期刊文献+
共找到74,484篇文章
< 1 2 250 >
每页显示 20 50 100
Design of two-dimensional spatially coupled LDPC codes for combating burst erasures 被引量:1
1
作者 刘洋 HE Jinglin +1 位作者 WANG Bin ZHANG Yuzhi 《High Technology Letters》 EI CAS 2023年第3期288-294,共7页
Spatially-coupled low-density parity-check(SC-LDPC)codes are prominent candidates for fu-ture communication standards due to their‘threshold saturation’properties.However,when facing burst erasures,the decoding proc... Spatially-coupled low-density parity-check(SC-LDPC)codes are prominent candidates for fu-ture communication standards due to their‘threshold saturation’properties.However,when facing burst erasures,the decoding process will stop and the decoding performances will dramatically de-grade.To improve the ability of burst erasure corrections,this paper proposes a two-dimensional SC-LDPC(2D-SC-LDPC)codes constructed by parallelly connecting two asymmetric SC-LDPC coupled chains for resistance to burst erasures.Density evolution algorithm is presented to evaluate the as-ymptotic performances against burst erasures,by which the maximum correctable burst erasure length can be computed.The analysis results show that the maximum correctable burst erasure lengths of the proposed 2D-SC-LDPC codes are much larger than the SC-LDPC codes and the asym-metric SC-LDPC codes.Finite-length performance simulation results of the 2D-SC-LDPC codes over the burst erasure channel confirm the excellent asymptotic performances. 展开更多
关键词 burst erasure channel SC-LDPC code density evolution decoding performance
在线阅读 下载PDF
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
2
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
3
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
Estimation of Two-Dimensional Correction Factors for Min-Sum Decoding of Regular LDPC Code
4
作者 Ahmed A. Hamad 《Wireless Engineering and Technology》 2013年第4期181-187,共7页
In this paper, two-dimensional (2-D) correction scheme is proposed to improve the performance of conventional Min-Sum (MS) decoding of regular low density parity check codes. The adopted algorithm to obtain the correc... In this paper, two-dimensional (2-D) correction scheme is proposed to improve the performance of conventional Min-Sum (MS) decoding of regular low density parity check codes. The adopted algorithm to obtain the correction factors is simply based on estimating the mean square difference (MSD) between the transmitted codeword and the posteriori information of both bit and check node that produced at the MS decoder. Semi-practical tests using software-defined radio (SDR) and specific code simulations show that the proposed quasi-optimal algorithm provides a comparable error performance as Sum-Product (SP) decoding while requiring less complexity. 展开更多
关键词 LDPC code Sum-Product Min-Sum 2-D CORRECTION Factors Software-Defined RADIO (SDR)
在线阅读 下载PDF
Rateless Polar Codes with Unequal Error Protection Property
5
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
6
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
7
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
8
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
9
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRANSPORTATION Improved MCUCN code Upscattering effect Absorption by^(3)He
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
10
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 Automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
Research on the Construction of Vital Sign Data Sharing Based on Two-dimensional Code Technology
11
作者 LIU Lihua CAO Yunyun +2 位作者 DONG Yi HU Huahong LIU Zishan 《外文科技期刊数据库(文摘版)医药卫生》 2021年第1期551-553,共3页
Objective: to study and try to apply Internet medical technology to clinical nursing work, so as to improve clinical nursing service. Methods: a total of 100 patients in Department of general surgery and Department of... Objective: to study and try to apply Internet medical technology to clinical nursing work, so as to improve clinical nursing service. Methods: a total of 100 patients in Department of general surgery and Department of orthopedics were collected. The data of temperature, blood pressure, pulse and respiration were collected and uploaded to the cloud database. Make the website QR code as the only identification mark of the patient. The QR code corresponds to the home page of the patient's vital signs browsing, and automatically refresh the home page to search the real-time vital signs data in the cloud. The QR code is posted on the bedside card for scanning or forwarding. Then investigate the satisfaction of family members and medical staff. Results: to realize the integration of Internet technology and clinical nursing service, and make the patient's condition information public to the family members, so as to explore a new model of clinical nursing based on Internet technology. 展开更多
关键词 QR code vital signs NURSING DATA
在线阅读 下载PDF
Maximum two-dimensional (u×v,4,1,3)-OOCs 被引量:2
12
作者 HUANG Yue-mei CHANG Yan-xun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2013年第3期279-289,共11页
Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λ... Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined. 展开更多
关键词 MAXIMUM two-dimensional optical orthogonal code orbit.
