Suggested Topics within your search.
Suggested Topics within your search.
-
1681
Домашняя библиотека горного офицера Н. С. Плохова как источник изучения книжной культуры Колывано-Воскресенского горного округа второй половины XVIII века...
Published 2011-03-01“…The history of home library of the mining officer N. S. Plokhova as a source for studying book culture of Kolyvano-Voskresensk mining district in the second half of XVIIIth century is considered. …”
Get full text
Article -
1682
Analysis and interpretation of aeromagnetic data for Wadi Zeidun area, Central Eastern Desert, Egypt
Published 2018-09-01“…Two methods for locating magnetic sources, Source Parameter Image and Analytical Signal to identifying the properties of their sources indicated that, the depth calculation from the used tools ranges between 900 and 3000 m as the average ranges. …”
Get full text
Article -
1683
Providing Education to the 1st Year Students at the Medical University in the Conditions of Martial State in Ukraine
Published 2023-04-01“…They include synchronous tools such as video conferencing and virtual classroom discussions, as well as asynchronous tools such as online forums and chats. …”
Get full text
Article -
1684
Multi-focus image fusion using adaptive patch rendering anisotropic diffusion filter
Published 2025-05-01“…We further capture the focus and blur patches of the source images to detect the diffusion of the edges at the boundaries. …”
Get full text
Article -
1685
Research on Semantic Driven Urban Pipeline Dataspace Construction Method
Published 2024-10-01“…Urban pipeline data is heterogeneous in multiple sources and rich in data volume, and there are problems such as data conflict and difficult organization and management due to the heterogeneity of multiple sources when accessing the data in large-scale concurrently. …”
Get full text
Article -
1686
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
Published 2022-12-01“…WordNet lexical database has been used as a knowledge-based source while the GloVe pre-trained word embedding vectors have been used as a corpus-based source. …”
Get full text
Article -
1687
Unlocking the potential of muskmelon seeds as sustainable ingredients for the food industry
Published 2025-06-01Get full text
Article -
1688
Assessment of the impact of interference signals on the decision circuit of the receiving-analyzing route of digital radio engineering systems
Published 2022-06-01“…The dependence of the burst duration is calculated for the situation when the “Skala-M” radar is a source of unintended EMI for the “ATCR-22” radar.…”
Get full text
Article -
1689
Brassica Panache: A multi‐species graph pangenome representing presence absence variation across forty‐one Brassica genomes
Published 2025-03-01“…Here we present the first multi‐species graph pangenome for Brassica visualized with pangenome analyzer with chromosomal exploration (Panache).…”
Get full text
Article -
1690
Organoids research progress in gynecological cancers: a bibliometric analysis
Published 2024-10-01“…We conducted a bibliometric analysis and visualization using CiteSpace, VOSviewer, and the Bibliometrix R Package. …”
Get full text
Article -
1691
Target Ship Recognition and Tracking with Data Fusion Based on Bi-YOLO and OC-SORT Algorithms for Enhancing Ship Navigation Assistance
Published 2025-02-01“…Then, a perception data fusion framework based on ship spatio-temporal trajectory features (ST-TF) was proposed to match GPS-based ship information with corresponding visual target information. Finally, AR technology was integrated to fuse multi-source perceptual information into the real-world navigation view. …”
Get full text
Article -
1692
TPDTNet: Two-Phase Distillation Training for Visible-to-Infrared Unsupervised Domain Adaptive Object Detection
Published 2025-01-01“…Specifically, in the first phase, we incorporate a contrastive learning framework to maximize the mutual information between the source and target domains. In addition, we construct a generative model that learns only a unidirectional modality conversion mapping, thereby capturing the associations between their visual contents. …”
Get full text
Article -
1693
Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention
Published 2024-10-01“…In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual temporal source identification. This paper introduces an ENF region classification model named UniTS-SinSpec within the UniTS framework. …”
Get full text
Article -
1694
Strain and crystallographic identification of the helically concaved gap surfaces of chiral nanoparticles
Published 2023-06-01Get full text
Article -
1695
A Real-Time Video Watermarking Algorithm for Authentication of Small-Business Wireless Surveillance Networks
Published 2015-09-01“…How to authenticate the genuineness and integrity of the source video or trace the source of a video information leak becomes a growing requirement in these small businesses. …”
Get full text
Article -
1696
Progress in digital and intelligent technologies for complex giant systems in green coal development
Published 2024-11-01“…Digitized all elements of coal mines, and completed the precise real-time collection, networked transmission, standardized integration, visual display, automated operation, and intelligent service of all information in coal mines as a digital intelligent agent. …”
Get full text
Article -
1697
Possibilities for computer-based assessment the quality indicators of Kashkaval cheese using image processing
Published 2025-01-01“…In conclusion, it could be noticed that open-source software products for image processing Scilab and ImageJ could be utilized for the quality evaluation of Kashkaval cheese to support the assessment of the visual quality characteristics.…”
Get full text
Article -
1698
Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis
Published 2025-01-01“…Our method, Phish Fighter, analyzes the HTML code structure, focusing on recurring blocks across different phishing pages derived from the same source. These features are then fed to clustering and classification components to detect common structural patterns without relying on textual or visual content. …”
Get full text
Article -
1699
Ethnoecology and use of fishes by the Cubeo people from the Cuduyarí River, Colombian Amazonia
Published 2024-11-01“…Nevertheless, locally, they are the main source of animal protein and most of the time, the sole source of income. …”
Get full text
Article -
1700
Human sounds and associated tonality disrupting perceived soundscapes in protected natural areas
Published 2025-08-01“…The impact of the perceived sound source dominance, visual landscape quality and psychophysical and environmental acoustic features on the perceived soundscape pleasantness and eventfulness was analysed via Linear Mixed-Effects Models (LMMs). …”
Get full text
Article