Showing 5,001 - 5,020 results of 7,669 for search '(functional OR function) tasks', query time: 0.20s Refine Results
  1. 5001

    Nonrelativistic Approximation in the Theory of a Spin-2 Particle with Anomalous Magnetic Moment by Alina Ivashkevich, Viktor Red’kov, Artur Ishkhanyan

    Published 2025-01-01
    “…This equation is hypothesized to describe a particle with an anomalous magnetic moment. The complete wave function consists of a two-rank symmetric tensor and a three-rank tensor that is symmetric in two indices. …”
    Get full text
    Article
  2. 5002

    Intelligent standalone eye blinking monitoring system for computer users by Ahmad Jiman, Amjad Abdullateef, Alaa Almelawi, Khan Yunus, Yasser Kadah, Ahmad Turki, Mohammed Abdulaal, Nebras Sobahi, Eyad Attar

    Published 2024-12-01
    “…The blinking monitoring system with the alarm function turned on showed an increase in blinking rates (28.2 ± 12.1 blinks/min) compared to blinking rates without the alarm function (25.2 ± 11.9 blinks/min; p=0.09; Cohen’s effect size d=0.25) when the subjects were watching movie trailers. …”
    Get full text
    Article
  3. 5003

    Generation of a Reconfigurable Logical Cell Using Evolutionary Computation by I. Campos-Cantón, L. M. Torres-Treviño, E. Campos-Cantón, R. Femat

    Published 2013-01-01
    “…The reconfiguration is realized by modifying its internal parameters generating several logical functions in the same structure. The logical cell is built with three blocks: the initial condition generating function, the tent map, and the output function. …”
    Get full text
    Article
  4. 5004

    Two-Dimensional Coherent Polarization–Direction-of-Arrival Estimation Based on Sequence-Embedding Fusion Transformer by Zihan Wu, Jun Wang, Zhiquan Zhou

    Published 2024-10-01
    “…Moreover, to enhance the model’s expressive capacity, we designed a multi-task parallel output mode and a multi-task weighted loss function. …”
    Get full text
    Article
  5. 5005

    VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM by V. P. Alferov, I. G. Drovnikova, L. A. Obukhova, E. A. Rogozin

    Published 2019-08-01
    “…The formation (change) of the authority establishment matrix for managing a weakly vulnerable process of access control using a promising subsystem for protecting confidential information and the development of a system of indicators to comprehensively evaluate the effectiveness of its functioning is one of the most important tasks of protecting information from unauthorized access, guaranteeing the implementation of a security policy throughout the entire operation period secure electronic document management system.…”
    Get full text
    Article
  6. 5006

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  7. 5007
  8. 5008

    Regression Model Employing Spiking Neural Network for Bio-Signal Analysis With Hardware Integration by Choongseop Lee, Geunbo Yang, Jaewoo Baek, Yuntae Park, Mingyu Cheon, Jongkil Park, Cheolsoo Park

    Published 2025-01-01
    “…Spiking neural networks, known for mimicking the brain’s functionality resulting in efficient algorithms, are gaining attention across various problems and applications. …”
    Get full text
    Article
  9. 5009

    Predicting DNA-binding proteins and binding residues by complex structure prediction and application to human proteome. by Huiying Zhao, Jihua Wang, Yaoqi Zhou, Yuedong Yang

    Published 2014-01-01
    “…As more and more protein sequences are uncovered from increasingly inexpensive sequencing techniques, an urgent task is to find their functions. This work presents a highly reliable computational technique for predicting DNA-binding function at the level of protein-DNA complex structures, rather than low-resolution two-state prediction of DNA-binding as most existing techniques do. …”
    Get full text
    Article
  10. 5010

    Bio-Inspired Object Detection and Tracking in Aerial Images: Harnessing Northern Goshawk Optimization by Agnivesh Pandey, Rohit Raja, Sumit Srivastava, Krishna Kumar, Manoj Gupta, Chanyanan Somthawinpongsai, Aziz Nanthaamornphong

    Published 2024-01-01
    “…To enhance training stability, Northern Goshawk Optimization is utilized to optimize the generator’s cost and loss functions, mitigating issues like non-convergence and mode collapse. …”
    Get full text
    Article
  11. 5011

    Molten Pool Image Segmentation Based on Adaptive Multi-Scale Attention Mechanism by Yuefeng Chen, Weihua Liu, Qing Yang, Huabin Chen, Qi Jiang

    Published 2025-01-01
    “…This study presents an innovative segmentation algorithm that seamlessly integrates an adaptive multi-scale attention mechanism with the Lossab loss function to tackle challenges like overlapping molten pool contours and arc interference during image segmentation. …”
    Get full text
    Article
  12. 5012

