Results 31 to 40 of about 860,879 (379)

Time Series Anomaly Detection Using Transformer-Based GAN With Two-Step Masking

open access: yesIEEE Access, 2023
Time series anomaly detection is a task that determines whether an unseen signal is normal or abnormal, and it is a crucial function in various real-world applications. Typical approach is to learn normal data representation using generative models, like
Ah-Hyung Shin   +2 more
doaj   +1 more source

The PALM Technique: histological findings of masked phototherapeutic keratectomy on rabbit corneas

open access: yesBMC Ophthalmology, 2003
Background To compare the corneal healing response between conventional and phototherapeutic keratectomy through a masking agent, in rabbit corneas. Methods 24 adult rabbits underwent phototherapeutic keratectomy.
Naoumidi Irini I   +3 more
doaj   +1 more source

Eesti jõuluaja sanditajad [PDF]

open access: yesMäetagused, 2015
Article discusses Estonian mumming traditions at Christmastime: their spread, age and gender of the participants, costumes and masking, communication between the hosting family and the mummers, and the gifts given to the mummers.
Ülo Tedre
doaj   +1 more source

Side-Channel Attacks on Masked Bitsliced Implementations of AES

open access: yesCryptography, 2022
In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool.
Anca Rădulescu, Marios O. Choudary
doaj   +1 more source

Emotion Potentiates Response Activation and Inhibition in Masked Priming

open access: yesFrontiers in Integrative Neuroscience, 2012
Previous studies have shown that emotion can have two-fold effects on perception. At the object-level, emotional stimuli benefit from a stimulus-specific boost in visual attention at the relative expense of competing stimuli. At the visual feature-level,
Bruno eBocanegra, Rene eZeelenberg
doaj   +1 more source

A Memory Hierarchy Protected against Side-Channel Attacks

open access: yesCryptography, 2022
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory to ...
Ezinam Bertrand Talaki   +3 more
doaj   +1 more source

Isolating neural correlates of conscious perception from neural correlates of reporting one’s perception

open access: yesFrontiers in Psychology, 2014
To isolate neural correlates of conscious perception (NCCs), a standard approach has been to contrast neural activity elicited by identical stimuli of which subjects are aware versus unaware. Because conscious experience is private, determining whether a
Michael A Pitts   +2 more
doaj   +1 more source

Underwater Noise Monitoring with Real-Time and Low-Cost Systems, (The CORMA Experience)

open access: yesJournal of Marine Science and Engineering, 2021
Marine life can be severely affected by anthropogenic underwater noise. This latter increased proportionally to the rise of human activities such as maritime traffic, marine civil engineering works, oil- and gas-related activities or offshore wind farms;
Paolo Diviacco   +10 more
doaj   +1 more source

Feedforward and feedback control in apraxia of speech: effects of noise masking on vowel production [PDF]

open access: yes, 2015
PURPOSE: This study was designed to test two hypotheses about apraxia of speech (AOS) derived from the Directions Into Velocities of Articulators (DIVA) model (Guenther et al., 2006): the feedforward system deficit hypothesis and the feedback system ...
Guenther, Frank H.   +2 more
core   +1 more source

SARS and masks [PDF]

open access: yesJournal of Hospital Infection, 2004
Since its emergence in the first months of 2003, the epidemic of severe acute respiratory syndrome (SARS) has been characterized by rapid spread among healthcare workers (HCWs). Uncertainty about the route of transmission of the virus suggests the use of respirators that can protect HCWs against both droplet nuclei and droplet transmission, rather than
Puro Vincenzo   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy