates were pooled using a multivariate meta-regression model to obtain the national-level estimate. Finally, the mortality burden attributable to variations in DTR was determined using a backward perspective based on the relative risks obtained from the distributed lag non-linear model (DLNM). …”
Get full text
Article -
1275
5G-Practical Byzantine Fault Tolerance: An Improved PBFT Consensus Algorithm for the 5G Network
Published 2025-03-01“…Practical Byzantine Fault Tolerance (PBFT) plays a crucial role in blockchain consensus algorithms by providing a robust mechanism to achieve fault-tolerant and deterministic consensus in distributed networks. With the development of 5G network technology, its features of high bandwidth, low latency, and high reliability provide a new approach for consensus algorithm optimization. …”
Get full text
Article -
1276
MICROFINANCE ACTIVITIES AND THEIR LONG-RUN IMPACT ON ECONOMIC GROWTH IN NIGERIA: EVIDENCE FROM ARDL ANALYSIS (1993-2023)
Published 2025-08-01“…The study employed the Autoregressive Distributed Lag (ARDL) model for the data analysis, the findings show that microfinance savings significantly boost GDP in the long run, while lending and investment exhibit statistically insignificant effects. …”
Get full text
Article -
1277
A novel mast cell marker gene-related prognostic signature to predict prognosis and reveal the immune landscape in head and neck squamous cell carcinoma
Published 2025-07-01“…In addition, the low-risk group was more sensitive to a broader range of drugs than the high-risk group.ConclusionWe combined scRNA-seq data and bulk RNA-seq data to construct a 14-MRGs-based prognostic model capable of well predicting the prognosis of HNSCC patients. …”
Get full text
Article -
1278
CH-RUN: a deep-learning-based spatially contiguous runoff reconstruction for Switzerland
Published 2025-02-01“…</p> <p>Furthermore, the low data requirements and computational efficiency of our model pave the way for simulating diverse scenarios and conducting comprehensive climate attribution studies. …”
Get full text
Article -
1279
Coal wall deformation monitoring and concentrated load inversion technology based on intelligent support devices
Published 2025-02-01“…To overcome the limitations of theoretical calculations for stress conditions of structural components with varying cross-sections under complex working conditions, a corresponding relationship between micro-mechanical and macro-mechanical parameters was established using distributed grating strain data based on the PSO-RBF neural network model. …”
Get full text
Article -
1280
Improving person re-identification based on two-stage training of convolutional neural networks and augmentation
Published 2023-03-01“…At the first stage, training is carried out on augmented data, at the second stage, fine tuning of the CNN is performed on the original images, which allows minimizing the losses and increasing model efficiency. …”
Get full text
Article