Showing 101 - 120 results of 7,085 for search 'more function (generated OR (general OR generated))', query time: 0.26s Refine Results
  1. 101

    From attributes to communities: a novel approach in social network generation by Muhtar Çağkan Uludağlı, Kaya Oğuz

    Published 2024-11-01
    “…To this end, we propose the Attribute-based Realistic Community and Associate NEtwork (ARCANE) algorithm to generate node-attributed networks with functional communities. …”
    Get full text
    Article
  2. 102
  3. 103

    Generation and verification method of trusted signature seal incorporating handwriting features by Li LI, Shang GAO, Peiliang ZUO, Jiazheng XUAN, Han SONG

    Published 2024-02-01
    “…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
    Get full text
    Article
  4. 104
  5. 105

    Experimental generation of SNP haplotype signatures in patients with sickle cell anaemia. by Stephan Menzel, Jian Qin, Nisha Vasavda, Swee Lay Thein, Ramesh Ramakrishnan

    Published 2010-09-01
    “…<h4>Conclusions/significance</h4>Phased haplotypes yield more information than the individual marker genotypes. …”
    Get full text
    Article
  6. 106

    New generation of monofocal intraocular lens for cataract surgery in comorbid conditions by A. V. Tereshchenko, I. G. Trifanenkova, Yu. E. Prokofiev, A. M. Ivanov, M. V. Okuneva

    Published 2024-12-01
    “…All patients with the IOL Monofocal+ expressed their satisfaction with the vision they received, which was reflected in the results of the VF test-14 QOL questionnaire.Conclusion. New generation monofocal IOLs showed good functional results in patients with cataracts and the considered comorbid pathology of the eye: primary open-angle glaucoma II a, intermediate stage of the dry form of age-related macular degeneration, non-proliferative diabetic retinopathy. …”
    Get full text
    Article
  7. 107

    Sediment stability is optimized by manipulating planting design during coastal marsh establishment by Christine B. Rohal, Xiao Yu, Jesse Mason Crawford, Ollie Montgomery, Laura K. Reynolds, Carrie Reinhardt Adams

    Published 2025-06-01
    “…Abstract Seaside communities increasingly harness the shoreline protection functions of coastal ecosystems by constructing nature-based infrastructure. …”
    Get full text
    Article
  8. 108

    Several Turán-Type Inequalities for the Generalized Mittag-Leffler Function by Xiang Kai Dou, Li Yin, Xiu-Li Lin

    Published 2020-01-01
    “…In this paper, several Turán-type inequalities for the more generalized Mittag-Leffler function are proved. …”
    Get full text
    Article
  9. 109
  10. 110
  11. 111
  12. 112

    Simulation framework for generating intratumor heterogeneity patterns in a cancer cell population. by Watal M Iwasaki, Hideki Innan

    Published 2017-01-01
    “…Herein, we developed a general framework for simulating intratumor heterogeneity patterns and a simulator (tumopp). …”
    Get full text
    Article
  13. 113

    A generative adversarial network with multiscale and attention mechanisms for underwater image enhancement by Liquan Zhao, Yuda Li, Tie Zhong

    Published 2025-01-01
    “…In the generative network, we first design a residual convolution module to extract more texture and edge information from underwater images. …”
    Get full text
    Article
  14. 114

    Neuron Network Modeling of Intensification of Isogumulone Extraction in a Rotary Pulse Generator by Anton V. Shafrai, Elena A. Safonova, Dmitry M. Borodulin, Yana S. Golovacheva, Sergey A. Ratnikov, Wasfie Barsoom Wasef Kerlos

    Published 2021-09-01
    “…The resulting model had the following parameters: two hidden layers, 30 neurons each; neuron activation function – GELU; loss function – MSELoss; learning step – 0.001; optimizer – Adam; L2 regularization at 0.00001; training set of four batches, 16 records each; 9,801 epochs. …”
    Get full text
    Article
  15. 115

    Style-VT: Style Conditioned Chord Generation by Variational Transformer With Chord Substitution by Kyowon Song, Dongyoung Seo, Junsu Na, Heecheol Yang

    Published 2025-01-01
    “…We also introduce a newly defined chord substitution into the objective function, allowing for greater flexibility in generated chord progressions. …”
    Get full text
    Article
  16. 116

    Virtual Synchronous Generator Based on Hybrid Multi-Vector Model Predictive Control by Yinyu Yan, Zhiyuan Fan, Yichao Sun, Wei Wang, Dongmei Yang, Zheng Wei

    Published 2025-02-01
    “…Compared to the three-vector MPC, the proposed method requires more iterative calculations per control period but achieves optimal harmonic content in the output current. …”
    Get full text
    Article
  17. 117

    Investigating the effect of loss functions on single-image GAN performance by Eyyup YİLDİZ, Mehmet Erkan YUKSEL, Selcuk SEVGEN

    Published 2024-12-01
    “…Loss functions are crucial in training generative adversarial networks (GANs) and shaping the resulting outputs. …”
    Get full text
    Article
  18. 118

    Overall Layout Method of Frame Structure Plane Based on Generative Adversarial Network by ZHONG Yan, LEI Xin, LONG Danbing, FANG Changjian, KANG Yongjun

    Published 2025-05-01
    “…<italic>γ</italic><sub>all</sub> reached 0.88, suggesting that the generated structural layout was sound. The model’s generated frame columns met functional requirements, were well-placed, and had appropriate size and density. …”
    Get full text
    Article
  19. 119

    Sensorless control of the high-speed switched reluctance generator of the micro power plant by P. G. Kolpakhchyan, D. V. Olkhovatov

    Published 2019-12-01
    “…In the distributed and autonomous generation systems using renewable energy sources, low-power generating units (not more than 100-200 kW) based on microturbines function. …”
    Get full text
    Article
  20. 120

    On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation by Ghalib Hussain, Syed Junaid Nawaz, Shurjeel Wyne, Mohammad N. Patwary

    Published 2025-01-01
    “…Within the physical layer security (PLS) paradigm, the secret key generation (SKG) technique exploits the wireless channel&#x2019;s randomness to generate symmetric secret keys for message encryption/decryption by legitimate communication nodes. …”
    Get full text
    Article