Results 111 to 120 of about 506,249 (327)
Joint Luminance Adjustment and Color Correction for Low-Light Image Enhancement Network
Most of the existing low-light enhancement research focuses on global illumination enhancement while ignoring the issues of brightness unevenness and color distortion.
Nenghuan Zhang +5 more
doaj +1 more source
Jon Wolfsthal is renowned for his policy achievements and his well-informed articles on nuclear arms control and nonproliferation issues. He served as special assistant to former US President Barack Obama and as senior director for arms control and ...
Tomoko Kurokawa
doaj +1 more source
ABSTRACT While watermelon is an important commodity in the United States and worldwide, some of the fundamental watermelon productivity indices (crop evapotranspiration [ETc], transpiration [Tr], evaporation [E], ET‐yield production functions [ETYPF], basal crop coefficients [Kcb], crop water productivity [CWP], soil‐water extraction [SWE]) have not ...
Suat Irmak
wiley +1 more source
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang +4 more
wiley +1 more source
How to Overcome the Impasse on Nuclear Disarmament: An Interview with Thomas Countryman
Thomas Countryman was a member of the US Foreign Service for 35 years, retiring in January 2017. He took office as assistant secretary of state for international security and nonproliferation in September 2011 and held that position until January 2017 ...
Tomoko Kurokawa
doaj +1 more source
A Uniform Resource Name (URN) Namespace for the Digital Video Broadcasting Project (DVB) [PDF]
Alexander Adolf, Peter MacAvock
openalex +1 more source
Market Expansion and Business Stealing With Differentiated Products Using a Nested Logit
ABSTRACT In this paper, we use the widely adopted nested logit model to examine how introducing a new product into a market of highly substitutable, differentiated goods affects both market expansion and business stealing. Central to our analysis is the nesting parameter σ$$ \sigma $$, which captures the correlation in consumers' unobserved utilities ...
Christophe Bellégo, Andreea Enache
wiley +1 more source
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh +4 more
wiley +1 more source
Text-independent speaker verification (TI-SV) is a crucial task in speaker recognition, as it involves verifying an individual’s claimed identity from speech of arbitrary content without any human intervention.
Xiao Li +5 more
doaj +1 more source

