Zobrazeno 1 - 10
of 2 930
pro vyhledávání: '"Lin You"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-12 (2024)
Abstract To investigate the positive feed-forward regulatory mechanism of nitrate uptake by rice, its responses to various light and carbohydrates were compared. In order to measure nitrate uptake in real time, the non-invasive method was used. The r
Externí odkaz:
https://doaj.org/article/79da93a7b4c64cb0a7b53fcc6fabfa72
Publikováno v:
Experimental Gerontology, Vol 191, Iss , Pp 112444- (2024)
Objective: The objective of the study was to systematically investigate the association between gut microbiota (GM) abundance and Parkinson's disease (PD). Methods: PubMed, Medline, Cochrane Library and other literature datebase platforms were search
Externí odkaz:
https://doaj.org/article/9d79cf33deb146429e48107c9a1f1599
Autor:
Yong Lu, Lin You, Liping Li, Jessica A. Kilgore, Shun Liu, Xiaoyu Wang, Yuanwei Dai, Qi Wei, Heping Shi, Lei Han, Lijun Sun, Zhijian J. Chen, Xuewu Zhang, Noelle S. Williams, Chuo Chen
Publikováno v:
ACS Central Science, Vol 9, Iss 12, Pp 2298-2305 (2023)
Externí odkaz:
https://doaj.org/article/2953af03e6d94562ad4941b50201775d
Publikováno v:
Dianxin kexue, Vol 39, Pp 72-78 (2023)
In view of the fact that the local binary pattern (LBP) based speech spoofing detection method has low detection accuracy when detecting synthetic speech, a spoofing speech detection method based on center-symmetric local binary pattern (CSLBP) was p
Externí odkaz:
https://doaj.org/article/85f1d4d5a4054e27b717d7bc29c0a6bd
Publikováno v:
Dianxin kexue, Vol 38, Pp 91-99 (2022)
In order to describe the characteristic information of the speech signal more comprehensively and improve the detection rate of camouflage, a spoofing speech detection method based on the combination of uniform local binary pattern texture feature an
Externí odkaz:
https://doaj.org/article/dd7497a8059243ef96410be870ebad60
Autor:
Huang, Chien-yu, Chen, Wei-Chih, Yang, Shu-wen, Liu, Andy T., Li, Chen-An, Lin, Yu-Xiang, Tseng, Wei-Cheng, Diwan, Anuj, Shih, Yi-Jen, Shi, Jiatong, Chen, William, Chen, Xuanjun, Hsiao, Chi-Yuan, Peng, Puyuan, Wang, Shih-Heng, Kuan, Chun-Yi, Lu, Ke-Han, Chang, Kai-Wei, Yang, Chih-Kai, Ritter-Gutierrez, Fabian, Chuang, Ming To, Huang, Kuan-Po, Arora, Siddhant, Lin, You-Kuan, Yeo, Eunjung, Chang, Kalvin, Chien, Chung-Ming, Choi, Kwanghee, Hsieh, Cheng-Hsiu, Lin, Yi-Cheng, Yu, Chee-En, Chiu, I-Hsiang, Guimarães, Heitor R., Han, Jionghao, Lin, Tzu-Quan, Lin, Tzu-Yuan, Chang, Homu, Chang, Ting-Wu, Chen, Chun Wei, Chen, Shou-Jen, Chen, Yu-Hua, Cheng, Hsi-Chun, Dhawan, Kunal, Fang, Jia-Lin, Fang, Shi-Xin, Chiang, Kuan-Yu Fang, Fu, Chi An, Hsiao, Hsien-Fu, Hsu, Ching Yu, Huang, Shao-Syuan, Wei, Lee Chen, Lin, Hsi-Che, Lin, Hsuan-Hao, Lin, Hsuan-Ting, Lin, Jian-Ren, Liu, Ting-Chun, Lu, Li-Chun, Pai, Tsung-Min, Pasad, Ankita, Kuan, Shih-Yun Shan, Shon, Suwon, Tang, Yuxun, Tsai, Yun-Shao, Wei, Jui-Chiang, Wei, Tzu-Chieh, Wu, Chengxi, Wu, Dien-Ruei, Yang, Chao-Han Huck, Yang, Chieh-Chi, Yip, Jia Qi, Yuan, Shao-Xiang, Noroozi, Vahid, Chen, Zhehuai, Wu, Haibin, Livescu, Karen, Harwath, David, Watanabe, Shinji, Lee, Hung-yi
Multimodal foundation models, such as Gemini and ChatGPT, have revolutionized human-machine interactions by seamlessly integrating various forms of data. Developing a universal spoken language model that comprehends a wide range of natural language i
Externí odkaz:
http://arxiv.org/abs/2411.05361
Student mental health is a sensitive issue that necessitates special attention. A primary concern is the student-to-counselor ratio, which surpasses the recommended standard of 250:1 in most universities. This imbalance results in extended waiting pe
Externí odkaz:
http://arxiv.org/abs/2411.00604
Motivated by the first observation of a doubly charmed tetraquark candidate $T_{cc}(3875)^+$, we perform a systematic calculation of the mass spectra of doubly charmed tetraquark states from $1S$ to $2P$ excitations in a nonrelativistic constituent q
Externí odkaz:
http://arxiv.org/abs/2410.16902
Publikováno v:
Dianxin kexue, Vol 37, Pp 91-99 (2021)
In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was
Externí odkaz:
https://doaj.org/article/75933426d0cc47bb81e7187872307def
Publikováno v:
IEEE Access, Vol 9, Pp 25973-25983 (2021)
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties. Fuzzy identity-based signature (FIBS) and biometric ident
Externí odkaz:
https://doaj.org/article/1aae1d4c78ee41058c87822bf0975ae8