在线阅读 下载PDF
COMPACTLY SUPPORTED NON-TENSOR PRODUCT FORM TWO-DIMENSION WAVELET FINITE ELEMENT 被引量:2
13
作者 金坚明 薛鹏翔 +1 位作者 徐应祥 朱亚莉 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2006年第12期1673-1686,共14页
Some theorems of compactly supported non-tensor product form two-dimension Daubechies wavelet were analysed carefully. Compactly supported non-tensor product form two-dimension wavelet was constructed, then non-tensor... Some theorems of compactly supported non-tensor product form two-dimension Daubechies wavelet were analysed carefully. Compactly supported non-tensor product form two-dimension wavelet was constructed, then non-tensor product form two dimension wavelet finite element was used to solve the deflection problem of elastic thin plate. The error order was researched. A numerical example was given at last. 展开更多
关键词 compactly supported non-tensor product two-dimension wavelet interpolation function elastic thin plate DEFLECTION finite element
在线阅读 下载PDF
Two-Dimensional Euler Adaptive Mesh Method on Detonation 被引量:1
14
作者 郝鹏程 冯其京 姚雯 《Journal of Beijing Institute of Technology》 EI CAS 2009年第2期141-145,共5页
The adaptive mesh refinement (AMR) method is applied in the 2-D Euler multi-component elasticplastic hydrodynamics code (MEPH2Y). It is applied on detonation. Firstly, the AMR method is described, including a cons... The adaptive mesh refinement (AMR) method is applied in the 2-D Euler multi-component elasticplastic hydrodynamics code (MEPH2Y). It is applied on detonation. Firstly, the AMR method is described, including a conservative spatial interpolation, the time integration methodology with the adapitve time increment and an adaptive computational region method. The advantage of AMR technique is exhibited by numerical examples, including the 1-D C-J detonation and the 2-D implosion ignited from a single point. Results show that AMR can promote the computational efficiency, keeping the accuracy in interesting regions. 展开更多
关键词 adaptive mesh refinement (AMR) DETONATION two-dimension EULER numerical simulation
在线阅读 下载PDF
The Synthesis and Structural Characterization of Two-dimensional Coordination Polymer {[Ni(phen)H_2O](μ_4-C_( 10)H_2O_8)_(1/2)}_n 被引量:1
15
作者 YE Ling PAN Cheng-ling +3 位作者 CHU De-qing WANG Li-min MU Zhong-cheng XU Ji-qing 《Chemical Research in Chinese Universities》 SCIE CAS CSCD 2002年第4期474-477,共4页
关键词 two-dimension Hydrothermal synthesis Inorganic-organic hybrid material Crystal structure
在线阅读 下载PDF
EFFECT OF SUSPENDED SOLID PARTICLES ON UNSTABILITY OF TWO-DIMENSION MIXING LAYER
16
作者 周泽宣 林建忠 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1997年第6期543-549,共7页
By considering the effect of suspended solid particles in the ordinary equations for two-dimension inviscid incompressible mixing layer, the Rayleigh equation and the modified Rayleigh equation are obtained. And then,... By considering the effect of suspended solid particles in the ordinary equations for two-dimension inviscid incompressible mixing layer, the Rayleigh equation and the modified Rayleigh equation are obtained. And then, by solving the corresponding eigen-value equations with numerical computational method, the relation curves between perturbation frequency and spacial growth rate of the mixing layer for the varying particle loading, ratio of particle velocity to fluid velocity and Stokes number are got. Sever al important conclusions on the effect of suspended solid particles on unstability of the mixing layer are presented in the end by analyzing all the relation curves. 展开更多
关键词 two-dimension mixing layer unstability suspended solid particles numerical computation
在线阅读 下载PDF
Surface Topography of Fine-grained ZrO_2 Ceramic by Two-dimensional Ultrasonic Vibration Grinding
17
作者 丁爱玲 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2011年第6期1162-1165,共4页
The surface quality of fine-grained ZrO2 engineering ceramic were researched using 270# diamond wheel both with and without work-piece two-dimension ultrasonic vibration grinding(WTDUVG). By AFM images, the surface ... The surface quality of fine-grained ZrO2 engineering ceramic were researched using 270# diamond wheel both with and without work-piece two-dimension ultrasonic vibration grinding(WTDUVG). By AFM images, the surface topography and the micro structure of the two-dimensional ultrasonic vibration grinding ceramics were especially analyzed. The experimental results indicate that the surface roughness is related to grinding vibration mode and the material removal mechanism. Surface quality of WTDUVG is superior to that of conventional grinding, and it is easy for two-dimensional ultrasonic vibration grinding that material removal mechanism is ductile mode grinding. 展开更多
关键词 two-dimension ultrasonic vibration grinding surface topography ductile grinding
原文传递
Figma2Code:面向Figma设计稿的自动代码生成方法 被引量:1
18
作者 朱琳 封颖超杰 +8 位作者 朱航 王斯加 朱闽峰 喻晨昊 张钰荟 许达兴 赵德明 冯玉君 陈为 《计算机辅助设计与图形学学报》 北大核心 2025年第2期321-329,共9页
设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Co... 设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Code.首先,通过节点和图层优化提高设计稿元数据质量;其次,采用元数据标注信息的语义理解和图像识别技术识别组件;然后构建一套通用型的中间态数据结构,表示优化后的元数据和识别后的组件属性,以支持多种代码语言的生成;最后,基于模板生成可用代码,并通过函数抽取和元素循环输出提高代码可用性.采用生成代码的复现样式准确度量化评估和基于专家经验的代码可用性定性评估,证明了所提方法的有效性. 展开更多
关键词 设计稿转代码 逆向工程 用户界面 深度学习
在线阅读 下载PDF
The Current Situation and the Development Trend of Two-dimensional Clothing in China
19
作者 LI Mengmi CHEN Ying WANG Ye 《International English Education Research》 2016年第7期47-50,共4页
As a kind of subculture, The two-dimensional culture came of age during the 1970s in Japan and spread to China in the 1980s. In China, the culture has become an important economic force and social capital get more and... As a kind of subculture, The two-dimensional culture came of age during the 1970s in Japan and spread to China in the 1980s. In China, the culture has become an important economic force and social capital get more and more attention to it as well. This paper mainly discusses the origin and development of the two-dimensional clothing, and summed up the inherent characteristics and the internal developing law of it, furthermore, on the stage of current situation of two-dimensional economy this paper will conclude the development trend of next days. 展开更多
关键词 two-dimension two-dimensional clothing development trend
在线阅读 下载PDF
Correction:Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space
20
作者 Mudassir Khalil Muhammad Imran Sharif +3 位作者 Ahmed Naeem Muhammad Umar Chaudhry Hafiz Tayyab Rauf Adham E.Ragab 《Computers, Materials & Continua》 SCIE EI 2025年第1期1461-1461,共1页
In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab C... In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”. 展开更多
关键词 Deep code CIELAB
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部