Results 21 to 30 of about 206,500 (292)

Advancements in Parkinson’s Disease Diagnosis: A Comprehensive Survey on Biomarker Integration and Machine Learning

open access: yesComputers
This comprehensive review explores the advancements in machine learning algorithms in the diagnosis of Parkinson’s disease (PD) utilizing different biomarkers.
Ruchira Pratihar, Ravi Sankar
doaj   +1 more source

A Comprehensive Review of Autonomous Driving Algorithms: Tackling Adverse Weather Conditions, Unpredictable Traffic Violations, Blind Spot Monitoring, and Emergency Maneuvers

open access: yesAlgorithms
With the rapid development of autonomous driving technology, ensuring the safety and reliability of vehicles under various complex and adverse conditions has become increasingly important.
Cong Xu, Ravi Sankar
doaj   +1 more source

Refurbish, Reconsecrate, Repurpose: Handling Old and Incinerated Icons in Medieval Japan

open access: yesArs Orientalis, 2023
This article explores how different religious institutions in the Heian and Kamakura periods handled refurbishments and repurposing of their sacred icons, and tackles the issues surrounding the lack of records for “sending away” ceremonies in premodern ...
Benedetta Lomi
doaj   +2 more sources

Icons

open access: yes, 2007
Categorical orthodoxy has it that collections of ordinary mathematical structures such as groups, rings, or spaces, form categories (such as the category of groups); collections of 1-dimensional categorical structures, such as categories, monoidal ...
Lack, Stephen
core   +1 more source

An Efficient hardware implementation of the tate pairing in characteristic three [PDF]

open access: yes, 2008
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the evaluation of the bilinear pairings over elliptic curves, known to be ...
Komurcu, Giray   +3 more
core   +1 more source

Improving Malware Detection Accuracy by Extracting Icon Information

open access: yes, 2017
Detecting PE malware files is now commonly approached using statistical and machine learning models. While these models commonly use features extracted from the structure of PE files, we propose that icons from these files can also help better predict ...
Akhavan-Masouleh, Sepehr   +2 more
core   +1 more source

Redefining Event Detection and Information Dissemination: Lessons from X (Twitter) Data Streams and Beyond

open access: yesComputers
X (formerly known as Twitter), Reddit, and other social media forums have dramatically changed the way society interacts with live events in this day and age.
Harshit Srivastava, Ravi Sankar
doaj   +1 more source

Sensing and Longing for God in Andrey Zvyagintsev’s The Return and Leviathan

open access: yesReligions, 2016
This article explores apophatic ways of presenting God (the Other) in two films of Andrey Zvyagintsev. The lens for this analysis is the phenomenological theology of John Panteleimon Manoussakis, using the following concepts: (1) God as personal Other ...
Denys Kondyuk
doaj   +1 more source

Personality reflection of the old believer M.I. Chuvanov and the artist T.A. Mavrina in their collection of icons

open access: yesИскусство Евразии, 2021
There are two collections of icons in the Department of Private Collections — the M.I. Chuvanov collection and the T.A. Mavrina collection. Despite the fact that the time of their formation is the 20th century and the subject of the collections is icon ...
Vazhkaya, M.A.
doaj   +1 more source

Is Iconic Memory Iconic?

open access: yesPhilosophy and Phenomenological Research, 2019
Short‐term memory in vision is typically thought to divide into at least two memory stores: a short, fragile, high‐capacity store known as iconic memory, and a longer, durable, capacity‐limited store known as visual working memory (VWM). This paper argues that iconic memory stores icons, i.e., image‐like perceptual representations.
openaire   +1 more source

Home - About - Disclaimer - Privacy