Search alternatives:
issue » issues (Expand Search)
Showing 961 - 980 results of 3,265 for search 'issue module', query time: 0.10s Refine Results
  1. 961

    An Intelligent System Based on Arduino for Blood Leakage Detection by Mihaela MARIN, Cătălina ROŞU, Florin Bogdan MARIN

    Published 2024-12-01
    “…Chronic kidney disease (CKD) is a global health issue, requiring renal replacement therapies like haemodialysis for patient survival. …”
    Get full text
    Article
  2. 962

    An NLP-driven face recognition system to improve Alzheimer’s patient engagement and care [MEMORY LANE] by Zishan Ahmad, Vengadeswaran Shanmugasundaram

    Published 2025-09-01
    “…Most existing applications have complex user interfaces, lack accuracy, and demand significant computational resources, making them unsuitable for wider utility. To address this issue, an intelligent assistant application named ‘Memory Lane’ is proposed to support patients with Alzheimer’s disease and their carers. …”
    Get full text
    Article
  3. 963

    Modelling a bibliographic ontology of imperial diplomas: updates from the OntoVE Knowledge Base by Chiara De Bastiani

    Published 2025-07-01
    “…The module was conceived within the OntoVE project, which aims to collect Germanic Cultural Heritage items related to Veneto; more specifically, the module presented in this contribution conceptualizes the description of imperial diplomas issued by rulers of Germanic origin and related to Veneto. …”
    Get full text
    Article
  4. 964

    Spatial–Temporal Semantic and Geographic Correlation Network for SAR Image Change Detection With Limited Training Data by Haolin Li, Bin Zou, Lamei Zhang, Jiang Qin

    Published 2025-01-01
    “…STSGNet consists of three primary modules: the spatial–temporal semantic (STS) module, the spatial–temporal geographic (STG) module, and the dynamic weighted fusion (DWF) module. …”
    Get full text
    Article
  5. 965

    Research on anti-occlusion tracking method for underground mine personnel based on adaptive link optimization by LU Yang, DONG Lihong, YE Ou

    Published 2025-02-01
    “…To address the issue of inaccurate trajectory matching caused by frequent occlusions and appearance confusion of underground mine personnel in coal mines, an anti-occlusion tracking method for underground mine personnel based on adaptive link optimization was proposed. …”
    Get full text
    Article
  6. 966

    Wireless Authentication Method Based on Near-Field Feature Fusion Network by QIU Jiefan, ZHOU Kezhong, ZHU Dongfu, ZHANG Jinhong, CHI Kaikai

    Published 2025-01-01
    “…The WFFN consisted of three key modules: the dynamic feature extraction module, the LOS feature extraction module, and the feature fusion module. …”
    Get full text
    Article
  7. 967

    Spatial Shape-Aware Network for Elongated Target Detection by Shaowen Xu, Der-Horng Lee

    Published 2025-02-01
    “…Specifically, we introduce three key modules: a Boundary-Guided Spatial Feature Perception Module (BGSF), a Shape-Sensing Module (SSM), and a Potential Evaluation Module (PEM). …”
    Get full text
    Article
  8. 968

    A Deep Learning-Based Solution to the Class Imbalance Problem in High-Resolution Land Cover Classification by Pengdi Chen, Yong Liu, Yuanrui Ren, Baoan Zhang, Yuan Zhao

    Published 2025-05-01
    “…An adaptive awareness fusion (AAF) module is embedded within the skip connections to enhance target saliency. …”
    Get full text
    Article
  9. 969

    Lightweight Insulator and Defect Detection Method Based on Improved YOLOv8 by Yanxing Liu, Xudong Li, Ruyu Qiao, Yu Chen, Xueliang Han, Agyemang Paul, Zhefu Wu

    Published 2024-09-01
    “…These include the high complexity of existing algorithms, limited availability of UAV images, and persistent issues with false positives and missed detections. …”
    Get full text
    Article
  10. 970

    YOLO-TARC: YOLOv10 with Token Attention and Residual Convolution for Small Void Detection in Root Canal X-Ray Images by Yin Pan, Zhenpeng Zhang, Xueyang Zhang, Zhi Zeng, Yibin Tian

