-
15621
An improved deep hashing model for image retrieval with binary code similarities
Published 2024-04-01“…Additionally, a hidden and fully connected layer is attached at the end of the deep network to derive hash bits by virtue of an activation function. To preserve the semantic consistency of images, a loss function has been introduced. …”
Get full text
Article -
15622
A Review of Trustworthy and Explainable Artificial Intelligence (XAI)
Published 2023-01-01Get full text
Article -
15623
Sarmatian Burials of the Kovalevka Burial Mound: Strangers Among Friends?
Published 2019-01-01“…Besides, the horse bones, iron bits and a few iron spearheads were found in the burial mound. …”
Get full text
Article -
15624
Analisis Validasi Image PNG File Upload menggunakan Metadata pada Aplikasi Berbasis Web
Published 2020-06-01“…Hasil penelitian dengan sampel 10 gambar berisi metadata dan 10 gambar yang tidak berisi metadata dapat mengecek validasi secara khusus unggahan gambar pada PNG File dengan menyaring secara khusus sesuai keunikan dari file gambar yaitu mempunyai panjang dan lebar pada metadatanya yang harus tersedia (Width, Height, Bits, Mime) serta RGBA (Red, Green, Blue, Alpha) pada setiap piksel sesuai dengan panjang dan lebar sebuah gambar PNG.…”
Get full text
Article -
15625
High Efficiency Video Coding Compliant Perceptual Video Coding Using Entropy Based Visual Saliency Model
Published 2019-10-01“…Efficient CTU level rate control is achieved by allocating bits to salient and non-salient CTUs by adjusting the quantization parameter values according to their perceptual weighted map. …”
Get full text
Article -
15626
-
15627
Optimal Automatic Wide-Area Discrimination of Fish Shoals from Seafloor Geology with Multi-Spectral Ocean Acoustic Waveguide Remote Sensing in the Gulf of Maine
Published 2023-01-01“…Employing Kullback–Leibler divergence or the relative entropy in bits from Information Theory is shown to also enable automatic discrimination of fish from seafloor by their distinct statistical scattering properties across sensing frequency, but without the statistical optimal properties of the Neyman–Pearson approach.…”
Get full text
Article -
15628
A Review on Text Steganography Techniques
Published 2021-11-01“…Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. To embed information within a document, its attributes must be changed. …”
Get full text
Article -
15629
Prediction of Organic–Inorganic Hybrid Perovskite Band Gap by Multiple Machine Learning Algorithms
Published 2024-01-01“…By separating the features related to bits A, B, and X, a dataset of 1208 pieces of data containing 30 feature descriptors was established. …”
Get full text
Article -
15630
Tightening Leakage Resilience of the Suffix Keyed Sponge
Published 2024-03-01“…We next consider improved security of the SuKS for two types of leakage: fixed position leakage, where the adversary directly learns the value of λ bits of a secret state, and Hamming weight leakage, where the Hamming weight of a fixed part of the state is leaked. …”
Get full text
Article -
15631
Communication patterns in a psychotherapy following traumatic brain injury: A quantitative case study based on symbolic dynamics
Published 2011-07-01“…For both measures, the rate of complexity generation, expressed as bits per minute, increased longitudinally during the course of therapy. …”
Get full text
Article -
15632
Parametric approach to the reconstruction of timber structures in Campanian Roman houses
Published 2022-01-01“…To that end, a simplified, parametric structural model is required. The available bits of information are organized into inputs, parameters and outputs of the analytical problem by matching each information with a structural quantity (load, cross-section, spacing, etc.). …”
Get full text
Article -
15633
Magnetic anomaly inversion through the novel barnacles mating optimization algorithm
Published 2022-12-01Get full text
Article -
15634
The influence of S-boxes on the arrival of the cipher to the state of random substitution
Published 2023-09-01“…S-boxes perform the main function of encryption transformation - mixing of text bits. Dynamic indicators of the arrival of the cipher in the state of random substitution depend on their effectiveness. …”
Get full text
Article -
15635
An Energy Efficient Design of Computation Offloading Enabled by UAV
Published 2020-06-01“…Subsequently, aiming at maximizing the energy efficiency of the unmanned aerial vehicle in the unmanned aerial vehicle enabled mobile edge computing system, the bits allocation in each time slot and the trajectory of the unmanned aerial vehicle are jointly optimized. …”
Get full text
Article -
15636
Prediction models for drug-induced hepatotoxicity by using weighted molecular fingerprints
Published 2017-05-01“…Results In this study, we used 881 bits of molecular fingerprint and used as features describing presence or absence of each substructure of compounds. …”
Get full text
Article -
15637
-
15638
Performance Evaluation of Biodiesel Produced from Waste Tire Pyrolytic Oil as a Lubricant Additive in Oil Drilling Systems
Published 2020-11-01“…Furthermore, comparative analysis of the quantified friction-reducing physicochemical properties of the additive shows that the biodiesel produced from the distilled pyrolytic oil is a suitable additive for the improved lubrication of the friction-prone metallic parts of drill bits when water-based drilling fluids are employed for drilling oil and gas wells.…”
Get full text
Article -
15639
Quasi-Delay-Insensitive Implementation of Approximate Addition
Published 2020-11-01“…The accurate and approximate adders considered are of size 32-bits. The delay-insensitive dual-rail code was used for data encoding, and four-phase return-to-zero (RTZ) and return-to-one (RTO) handshake protocols were used separately for data communication. …”
Get full text
Article -
15640
An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things
Published 2023-01-01“…Moreover, the computational and communication cost analyses are carried out by using major operations, major operations cost in milliseconds, and extra communication bits. The comparative analysis with the existing scheme shows that the proposed scheme reduces the computational cost from 19.23% to 97.54% and the communication overhead from 11.90% to 83.48%, which means that the proposed scheme is efficient, faster, and more secure for communication in the wireless communication network.…”
Get full text
Article