Search alternatives:
vector » sector (Expand Search)
Showing 4,241 - 4,260 results of 4,440 for search 'Vector process', query time: 0.14s Refine Results
  1. 4241

    Development of the Russian Space: Barriers and Opportunities for Regional Policy by N. V. Zubarevich

    Published 2018-04-01
    “…It, in principle, cannot be uniform, which is confirmed by the central-peripheral theory and studies of processes of spatial concentration of the economy, including within the framework of the “new economic geography” of the middle and the end of the 20th century. …”
    Get full text
    Article
  2. 4242

    A Revised Counter-Propagation Network Model Integrating Rough Set for Structural Damage Detection by Shao-Fei Jiang, Chun Fu, Chun-Ming Zhang, Zhao-Qi Wu

    Published 2013-11-01
    “…This paper proposes a revised counter-propagation network (CPN) model by integrating rough set in structural damage detection, applicable for processing redundant and uncertain information as well as assessing structural health states. …”
    Get full text
    Article
  3. 4243

    Sequential Discrimination of Mixed Quantum States by Jin-Hua Zhang, Fu-Lin Zhang, Yan Gao, Wei Qin, Shao-Ming Fei

    Published 2025-02-01
    “…Classical mixtures of quantum states often give rise to decoherence and are generally considered detrimental to quantum processing. However, in the framework of sequential measurement, such mixtures can be beneficial for state discrimination. …”
    Get full text
    Article
  4. 4244

    Vibration-Based Fault Diagnosis of Commutator Motor by Adam Glowacz, Witold Glowacz

    Published 2018-01-01
    “…Proposed techniques used vibration signals and signal processing methods. The authors analysed recognition efficiency for 3 states of the CM: healthy CM, CM with broken tooth on sprocket, CM with broken rotor coil. …”
    Get full text
    Article
  5. 4245
  6. 4246

    Formation of a policy of technological sovereignty in the territories of advanced socio-economic development by attracting private and public capital by N. S. Stepanov

    Published 2024-03-01
    “…The research presents vectors of technological sovereignty establishment with consideration to the possibilities of a regional aspect (the mentioned territories) and an investment one (a combination of both types of capital).…”
    Get full text
    Article
  7. 4247

    Semasiological Relationships of Lexical Parallels in English and French Color Nomenclature by A. V. Ageeva, L. R. Abdullina

    Published 2025-04-01
    “…This study allows for the identification and comparison of ascending and descending trends in color naming across both languages, taking into account the influence of extralinguistic reality on linguistic processes.…”
    Get full text
    Article
  8. 4248

    Research on Analyzing the Emotional Polarity of Malicious Swipe Comments on E-commerce Platforms Based on NPL by Ren Chaoyi

    Published 2025-01-01
    “…In the era of rapid advancements in natural language processing (NLP) models, these technologies have immense potential to detect and address societal issues, enhancing the functioning of the digital society. …”
    Get full text
    Article
  9. 4249

    Challenges and Prospects of Rite Tourism in Russian Regions by Yu. Yu. Pavlova

    Published 2023-04-01
    “…The article analyzes processes influencing current trends of tourism development. …”
    Get full text
    Article
  10. 4250

    Val d’Hérens (Switzerland): A history of Missed (tourist) Transitions by Marjolaine Gros-Balthazard, Caterina Franco, Anouk Bonnemains

    Published 2024-04-01
    “…While tourism, as a development model, has been one of the vectors of these transformations, it is now adapting to address socio-environmental and climate issues. …”
    Get full text
    Article
  11. 4251
  12. 4252

    Distributed semi-supervised partial multi-dimensional learning via subspace learning by Zhen Xu, Weibin Chen

    Published 2025-06-01
    “…Additionally, the existing MDC algorithms only address scenarios of centralized processing, where all training data must be centrally stored at a single fusion center. …”
    Get full text
    Article
  13. 4253

    Peculiarities of epidermal proliferation and terminal differentiation in various histological types of seborrheic keratosis by G. I. Makurina, S. I. Tertyshnyi, L. O. Cherneda

    Published 2022-10-01
    “…Comparative characterization of the association of the expression degree of the immunohistochemical marker of proliferation Ki-67 depending on the activity of terminal differentiation processes in acanthotic and papillomatous types of SK indicates a statistically significant inverse correlation of these pathogenetically determined processes. …”
    Get full text
    Article
  14. 4254

    ARK: Aggregation of Reads by K-Means for Estimation of Bacterial Community Composition. by David Koslicki, Saikat Chatterjee, Damon Shahrivar, Alan W Walker, Suzanna C Francis, Louise J Fraser, Mikko Vehkaperä, Yueheng Lan, Jukka Corander

    Published 2015-01-01
    “…The aggregation of reads is a pre-processing approach where we use a standard K-means clustering algorithm that partitions a large set of reads into subsets with reasonable computational cost to provide several vectors of first order statistics instead of only single statistical summarization in terms of k-mer frequencies. …”
    Get full text
    Article
  15. 4255

    Information extraction from green channel textual records on expressways using hybrid deep learning by Jiaona Chen, Jing Zhang, Weijun Tao, Yinli Jin, Heng Fan

    Published 2024-12-01
    “…Eight entities are designed and proposed in the NER processing for the expressway green channel. three typical pre-trained natural language processing models are utilized and compared to recognize entities and obtain feature vectors, including bidirectional encoder representations from transformer (BERT), ALBERT, and RoBERTa. …”
    Get full text
    Article
  16. 4256

    Text2SQL Business Intelligence System Based on Retrieval‐Augmented Generation (RAG) by Jie Liu, Shiwei Chu

    Published 2025-06-01
    “…Advances in natural language processing, particularly deep learning generative models, have enabled text‐to‐SQL (text2SQL) conversion, making database interaction more intuitive. …”
    Get full text
    Article
  17. 4257

    Identification of key nodes and vulnerability analysis in airport networks with attention mechanism by Guangjian Ren, Zongqian Zhang, Yanhua Li

    Published 2025-07-01
    “…In this method, the core indicators such as degree, betweenness, closeness, eigenvector, and throughput centrality are adopted, and the input layer is constructed by normalization processing. The query, key and value vectors are calculated by a linear transformation, and then the attention score and weight coefficient are obtained, and finally, the comprehensive importance of the airport is evaluated. …”
    Get full text
    Article
  18. 4258

    A New Model of Emergency Supply Management for Swift Transition from Peacetime to Emergency Considering Demand Urgency and Supplier Evaluation by Jiaqi Fang, Lvjiangnan Ye, Wenli Zhou, Lihui Xiong

    Published 2025-01-01
    “…A fuzzy comprehensive assessment approach is applied to classify emergency materials based on demand urgency, identifying drinking water, rescue tools, medical supplies, and other critical items as priority resources. The evaluation vectors for these materials range from 0.1540 to 0.9909. …”
    Get full text
    Article
  19. 4259

    Sequences in the Cytoplasmic Tail Contribute to the Intracellular Trafficking and the Cell Surface Localization of SARS-CoV-2 Spike Protein by Evgeniya E. Burkova, Irina A. Bakhno

    Published 2025-02-01
    “…Understanding these processes is necessary not only for the development of vaccines based on mRNA or adenovirus vectors encoding the full-length spike (S) protein, but also for the therapy of the new coronavirus infection (COVID-19).…”
    Get full text
    Article
  20. 4260

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article