We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. YOLOv5-S-G-B: a lightweight intelligent detection model for cardboard surface defects

    In the manufacturing process of cardboard boxes, rapid and accurate surface defect detection is crucial for ensuring quality and preventing resource...

    Meng Yang, Dajun Li, ... Yong Jia in Signal, Image and Video Processing
    Article 27 June 2024
  2. Financial Management Course Distance Teaching Method Based on B/S Model

    In view of the low efficiency of traditional teaching methods, this paper puts forward the financial management course distance teaching method...
    Conference paper 2021
  3. Design of Mental Health Information Service Platform for College Students in Private Independent Colleges Based on B/S Architecture

    With the continuous progress of society, the traditional examination oriented education model can no longer meet the needs of modern education. The...
    Lingying Yan in Innovative Computing
    Conference paper 2022
  4. The Design of Interactive English Online Education System Based on B/S Structure

    Aiming at the problem that the signal attenuation rate obtained by the existing online education system is too large, a free speech interactive...
    Ying-di **, Ying Lin, Yangbo Wu in e-Learning, e-Education, and Online Training
    Conference paper 2021
  5. Non-rigid registration of medical images based on \( {S}_2^1\left({\Delta}_{mn}^{(2)}\right) \) non-tensor product B-spline

    In this study, a non-tensor product B-spline algorithm is applied to the search space of the registration process, and a new method of image...

    Qi Zheng, Chaoyue Liu, **cai Chang in Visual Computing for Industry, Biomedicine, and Art
    Article Open access 02 February 2022
  6. Design and Optimization of Crowd Behavior Analysis System Based on B/S Software Architecture

    With the development of society and economy, the importance of crowd behavior analysis is increasing. However, the system often requires a large...
    Yuanhang He, **g Guo, ... Hua Yang in Digital TV and Wireless Multimedia Communication
    Conference paper 2020
  7. A 640-Gbps, 15.2344-b/s/Hz full-duplex optical fiber/wireless single-channel coherent communication system using IQM-based DP-256-QAM and DSP techniques

    A full-duplex optical fiber/wireless single-channel coherent communication system is presented for high-speed data center interconnections. In-phase...

    Dhiman Kakati, Subhash C. Arya in Photonic Network Communications
    Article 18 December 2019
  8. Grundkurs Geschäftsprozess-Management Analyse, Modellierung, Optimierung und Controlling von Prozessen

    Dieses Lehrbuch schlägt die Brücke zwischen den betriebswirtschaftlich-organisatorischen Methoden und deren digitaler Umsetzung, denn...

    Andreas Gadatsch
    Textbook 2023
  9. Knowledge Distillation of Vision Transformers and Convolutional Networks to Predict Inflammatory Bowel Disease

    Inflammatory bowel disease is a chronic disease of unknown cause that can affect the entire gastrointestinal tract, from the mouth to the anus. It is...
    Conference paper 2024
  10. Multi-shell dMRI Estimation from Single-Shell Data via Deep Learning

    Diffusion magnetic resonance imaging (dMRI) data acquired with multiple diffusion gradient directions and multiple b-values (“multi-shell” data)...
    Reagan Dugan, Owen Carmichael in Machine Learning in Clinical Neuroimaging
    Conference paper 2023
  11. Novel robust Elman neural network-based predictive models for bubble point oil formation volume factor and solution gas–oil ratio using experimental data

    Bubble point oil formation volume factor ( B ob ) and solution gas–oil ratio ( R s ) are two crucial PVT parameters used for modeling and volumetric...

    Kamyab Kohzadvand, Maryam Mahmoudi Kouhi, ... Ali Shafiei in Neural Computing and Applications
    Article 08 May 2024
  12. On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions

    Sponge paradigm, used in the design of SHA-3, is an alternative hashing technique to the popular Merkle-Damgård paradigm. We revisit the problem of...
    Akshima, **aoqi Duan, ... Qipeng Liu in Theory of Cryptography
    Conference paper 2023
  13. SMT solving for the validation of B and Event-B models

    ProB provides a constraint solver for the B-method written in Prolog and can make use of different backends based on SAT and SMT solving. One such...

    Article Open access 21 November 2022
  14. Designing Full-Rate Sponge Based AEAD Modes

    Sponge based constructions have gained significant popularity for designing lightweight authenticated encryption modes. Most of the authenticated...
    Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  15. Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers

    We continue the study of t-wise independence of substitution-permutation networks (SPNs) initiated by the recent work of Liu, Tessaro, and...
    Tianren Liu, Angelos Pelecanos, ... Vinod Vaikuntanathan in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  16. Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions

    We revisit the problem of finding B -block-long collisions in Merkle–Damgård Hash Functions in the auxiliary-input random oracle model, in which an...

    Akshima, Siyao Guo, Qipeng Liu in Journal of Cryptology
    Article 13 February 2024
  17. Parameterized Approximation Algorithms for Weighted Vertex Cover

    A vertex cover of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study Weighted...
    Soumen Mandal, Pranabendu Misra, ... Saket Saurabh in LATIN 2024: Theoretical Informatics
    Conference paper 2024
  18. On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing

    We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...

    Ashrujit Ghoshal, Ilan Komargodski in computational complexity
    Article 13 September 2023
  19. Witness Encryption and Null-IO from Evasive LWE

    Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to encrypt a message, and the witness w serves as a decryption...
    Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.