Results 61 to 70 of about 4,852,612 (375)

Vegetation Monitoring for Mountainous Regions Using a New Integrated Topographic Correction (ITC) of the SCS + C Correction and the Shadow-Eliminated Vegetation Index

open access: yesRemote Sensing, 2022
The mountainous vegetation is important to regional sustainable development. However, the topographic effect is the main obstacle to the monitoring of mountainous vegetation using remote sensing.
Hong Jiang   +6 more
doaj   +1 more source

How to discuss transferability of qualitative research in health professions education

open access: yesThe Clinical Teacher
Transferability is commonly identified as a quality criterion for qualitative research. This criterion was introduced by Lincoln and Guba to describe the degree to which a study's findings can be transferred to other contexts, settings or respondents. In
R. Stalmeijer   +2 more
semanticscholar   +1 more source

Enhancing Adversarial Example Transferability With an Intermediate Level Attack [PDF]

open access: yesIEEE International Conference on Computer Vision, 2019
Neural networks are vulnerable to adversarial examples, malicious inputs crafted to fool trained models. Adversarial examples often exhibit black-box transfer, meaning that adversarial examples for one model can fool another model.
Qian Huang   +5 more
semanticscholar   +1 more source

Chemical Hardness, Linear Response, and Pseudopotential Transferability

open access: yes, 1995
We propose a systematic method of analyzing pseudopotential transferability based on linear-response properties of the free atom, including self-consistent chemical hardness and polarizability.
Bachelet, G. B.   +4 more
core   +1 more source

Jurisprudential analysis of the relationship between right and ruling [PDF]

open access: yesمطالعات فقه و حقوق اسلامی
There is a difference of opinion about the nature of the right and ruling. Some have defined the right as domination, some have defined it as a type of property, and some have defined it as a special credit.
Mohamadbagher amerinia, Abasali Farahati
doaj   +1 more source

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks [PDF]

open access: yes, 2019
Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an ...
Biggio, Battista   +7 more
core   +1 more source

Feasibility and Preliminary Efficacy of Integrative Neuromuscular Training for Childhood Cancer Survivors: A Pilot Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian   +7 more
wiley   +1 more source

Transferability of e-Portfolios in Education [PDF]

open access: yes, 2007
This is a project funded by JISC DELL II and undertaken by Dr Derek Young and Kylie Lipczynski of ESCalate / University of Stirling. The aim of this project is to undertake an investigation of existing e-portfolio models and their use within the field of
Lipczynski, Kylie, Young, Derek
core  

Increased Risk of Sarcomas in Children With Congenital Anomalies: Findings From the Genetic Overlap Between Anomalies and Cancer in Kids (GOBACK) Registry Linkage Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric sarcomas are a heterogeneous group of tumors that contribute disproportionately to cancer mortality in children. Although congenital anomalies are among the strongest known risk factors for childhood cancer, the risk of specific sarcoma subtypes among affected individuals has not yet been thoroughly evaluated. Procedure We
Russ Wolters   +17 more
wiley   +1 more source

G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud

open access: yesApplied Sciences
Deep neural networks have been shown to produce incorrect predictions when imperceptible perturbations are introduced into the clean input. This phenomenon has garnered significant attention and extensive research in 2D images.
Geng Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy