Search alternatives:
vector » sector (Expand Search)
Showing 1,481 - 1,500 results of 4,440 for search 'Vector process', query time: 0.12s Refine Results
  1. 1481

    Adaptive compressed spectrum sensing based on optimized measurement matrix by Wei-gang WANG, Zhen YANG, Bin GU, Hai-feng HU

    Published 2014-08-01
    “…The estimation error of reconstruction by adaptive compressed sensing was derived, and the column vector autocorrelation of the observation matrix was reduced, and the impact of optimization process on compressed sensing re-construction algorithm was analyzed. …”
    Get full text
    Article
  2. 1482

    An Enhanced Adaptive Ensemble Kalman Filter for Autonomous Underwater Vehicle Integrated Navigation by Zeming Liang, Shuangshuang Fan, Jiacheng Feng, Peng Yuan, Jiangjiang Xu, Xinling Wang, Dongxiao Wang

    Published 2024-11-01
    “…This study proposes an enhanced adaptive EnKF algorithm to improve the smoothness and accuracy of the filtering process. Instead of the conventional Gaussian distribution, this algorithm employs a Laplace distribution to construct the system state vector and observation vector ensembles, enhancing stability against non-Gaussian noise. …”
    Get full text
    Article
  3. 1483
  4. 1484

    Inference and dynamic simulation of malaria using a simple climate-driven entomological model of malaria transmission. by Israel Ukawuba, Jeffrey Shaman

    Published 2022-06-01
    “…Lower dimension mechanistic models that utilize implicit vector dynamics have relied on indirect climate modulation of transmission processes, which compromises investigation of the ecological role played by climate in malaria transmission. …”
    Get full text
    Article
  5. 1485

    The effect of beta-globin intron and WPRE on transient expression of SARS-CoV-2 spike and generation of pseudotyped lentiviruses by Hyeop Jin, Ye Rae Cho, Yong Tae Jung

    Published 2025-04-01
    “…In this study, we aimed to identify an effective expression vector for pseudotyping by inserting SARS-CoV-2 S Δ19 into the intron-containing pcDNA3.1 vector. …”
    Get full text
    Article
  6. 1486

    Adaptive convolutional neural network-based principal component analysis algorithm for the detection of manufacturing data by Tsun-Kuo Lin

    Published 2025-04-01
    “…In summary, the proposed algorithm utilizes a CNN to recognize image signals and employs PCA-based support vector machine scheme for processing measurement data inputs. …”
    Get full text
    Article
  7. 1487

    Novel Special Orthogonal Group Optimization for Coarse Alignment Method of SINS on a Rocking Base by Fujun Pei, Siyuan Li, Li Peng, Shunan Yin

    Published 2022-01-01
    “…A new attitude error function has been proposed on the basis of the cosines between the measurement vector and predictive vector to describe the error between the estimated attitude and the true one. …”
    Get full text
    Article
  8. 1488

    Strongly interacting dark sectors in the early Universe and at the LHC through a simplified portal by Elias Bernreuther, Felix Kahlhoefer, Michael Krämer, Patrick Tunney

    Published 2020-01-01
    “…Abstract We study the cosmology and LHC phenomenology of a consistent strongly interacting dark sector coupled to Standard Model particles through a generic vector mediator. We lay out the requirements for the model to be cosmologically viable, identify annihilations into dark vector mesons as the dominant dark matter freeze-out process and discuss bounds from direct detection. …”
    Get full text
    Article
  9. 1489

    Deep Sparse Autoencoder for Feature Extraction and Diagnosis of Locomotive Adhesion Status by Changfan Zhang, Xiang Cheng, Jianhua Liu, Jing He, Guangwei Liu

    Published 2018-01-01
    “…The adhesion coefficient and creep speed of a locomotive constitute the characteristic vector. The sparse autoencoder unsupervised learning network studies the input vector, and the single-layer network is superimposed to form a deep neural network. …”
    Get full text
    Article
  10. 1490

    Automatic detection method of software upgrade vulnerability based on network traffic analysis by Jinhui TENG, Yan GUANG, Hui SHU, Bing ZHANG

    Published 2020-02-01
    “…During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.…”
    Get full text
    Article
  11. 1491

    Survey of video behavior recognition by Huilan LUO, Chanjuan WANG, Fei LU

    Published 2018-06-01
    “…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
    Get full text
    Article
  12. 1492

    Transition énergétique et hydrogène : le Living Lab ou l’ébauche d’une recherche participative by Rudy Amand, Pauline Ducoulombier, François Millet

    Published 2021-04-01
    “…Engaging institutional actors, participants, but also organizers and researchers in a process approaching participatory research, this initiative was supposed to facilitate a "common" ownership of hydrogen through the development of use scenarios mobilizing this energy vector and their prototyping. …”
    Get full text
    Article
  13. 1493

    Vers une approche individu-centrée pour modéliser et simuler l’expression spatiale d’une maladie transmissible : la peste à Madagascar by Dominique Badariotti, Arnaud Banos, Vincent Laperrière

    Published 2007-07-01
    “…Since the introduction of plague in Madagascar by European settlers, research on the Madagascar epidemiologic cycle has been focusing upon the comprehension of the transmission process between the main host, rats, and the secondary one, humans, via a vector, fleas. …”
    Get full text
    Article
  14. 1494

    L’écologie industrielle : quand l’écosystème industriel devient un vecteur du développement durable by Arnaud Diemer, Sylvère Labrune

    Published 2007-08-01
    “…That leads us to think industrial ecosystem as a vector of sustainable development.Ecological engineering and ecotechnology recommend managers to rationalize the production process (optimization of material consumptions, minimization of bads…). …”
    Get full text
    Article
  15. 1495

    Wide-angle deep ultraviolet antireflective multilayers via discrete-to-continuous optimization by Kim Jae-Hyun, Kim Dong In, Lee Sun Sook, An Ki-Seok, Yim Soonmin, Lee Eungkyu, Kim Sun-Kyung

    Published 2023-03-01
    “…Good training datasets facilitate the optimization process, particularly when an objective function has a non-convex shape containing multiple local optima in a continuous parametric space. …”
    Get full text
    Article
  16. 1496

    Differentiation of canine and feline neoplasms using multi-modal imaging and machine learning by Martynas Maciulevičius, Greta Rupšytė, Renaldas Raišutis, Blaž Cugmas, Mindaugas Tamošiūnas

    Published 2025-05-01
    “…For the differentiation between mastocytoma and sarcoma tumors, both support vector machine and random forest outperformed conventional linear discriminant analysis classifier. …”
    Get full text
    Article
  17. 1497

    Fast Synthesis Method for Large Aperture Array Pattern in the Presence of Array Errors by Lihuan Huo, Rulong Bai, Fei Xue, Jianfeng Chen, Penghui Huang, Guisheng Liao

    Published 2021-01-01
    “…At last, the conversion relationship between the array with errors and the array weight vector is corrected in the iterative process. The theoretical simulation experiments verify the effectiveness and robustness of the proposed method for the linear array and rectangular array pattern synthesis. …”
    Get full text
    Article
  18. 1498

    Implementation of MS Circle Map in Digital Image Encryption by Ichsani Mursidah, Suryadi MT, Sarifuddin Madenda, Suryadi Harmanto

    Published 2025-06-01
    “…This paper proposes a novel MS Circle Map-based image encryption algorithm, integrating chaotic dynamics for enhanced security. The encryption process begins by transforming the plain image matrix into a row vector. …”
    Get full text
    Article
  19. 1499

    Revolutionizing Molecular cloning: Introducing FastCloneAssist, a Streamlined Python tool for optimizing primer design in restriction & ligation-independent PCR cloning. by Pradip Kumar Singh, Michael S Donnenberg

    Published 2025-01-01
    “…FastCloning, a paradigm shift in PCR cloning, has streamlined the process by eliminating laborious, multi-step traditional methods. …”
    Get full text
    Article
  20. 1500

    Sentiment analysis of social media discourse on public perception of online courier services in Saudi Arabia using machine learning by Mohamed Shenify

    Published 2025-01-01
    “…This paper presents a sentiment analysis on online couriers in Saudi Arabia using natural language processing techniques combined with Decision Tree and Support Vector Machine (SVM) classifiers of machine learning. …”
    Get full text
    Article