    Impaired mnemonic pattern separation associated with PTSD symptoms paradoxically improves with regular cannabis use by Jacob Ross, Bruna Cuccurazzu, Dylan Delmar, Christian Cortez, Giovanni Castillo, Dean T. Acheson, Dewleen G. Baker, Victoria B. Risbrough, Daniel M. Stout

    Published 2025-04-01
    “…Abstract Posttraumatic stress disorder (PTSD) is associated with poor hippocampal function and disrupted pattern recognition. Cannabis use is highly prevalent in individuals with PTSD, yet the impact on these cognitive functions is poorly understood. …”
    Get full text
    Article
  13. 5013

    Land-Cover Semantic Segmentation for Very-High-Resolution Remote Sensing Imagery Using Deep Transfer Learning and Active Contour Loss by Miguel Chicchon, Francisco James Leon Trujillo, Ivan Sipiran, Ricardo Madrid

    Published 2025-01-01
    “…We assessed the U-Net-scSE, FT-U-NetFormer, and DC-Swin architectures, incorporating transfer learning and active contour loss functions to improve performance on semantic segmentation tasks. …”
    Get full text
    Article
  14. 5014

    Identification of Intrinsic Friction and Torque Ripple for a Robotic Joint with Integrated Torque Sensors with Application to Wheel-Bearing Characterization by Sri Harsha Turlapati, Van Pho Nguyen, Juhi Gurnani, Mohammad Zaidi Bin Ariffin, Sreekanth Kana, Alvin Hong Yee Wong, Boon Siew Han, Domenico Campolo

    Published 2024-11-01
    “…In this work, we propose an approach for identifying and predicting the intrinsic dynamics using linear regression with non-linear radial basis functions. Then, we validate this regression on a wheel-bearing turning task, in which its friction is a measure of quality, and thus must be accurately measured. …”
    Get full text
    Article
  15. 5015

    Leverage point themes within Dutch municipalities' healthy weight approaches: A qualitative study from a systems perspective. by Maud J J Ter Bogt, Kirsten E Bevelander, Lisa Tholen, Gerard R M Molleman, Maria van den Muijsenbergh, Gerdine A J Fransen

    Published 2023-01-01
    “…Such an approach has four interconnected system levels: events, structures, goals, and beliefs, in which small changes ('leverage points') can lead to substantial changes in the functioning of the entire system. The current research examined the functioning of five Dutch municipalities' healthy weight approaches (HWAs) and the leverage point themes that can be identified in their system.…”
    Get full text
    Article
  16. 5016

    The Development of the Economic Analysis Methodology in the Digital Economy by Nataliya S. Plaskova

    Published 2019-01-01
    “…On the other hand, it stands as a methodical support of management system by performing one of the main functions of practical management in innovative industries. …”
    Get full text
    Article
  17. 5017

    Comparison of Language Models in Skills Extraction From Vacancies and Resumes by Lyubov Komarova, Vladimir Soloviev, Alexey Kolosov

    Published 2024-03-01
    “…The result of the study is the selection of the best model and the derivation of functions from the summary text, as well as a comparison of the two sets of functions with each other. …”
    Get full text
    Article
  18. 5018

    THE LEGAL SYSTEM OF RUSSIA AS THE BASIS OF THE SOVEREIGN REGIME OF LEGALITY by ALBOV A.P.

    Published 2023-03-01
    “…. ; it is given not just an assessment of their effectiveness in terms of solving national tasks, but also from the point of view of the reliable functionality of the systems themselves, contributing to ensuring a qualitatively different level of performance of all state functions that ensure sovereignty and security; various aspects of the implementation of legality are shown: on the one hand, the formation of an understanding of the regime of legality is a certain dynamic balance of public relations based on legal awareness and legal culture of society; on the other hand, the rule of law is implemented, taking into account national traditions and legal values, which allows us to talk about such a concept as a “sovereign regime of legality”. …”
    Get full text
    Article
  19. 5019

    An improved dung beetle optimizer based on Padé approximation strategy for global optimization and feature selection by Tianbao Liu, Lingling Yang, Yue Li, Xiwen Qin

    Published 2025-03-01
    “…Finally, the binary version of the mDBO algorithm (bmDBO) was applied to feature selection tasks. Experiments entailing CEC2017 benchmark functions and 17 datasets showed that both mDBO and bmDBO outperformed other algorithms. …”
    Get full text
    Article
  20. 5020

    EFM-ResNet: A Feature Enhanced Network for Tobacco Strips Classification by Bo Zhang, Shanshan Zheng, Leyuan Han, Yucan Qiu

    Published 2025-01-01
    “…Finally, a WFL loss function is used to address the limitations of the traditional cross-entropy loss function. …”
    Get full text
    Article