Zobrazeno 1 - 10
of 28 376
pro vyhledávání: '"Tun A"'
Autor:
Tun Abdul Hamid Haji Mohamad
Publikováno v:
Malaysian Journal of Syariah and Law, Vol 1, Iss 1 (2024)
As late as thirty years ago, one would not find articles on civil law A (I am using the term to mean non-Shariah law applicable in Malaysia) and Islamic law, articles containing comparisons of the two laws on the same subject, not even articles writt
Externí odkaz:
https://doaj.org/article/2c9845a792d74bc69284c12f2746d48a
Autor:
Siti Ruhana, Tun Abdul Karim
Publikováno v:
International Law Discourse in Southeast Asia, Vol 3, Iss 1, Pp 1-32 (2024)
This paper provides a comprehensive analysis of the resolution of the longstanding border dispute between Indonesia and Malaysia. The study delves into the complex dynamics of this conflict, offering insights into its historical context, the key issu
Externí odkaz:
https://doaj.org/article/0f34715a1e0a4454b2e87c342f60d7c2
Autor:
Pankaj Prasoon, Giridhar Hanumappa Devadasar, Tun Aung Kyaw, Mohd. Akthar Ansari, Mulky Damodar Kamath, Chean Leung Chong
Publikováno v:
Laparoscopic, Endoscopic and Robotic Surgery, Vol 5, Iss 2, Pp 82-84 (2022)
Acute abdomen is a common and sometimes dramatic clinical condition, which can be fatal if diagnosis is not made in time. Perforated peptic ulcer is a cause of an acute abdomen, which can be diagnosed by imaging investigations. However, erect chest X
Externí odkaz:
https://doaj.org/article/fc86cc3e9f2142858e26b7a868694bc4
Autor:
Li, Yaqiong, Zhang, Peng, Gu, Hansu, Lu, Tun, Qiao, Siyuan, Shu, Yubo, Shao, Yiyang, Gu, Ning
Although there have been automated approaches and tools supporting toxicity censorship for social posts, most of them focus on detection. Toxicity censorship is a complex process, wherein detection is just an initial task and a user can have further
Externí odkaz:
http://arxiv.org/abs/2411.01844
Low Earth orbit (LEO) satellites are capable of gathering abundant Earth observation data (EOD) to enable different Internet of Things (IoT) applications. However, to accomplish an effective EOD processing mechanism, it is imperative to investigate:
Externí odkaz:
http://arxiv.org/abs/2410.13602
Autor:
Liu, Jiahao, Shao, YiYang, Zhang, Peng, Li, Dongsheng, Gu, Hansu, Chen, Chao, Du, Longzhi, Lu, Tun, Gu, Ning
Personalized algorithms can inadvertently expose users to discomforting recommendations, potentially triggering negative consequences. The subjectivity of discomfort and the black-box nature of these algorithms make it challenging to effectively iden
Externí odkaz:
http://arxiv.org/abs/2410.05411
In this paper, a novel generative adversarial imitation learning (GAIL)-powered policy learning approach is proposed for optimizing beamforming, spectrum allocation, and remote user equipment (RUE) association in NTNs. Traditional reinforcement learn
Externí odkaz:
http://arxiv.org/abs/2409.18718
Autor:
Nguyen, Loc X., Hassan, Sheikh Salman, Tun, Yan Kyaw, Kim, Kitae, Han, Zhu, Hong, Choong Seon
The sixth-generation (6G) non-terrestrial networks (NTNs) are crucial for real-time monitoring in critical applications like disaster relief. However, limited bandwidth, latency, rain attenuation, long propagation delays, and co-channel interference
Externí odkaz:
http://arxiv.org/abs/2409.14726
Autor:
Wang, Chenyu, Yan, Shuo, Chen, Yixuan, Wang, Yujiang, Dong, Mingzhi, Yang, Xiaochen, Li, Dongsheng, Dick, Robert P., Lv, Qin, Yang, Fan, Lu, Tun, Gu, Ning, Shang, Li
Video generation using diffusion-based models is constrained by high computational costs due to the frame-wise iterative diffusion process. This work presents a Diffusion Reuse MOtion (Dr. Mo) network to accelerate latent video generation. Our key di
Externí odkaz:
http://arxiv.org/abs/2409.12532
We present a comprehensive dataset of Java vulnerability-fixing commits (VFCs) to advance research in Java vulnerability analysis. Our dataset, derived from thousands of open-source Java projects on GitHub, comprises two variants: JavaVFC and JavaVFC
Externí odkaz:
http://arxiv.org/abs/2409.05576