Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 2
- Language and languages 2
- Sociolinguistics 2
- ART / Digital 1
- Computer animation 1
- Digital cinematography 1
- Electric circuit analysis 1
- Electric network analysis 1
-
101
From attributes to communities: a novel approach in social network generation
Published 2024-11-01“…To this end, we propose the Attribute-based Realistic Community and Associate NEtwork (ARCANE) algorithm to generate node-attributed networks with functional communities. …”
Get full text
Article -
102
APPLICATION OF PROGRAM-TARGET APPROACH TO MANAGING THE EDUCATION OF YOUNG RUSSIAN GENERATION
Published 2018-07-01Get full text
Article -
103
Generation and verification method of trusted signature seal incorporating handwriting features
Published 2024-02-01“…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
Get full text
Article -
104
A Comprehensive Review on Next-Generation Modeling and Optimization for Semiconductor Devices
Published 2025-01-01Get full text
Article -
105
Experimental generation of SNP haplotype signatures in patients with sickle cell anaemia.
Published 2010-09-01“…<h4>Conclusions/significance</h4>Phased haplotypes yield more information than the individual marker genotypes. …”
Get full text
Article -
106
New generation of monofocal intraocular lens for cataract surgery in comorbid conditions
Published 2024-12-01“…All patients with the IOL Monofocal+ expressed their satisfaction with the vision they received, which was reflected in the results of the VF test-14 QOL questionnaire.Conclusion. New generation monofocal IOLs showed good functional results in patients with cataracts and the considered comorbid pathology of the eye: primary open-angle glaucoma II a, intermediate stage of the dry form of age-related macular degeneration, non-proliferative diabetic retinopathy. …”
Get full text
Article -
107
Sediment stability is optimized by manipulating planting design during coastal marsh establishment
Published 2025-06-01“…Abstract Seaside communities increasingly harness the shoreline protection functions of coastal ecosystems by constructing nature-based infrastructure. …”
Get full text
Article -
108
Several Turán-Type Inequalities for the Generalized Mittag-Leffler Function
Published 2020-01-01“…In this paper, several Turán-type inequalities for the more generalized Mittag-Leffler function are proved. …”
Get full text
Article -
109
DySCo: A general framework for dynamic functional connectivity.
Published 2025-03-01Get full text
Article -
110
“Armed in-vitro retina”-generating microglial retinal organoids, where are we now?
Published 2025-05-01Get full text
Article -
111
The mediating role of family functioning between childhood adversity and adult Health- related risk behaviors: a moderated mediation analysis of generational gap in Chinese migrant...
Published 2025-05-01“…This study aims to elucidate the mediating role of family functioning and explore generational differences in this relationship. …”
Get full text
Article -
112
Simulation framework for generating intratumor heterogeneity patterns in a cancer cell population.
Published 2017-01-01“…Herein, we developed a general framework for simulating intratumor heterogeneity patterns and a simulator (tumopp). …”
Get full text
Article -
113
A generative adversarial network with multiscale and attention mechanisms for underwater image enhancement
Published 2025-01-01“…In the generative network, we first design a residual convolution module to extract more texture and edge information from underwater images. …”
Get full text
Article -
114
Neuron Network Modeling of Intensification of Isogumulone Extraction in a Rotary Pulse Generator
Published 2021-09-01“…The resulting model had the following parameters: two hidden layers, 30 neurons each; neuron activation function – GELU; loss function – MSELoss; learning step – 0.001; optimizer – Adam; L2 regularization at 0.00001; training set of four batches, 16 records each; 9,801 epochs. …”
Get full text
Article -
115
Style-VT: Style Conditioned Chord Generation by Variational Transformer With Chord Substitution
Published 2025-01-01“…We also introduce a newly defined chord substitution into the objective function, allowing for greater flexibility in generated chord progressions. …”
Get full text
Article -
116
Virtual Synchronous Generator Based on Hybrid Multi-Vector Model Predictive Control
Published 2025-02-01“…Compared to the three-vector MPC, the proposed method requires more iterative calculations per control period but achieves optimal harmonic content in the output current. …”
Get full text
Article -
117
Investigating the effect of loss functions on single-image GAN performance
Published 2024-12-01“…Loss functions are crucial in training generative adversarial networks (GANs) and shaping the resulting outputs. …”
Get full text
Article -
118
Overall Layout Method of Frame Structure Plane Based on Generative Adversarial Network
Published 2025-05-01“…<italic>γ</italic><sub>all</sub> reached 0.88, suggesting that the generated structural layout was sound. The model’s generated frame columns met functional requirements, were well-placed, and had appropriate size and density. …”
Get full text
Article -
119
Sensorless control of the high-speed switched reluctance generator of the micro power plant
Published 2019-12-01“…In the distributed and autonomous generation systems using renewable energy sources, low-power generating units (not more than 100-200 kW) based on microturbines function. …”
Get full text
Article -
120
On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation
Published 2025-01-01“…Within the physical layer security (PLS) paradigm, the secret key generation (SKG) technique exploits the wireless channel’s randomness to generate symmetric secret keys for message encryption/decryption by legitimate communication nodes. …”
Get full text
Article