Results 51 to 60 of about 1,457 (180)

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Self-Supervised Cluster-Contrast Distillation Hashing Network for Cross-Modal Retrieval

open access: yesIEEE Access, 2023
Traditional cross-modal hash models enable efficient and fast retrieval between multimodal data by training high-quality hash representations. The key to the cross-modal hashing model is feature extraction.
Haoxuan Sun, Yudong Cao, Guangyuan Liu
doaj   +1 more source

Exploring Differences Between Similarly Structured State Higher Education Governing Agencies

open access: yesNew Directions for Higher Education, EarlyView.
ABSTRACT Research examining state higher education governing agencies often focuses on their centralization of authority and structure as key differentiating factors (e.g., consolidated governing agencies vs. coordinating boards vs. planning/regulatory agencies).
Paul G. Rubin, Lucas N. English
wiley   +1 more source

Automated Profiling of Social Behaviors to Assess the Genetic Basis of Evolution of Aggressive Behaviors in Astyanax mexicanus

open access: yesJournal of Experimental Zoology Part A: Ecological and Integrative Physiology, EarlyView.
ABSTRACT Across the animal kingdom, social behaviors such as aggression are critical for survival and reproductive success. While there is significant variation in social behaviors within and between species, the genetic mechanisms underlying natural variation in social behaviors are poorly understood.
Renee Mapa   +5 more
wiley   +1 more source

Deep Binary Representation for Efficient Image Retrieval

open access: yesAdvances in Multimedia, 2017
With the fast growing number of images uploaded every day, efficient content-based image retrieval becomes important. Hashing method, which means representing images in binary codes and using Hamming distance to judge similarity, is widely accepted for ...
Xuchao Lu   +4 more
doaj   +1 more source

From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs

open access: yesThe Laryngoscope, EarlyView.
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson   +7 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Proxy-Based Semi-Supervised Cross-Modal Hashing

open access: yesApplied Sciences
Due to the difficulty in obtaining label information in practical applications, semi-supervised cross-modal retrieval has emerged. However, the existing semi-supervised cross-modal hashing retrieval methods mainly focus on exploring the structural ...
Hao Chen, Zhuoyang Zou, Xinghui Zhu
doaj   +1 more source

Attention-Aware Joint Location Constraint Hashing for Multi-Label Image Retrieval

open access: yesIEEE Access, 2020
Learning based hashing has been widely used in approximate nearest neighbor search for image retrieval. However, most of the existing hashing methods are designed to learn only simplex feature similarity while ignored the location similarity among ...
Yingqi Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy