Zobrazeno 1 - 10
of 36 553
pro vyhledávání: '"LIU, Zhi"'
Publikováno v:
Journal of Islamic and Religious Studies, Vol 6, Iss 2 (2021)
The purpose of this study is to explore through the thoughts of Sheikh Salih Chinese (Liu Zhi) (刘智) about Ilahiyat as one of the major branches of 'Ilm al Kalam which mainly includes the ontological order from the prospect of unitary essence arti
Externí odkaz:
https://doaj.org/article/56c74e7a995b44c18e912b1695639635
Although semi-supervised learning has made significant advances in the field of medical image segmentation, fully annotating a volumetric sample slice by slice remains a costly and time-consuming task. Even worse, most of the existing approaches pay
Externí odkaz:
http://arxiv.org/abs/2412.15526
Autor:
Li, ShuaiHeng, Cai, Qing, Zhang, Fan, Zhang, Menghuan, Shu, Yangyang, Liu, Zhi, Li, Huafeng, Liu, Lingqiao
Self-supervised learning is emerging in fine-grained visual recognition with promising results. However, existing self-supervised learning methods are often susceptible to irrelevant patterns in self-supervised tasks and lack the capability to repres
Externí odkaz:
http://arxiv.org/abs/2412.00134
Quantum correlation of photons based on quantum interference, such as unconventional photon blockade (UPB), has been extensively studied for realizing single-photon sources in weak nonlinear regime. However, how to use this effect for other practical
Externí odkaz:
http://arxiv.org/abs/2411.19139
Autor:
Li, Zhiying, Liu, Zhi, Liu, Dongjie, Zhuo, Shengda, Geng, Guanggang, Weng, Jian, Lyu, Shanxiang, Jin, Xiaobo
High-quality datasets can greatly promote the development of technology. However, dataset construction is expensive and time-consuming, and public datasets are easily exploited by opportunists who are greedy for quick gains, which seriously infringes
Externí odkaz:
http://arxiv.org/abs/2411.15450
Autor:
Li, Zhiying, Liu, Zhi, Geng, Guanggang, Gowda, Shreyank N, Lin, Shuyuan, Weng, Jian, Jin, Xiaobo
Object detectors, which are widely used in real-world applications, are vulnerable to backdoor attacks. This vulnerability arises because many users rely on datasets or pre-trained models provided by third parties due to constraints on data and resou
Externí odkaz:
http://arxiv.org/abs/2411.15439
Autor:
Fan, Cheng-Yu, Wang, Shan, Zhou, Xu-Zhi, Lu, San, Lu, Quanming, Pyakurel, Prayash Sharma, Zong, Qiugang, Liu, Zhi-Yang
The recently discovered electron-only reconnection has drawn great interests due to abnormal features like lack of ion outflows and high reconnection rates. Using particle-in-cell simulations, we investigate their physical mechanisms. The reconnectio
Externí odkaz:
http://arxiv.org/abs/2411.13352