Results 271 to 280 of about 3,739,334 (352)
Research on the Behavioral and ERP Characteristics Induced by the Availability Heuristic in Intuitive Decision-Making. [PDF]
Zhang X, Wang W, Qu J, Dang S, Wang C.
europepmc +1 more source
Approach and Fork Insertion to Target Pallet Based on Image Measurement Method. [PDF]
Kita N, Kato T.
europepmc +1 more source
A Comprehensive Error Modeling and On-Field Calibration Method for HRG SINS by Tumbling the Hexahedron. [PDF]
Li Y, Wei Z, Ren S, Zeng Q.
europepmc +1 more source
IntegrAlign: a comprehensive tool for multi-immunofluorescence panel integration through image alignment. [PDF]
Hermet L +14 more
europepmc +1 more source
Extracting Weight of Evidence from <i>p</i>-Value via Bayesian Approach to Activation Likelihood Estimation Meta-Analysis. [PDF]
Costa T +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Coordinate Transformation Methods
Light Propagation in Periodic Media, 2018HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or ...
Michel Nevière, Evgeny Popov
openaire +2 more sources
IEEE Transactions on Dependable and Secure Computing, 2023
Reversible data hiding in encrypted media involves using algorithms to perform data encryption to improve the privacy of the original media and hide data for covert communication or access control.
Yuan-Yu Tsai, Hong-Lin Liu
semanticscholar +1 more source
Reversible data hiding in encrypted media involves using algorithms to perform data encryption to improve the privacy of the original media and hide data for covert communication or access control.
Yuan-Yu Tsai, Hong-Lin Liu
semanticscholar +1 more source
IEEE Transactions on Cybernetics, 2022
In this article, two novel adaptive fault-tolerant control schemes for a class of nonlinear strict-feedback cyber–physical systems (CPSs) with deception attacks are presented.
Wendi Chen +5 more
semanticscholar +1 more source
In this article, two novel adaptive fault-tolerant control schemes for a class of nonlinear strict-feedback cyber–physical systems (CPSs) with deception attacks are presented.
Wendi Chen +5 more
semanticscholar +1 more source
IEEE transactions on power electronics, 2022
Three-phase four-leg voltage-source inverter has been extensively investigated in recent years for its compactness, small size, and high efficiency, and it has been proved to be the best solution for providing transformer-less neutral connection to three-
Guangjun Tan +4 more
semanticscholar +1 more source
Three-phase four-leg voltage-source inverter has been extensively investigated in recent years for its compactness, small size, and high efficiency, and it has been proved to be the best solution for providing transformer-less neutral connection to three-
Guangjun Tan +4 more
semanticscholar +1 more source

