Search
Search Results
-
YOLOv5-S-G-B: a lightweight intelligent detection model for cardboard surface defects
In the manufacturing process of cardboard boxes, rapid and accurate surface defect detection is crucial for ensuring quality and preventing resource...
-
Financial Management Course Distance Teaching Method Based on B/S Model
In view of the low efficiency of traditional teaching methods, this paper puts forward the financial management course distance teaching method... -
Design of Mental Health Information Service Platform for College Students in Private Independent Colleges Based on B/S Architecture
With the continuous progress of society, the traditional examination oriented education model can no longer meet the needs of modern education. The... -
The Design of Interactive English Online Education System Based on B/S Structure
Aiming at the problem that the signal attenuation rate obtained by the existing online education system is too large, a free speech interactive... -
Non-rigid registration of medical images based on \( {S}_2^1\left({\Delta}_{mn}^{(2)}\right) \) non-tensor product B-spline
In this study, a non-tensor product B-spline algorithm is applied to the search space of the registration process, and a new method of image...
-
Design and Optimization of Crowd Behavior Analysis System Based on B/S Software Architecture
With the development of society and economy, the importance of crowd behavior analysis is increasing. However, the system often requires a large... -
A 640-Gbps, 15.2344-b/s/Hz full-duplex optical fiber/wireless single-channel coherent communication system using IQM-based DP-256-QAM and DSP techniques
A full-duplex optical fiber/wireless single-channel coherent communication system is presented for high-speed data center interconnections. In-phase...
-
Grundkurs Geschäftsprozess-Management Analyse, Modellierung, Optimierung und Controlling von Prozessen
Dieses Lehrbuch schlägt die Brücke zwischen den betriebswirtschaftlich-organisatorischen Methoden und deren digitaler Umsetzung, denn...
-
Knowledge Distillation of Vision Transformers and Convolutional Networks to Predict Inflammatory Bowel Disease
Inflammatory bowel disease is a chronic disease of unknown cause that can affect the entire gastrointestinal tract, from the mouth to the anus. It is... -
Multi-shell dMRI Estimation from Single-Shell Data via Deep Learning
Diffusion magnetic resonance imaging (dMRI) data acquired with multiple diffusion gradient directions and multiple b-values (“multi-shell” data)... -
Novel robust Elman neural network-based predictive models for bubble point oil formation volume factor and solution gas–oil ratio using experimental data
Bubble point oil formation volume factor ( B ob ) and solution gas–oil ratio ( R s ) are two crucial PVT parameters used for modeling and volumetric...
-
On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions
Sponge paradigm, used in the design of SHA-3, is an alternative hashing technique to the popular Merkle-Damgård paradigm. We revisit the problem of... -
SMT solving for the validation of B and Event-B models
ProB provides a constraint solver for the B-method written in Prolog and can make use of different backends based on SAT and SMT solving. One such...
-
Designing Full-Rate Sponge Based AEAD Modes
Sponge based constructions have gained significant popularity for designing lightweight authenticated encryption modes. Most of the authenticated... -
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers
We continue the study of t-wise independence of substitution-permutation networks (SPNs) initiated by the recent work of Liu, Tessaro, and... -
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions
We revisit the problem of finding B -block-long collisions in Merkle–Damgård Hash Functions in the auxiliary-input random oracle model, in which an...
-
Parameterized Approximation Algorithms for Weighted Vertex Cover
A vertex cover of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study Weighted... -
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...
-
Witness Encryption and Null-IO from Evasive LWE
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to encrypt a message, and the witness w serves as a decryption...