Results 211 to 220 of about 157,357 (284)
Deep Relevance Hashing for Remote Sensing Image Retrieval. [PDF]
Liu X, Chen X, Zhu G.
europepmc +1 more source
ABSTRACT Purpose To develop a self‐supervised scan‐specific deep learning framework for reconstructing accelerated multiparametric quantitative MRI (qMRI). Methods We propose REFINE‐MORE (REference‐Free Implicit NEural representation with MOdel REinforcement), combining an implicit neural representation (INR) architecture with a model reinforcement ...
Ruimin Feng +3 more
wiley +1 more source
A Lightweight Privacy-Enhanced Federated Clustering Algorithm for Edge Computing. [PDF]
Wang J +5 more
europepmc +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
Precise algorithms for minimizing feedback in new energy product development. [PDF]
Wang P, Ma G, Ma X, Huang W.
europepmc +1 more source
Scores of Evidence‐Based Knowledge, Practice and Attitude Among Nurses: A Cross‐Sectional Study
ABSTRACT Aim To describe the level of knowledge, skills, practice, attitude and overall score of EBP among nurses at all levels, including nurse aides, Registered Nurses (RNs), nurse managers and directors. Design A descriptive, cross‐sectional, survey‐based study.
Mada Aljuaid +3 more
wiley +1 more source
Efficient multi-party private set union resistant to maximum collusion attacks. [PDF]
Liu Q, Lee JW.
europepmc +1 more source
Solving for Blameless and Optimal Control Under Prioritized Safety Constraints
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek +3 more
wiley +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
ABSTRACT Quantum‐native communication systems are reshaping secure, programmable, and coherence‐aware networking beyond the classical paradigm. As intelligent physical infrastructures, ranging from unmanned aerial vehicle swarms to satellite Quantum Key Distribution (QKD) platforms, demand trust, synchronization, and ultra‐reliability, conventional ...
Shakil Ahmed +2 more
wiley +1 more source

