Results 91 to 100 of about 170,367 (287)
Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval
Hashing has been widely deployed to perform the Approximate Nearest Neighbor (ANN) search for the large-scale image retrieval to solve the problem of storage and retrieval efficiency.
Lijuan Duan +4 more
doaj +1 more source
Medical Image Retrieval Based on Convolutional Neural Network and Supervised Hashing
In recent years, with extensive application in image retrieval and other tasks, a convolutional neural network (CNN) has achieved outstanding performance.
Yiheng Cai +4 more
doaj +1 more source
From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson +7 more
wiley +1 more source
Design of concatenated Hash-Polar code based on segmented CRC code
As a linear block code, the polarization code has a lower coding complexity and a definite structure, but when it has a short or medium code length, the performance will be reduced.A design method of concatenated HashPolar codes based on segmented cyclic
Zhengjie LI, Shunlan LIU, Xu ZHANG
doaj +2 more sources
Data‐Driven Engineering of Thermostable Collagen‐Mimetic Peptoid Triple Helices
Data‐driven active learning discovery of collagen‐mimetic peptoids capable of forming a thermostable collagen‐like triple helix using computational screening followed by experimental validation. ABSTRACT Collagen‐mimetic peptides (CMPs) are engineered molecules designed to replicate the triple‐helical structure of natural collagen.
Alex Berlaga +6 more
wiley +1 more source
Solving for Blameless and Optimal Control Under Prioritized Safety Constraints
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek +3 more
wiley +1 more source
A perceptual hash function to store and retrieve large scale DNA sequences
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier +3 more
core
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette +3 more
wiley +1 more source
Semantic embedding based online cross-modal hashing method
AbstractHashing has been extensively utilized in cross-modal retrieval due to its high efficiency in handling large-scale, high-dimensional data. However, most existing cross-modal hashing methods operate as offline learning models, which learn hash codes in a batch-based manner and prove to be inefficient for streaming data.
Meijia Zhang, Junzheng Li, Xiyuan Zheng
openaire +3 more sources
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza +3 more
wiley +1 more source