    Published 2025-05-01
    “…Second, to tackle the issue of weak focusing capabilities on small targets, a Token Attention module is introduced before the third small object detection head. …”
    Get full text
    Article
  11. 971

    A lightweight steel surface defect detection network based on YOLOv9 by Tianyi Zheng, Ling Yu, Yongbao Shi, Fanglin Niu

    Published 2025-05-01
    “…Finally, we replace the Fusion module in the CNN-based cross-scale feature fusion (CCFM) module, with the new Fusion-RepNCSPELAN4 module, creating a new feature fusion network, CCFM-YOLO, which replaces the neck network of YOLOv9. …”
    Get full text
    Article
  12. 972

    TSFF-Net: A deep fake video detection model based on two-stream feature domain fusion. by Hangchuan Zhang, Caiping Hu, Shiyu Min, Hui Sui, Guola Zhou

    Published 2024-01-01
    “…In the feature extraction module, we utilize the Scharr operator to extract edge features from facial images, while also integrating frequency domain information from these images. …”
    Get full text
    Article
  13. 973

    Enhancing Perception Quality in Remote Sensing Image Compression via Invertible Neural Network by Junhui Li, Xingsong Hou

    Published 2025-06-01
    “…Additionally, a quantization module (QM) is introduced to mitigate format conversion impact, enhancing generalization and perceptual quality. …”
    Get full text
    Article
  14. 974

    Action-Curiosity-Based Deep Reinforcement Learning Algorithm for Path Planning in a Nondeterministic Environment by Junxiao Xue, Jinpu Chen, Shiwen Zhang

    Published 2025-01-01
    “…By incentivizing agents to explore their surroundings more effectively, the action curiosity module amplifies learning efficiency and curtails training duration. …”
    Get full text
    Article
  15. 975
  16. 976

    Fabric Faults Robust Classification Based on Logarithmic Residual Shrinkage Network in a Four-Point System by Canan Tastimur, Erhan Akin, Mehmet Agrikli

    Published 2025-06-01
    “…Accurate and robust detection of fabric defects under noisy conditions is a major challenge in textile quality control systems. To address this issue, we introduce a new model called the Logarithmic Deep Residual Shrinkage Network (Log-DRSN), which integrates a deep attention module. …”
    Get full text
    Article
  17. 977

    Learning Dynamic Spatial-Temporal Dependence in Traffic Forecasting by Chaoyu Ren, Yuezhu Li

    Published 2024-01-01
    “…Specifically, we designed a dynamic graph convolution module to model local and global spatial connections in terms of both road distance and adaptive correlation. …”
    Get full text
    Article
  18. 978

    Preparing teachers of Early Childhood Education to teach a foreign language: the PEPELINO portfolio in practice by Joanna Rokita-Jaśkow, Werona Król-Gierat

    Published 2021-06-01
    “…The data analysis revealed that ‘supporting the linguistic development of children with other first languages than Polish’ gained the least support among the respondents, despite a significant course module devoted to this issue. Therefore, the conclusion can be drawn that the teachers will be able to raise interest in language learning by very young learners, by drawing on their experience as Early Childhood Educators, yet it will be difficult to foster plurilingualism and attitudes of intercultural interest by teachers who often lack intercultural experience and plurilingual awareness themselves. …”
    Get full text
    Article
  19. 979

    Design and implementation of solid state drive based on AES and SM4 encryption by Wang Lijuan, Shen Qing, Xu Bin, Yang Chuwei, Hou Qingqing

    Published 2025-01-01
    “…Secure storage of hard drives is a core issue in solid state disk related technologies. Based on the SATA interface, a hardware module is proposed to implement multiple encryption algorithms for SSD storage data encryption and decryption in the design of SSD controllers. …”
    Get full text
    Article
  20. 980

    An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources by Jiajian Huang, Weigang Li, Yucheng Qiao

    Published 2025-05-01
    “…However, the TF protocol still faces several security issues in real-world environments. To address the issue of untrusted sources, one effective solution is to introduce a light-source monitoring module into the system. …”
    Get full text
    Article