This paper proposes a new neural network model, series connection UNet (SC-UNet). The network model is composed of two series of UNet modules. The residual module and the attention mechanism gate are added to the mode...
详细信息
The theory of optimal choice sets is a solution theory that has a long and well-established tradition in social choice and game theories. Some of important general solution concepts of choice problems when the set of ...
详细信息
Social networks are an essential component of people' daily lives, and as a result, much academic attention has been focused on them. The rapid adoption of machine learning as a problem-solving tool, which simplif...
详细信息
Head injury is the leading cause of mortality and morbidity and often results in pathological bleeding inside the skull, known as Intracranial Hemorrhage (ICH). Currently, the diagnosis of ICH and its type is still ma...
详细信息
Mobile Edge Computing (MEC) is a promising computing paradigm that provides computing and storage services for mobile and big data applications. MEC servers are deployed at base stations to establish a mobile edge net...
详细信息
Reservoir permeability prediction is crucial for hydrocarbon exploration and production. Traditional methods have limitations, and Gaussian Process Regression (GPR) offers a powerful alternative. However, GPR can be s...
详细信息
A systematic review (SR) is essential with up-to-date research evidence to support clinical decisions and practices. However, the growing literature volume makes it challenging for SR reviewers and clinicians to disco...
详细信息
In modern society, object detection tasks have become extremely important due to their numerous applications in fields such as autonomous driving, surveillance, and healthcare. Real-time detection is particularly cruc...
详细信息
Fabrics are seen as the foundation for e-textile interfaces but contribute their own tactile properties to interaction. We examine the role of fabrics in gestural interaction from a novel, textile-focused view. We rep...
详细信息
Nowadays, there is massive volume of data transmitted constantly through digital mediums. This data faces the risks of various cyber-attacks like eavesdropping, traffic analysis, packet injection, and packet dropping....
详细信息
暂无评论