Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 4,141 - 4,160 results of 4,440 for search 'Vector processes', query time: 0.09s Refine Results
  1. 4141

    K-mer analysis of long-read alignment pileups for structural variant genotyping by Adam C. English, Fabio Cunial, Ginger A. Metcalf, Richard A. Gibbs, Fritz J. Sedlazeck

    Published 2025-04-01
    “…We present a novel method (kanpig) for genotyping SVs that leverages variant graphs and k-mer vectors to rapidly generate accurate SV genotypes. …”
    Get full text
    Article
  2. 4142

    LIO-SAM++: A Lidar-Inertial Semantic SLAM with Association Optimization and Keyframe Selection by Bingke Shen, Wenming Xie, Xiaodong Peng, Xiaoning Qiao, Zhiyuan Guo

    Published 2024-11-01
    “…The issue of incorrect feature association arises because the matching process is susceptible to influences such as dynamic objects, occlusion, and environmental changes. …”
    Get full text
    Article
  3. 4143

    An Empirical Configuration Study of a Common Document Clustering Pipeline by Anton Eklund, Mona Forsman, Frank Drewes

    Published 2023-09-01
    “… Document clustering is frequently used in applications of natural language processing, e.g. to classify news articles or creating topic models. …”
    Get full text
    Article
  4. 4144

    THE MAPPING OF MOVEMENT VERBS FOUND IN THE GOOD EARTH by I Made Juliarta

    Published 2020-12-01
    “…The Natural Semantic Metalanguage (NSM) is applied in translation process. The novel The Good Earth was chosen as data source because it has two texts which have different language types. …”
    Get full text
    Article
  5. 4145

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  6. 4146

    Les politiques européennes et les villes frontalières en Europe by Bernard Reitel, Pauline Pupier, Birte Wassenberg

    Published 2022-03-01
    “…And yet, as part of the opening regime specific to internal borders, those urban spaces are emblems and vectors of European integration on the local scale. …”
    Get full text
    Article
  7. 4147

    Text-Dependent Writer Identification for Arabic Handwriting by Somaya Al-Maadeed

    Published 2012-01-01
    “…First, a database of words was assembled and used as a test base. Next, features vectors were extracted from writers' word images. …”
    Get full text
    Article
  8. 4148

    A model of mobile robots in networks with resolvability properties. by Carlos Camacho Campos, José Carlos Camacho Moreno, Dorota Kuziak, Zahid Raza, Ismael G Yero

    Published 2025-01-01
    “…This is made in order to detect failures or intruders, by means of dynamic vectors of distances to the set of mobile robots. …”
    Get full text
    Article
  9. 4149

    Illumination-adaptative granularity progressive multimodal image fusion method by Chuanyun WANG, Dongdong SUN, Mingqi ZHOU, Tian WANG, Qian GAO, Zhaokui LI

    Published 2025-06-01
    “…This module leverages a pretrained image encoder to model the scene, generating scene vectors that are processed through various linear layers. …”
    Get full text
    Article
  10. 4150

    Macropinocytosis: Both a Target and a Tool for Cancer Therapy by Manhan Zhao, Liming Zhou, Yifei Zhai, Aiqin Sun, Genbao Shao, Qiong Lin

    Published 2025-06-01
    “…This evolutionarily conserved cellular process plays important roles in nutrient supply, immune response, and metabolism. …”
    Get full text
    Article
  11. 4151

    A model of feature extraction for well logging data based on graph regularized non-negative matrix factorization with optimal estimation by Kehong Yuan, Youlin Shang, Haixiang Guo, Yongsheng Dong, Zhonghua Liu

    Published 2025-02-01
    “…Abstract Reservoir oil-bearing recognition is the process of predicting reservoir types based on well logging data, which determines the accuracy of recognition. …”
    Get full text
    Article
  12. 4152

    Construction and Recording Method of a Three-Dimensional Model to Automatically Manage Thermal Abnormalities in Building Exteriors by Jonghyeon Yoon, Sangjun Hwang, Kyonghoon Kim, Sanghyo Lee

    Published 2025-05-01
    “…Conventional 3D-modeling methods for thermal imaging management either require the processing of large volumes of data due to the use of thermal distribution information from entire image regions or involve increased processing time when architectural drawings are unavailable. …”
    Get full text
    Article
  13. 4153

    FORMATION OF FOREIGN STUDENTS’ SOCIAL COMPETENCE SWOT-ANALYSIS by Yana S. Lukatska

    Published 2021-12-01
    “…Highly qualified teachers and general humanization of the educational process are the factors to be relied upon in forming social competence of foreign students. …”
    Get full text
    Article
  14. 4154

    COMPUTER SCIENCE, COMPUTER ENGINEERING AND MANAGEMENT SYNTHESISING THE MODEL OF THE PREDICTIVE MAINTENANCE OF ATMOSPHERIC PIPE STILL by E. S. Gebel, A. A. Ibatullin, M. S. Peshko, V. N. Gudinov

    Published 2020-01-01
    “…Based on the analysis of the technological process and design features of the atmospheric distillation column, the vectors of maintaining and disturbing actions are determined along with the optimisation criterion for the maintenance problem. …”
    Get full text
    Article
  15. 4155

    Secure data transmission through fractal-based cryptosystem: a Noor iteration approach by Deepak Negi, Rajiv Kumar, Vijay Kumar, Arvind Dhaka

    Published 2025-07-01
    “…Our study intends to improve real-time protection against new attack vectors. The proposed approach ensures key sensitivity by generating an initial value set throughout the Noor iteration process. …”
    Get full text
    Article
  16. 4156

    EXTRUDATES FROM VEGETABLE RAW MATERIALS WITH A HIGH LIPID AND FIBER CONTENT by Kurochkin A.A., Voronina P.K., Shaburova G.V., Frolov D.I.

    Published 2016-09-01
    “…Meanwhile to obtain high quality extrudates from the raw materials with such a composition on the commercially available equipment is impossible because of the unstable nature of the extrusion process. One of the important vectors of thermoplastic extrusion development of multicomponent vegetable raw materials has been proved in this article based on the study of the reaction of capillary-porous extrudates on a medium with reduced air pressure. …”
    Get full text
    Article
  17. 4157

    Constrained adversarial learning for automated software testing: a literature review by João Vitorino, Tiago Dias, Tiago Fonseca, Eva Maia, Isabel Praça

    Published 2025-05-01
    “…Automated software testing can be a promising solution to quickly analyze many lines of code and detect vulnerabilities and possible attack vectors by generating function-specific testing data. …”
    Get full text
    Article
  18. 4158

    A Revised Counter-Propagation Network Model Integrating Rough Set for Structural Damage Detection by Shao-Fei Jiang, Chun Fu, Chun-Ming Zhang, Zhao-Qi Wu

    Published 2013-11-01
    “…This paper proposes a revised counter-propagation network (CPN) model by integrating rough set in structural damage detection, applicable for processing redundant and uncertain information as well as assessing structural health states. …”
    Get full text
    Article
  19. 4159

    Sequential Discrimination of Mixed Quantum States by Jin-Hua Zhang, Fu-Lin Zhang, Yan Gao, Wei Qin, Shao-Ming Fei

    Published 2025-02-01
    “…Classical mixtures of quantum states often give rise to decoherence and are generally considered detrimental to quantum processing. However, in the framework of sequential measurement, such mixtures can be beneficial for state discrimination. …”
    Get full text
    Article
  20. 4160

    Regulation of the Launch of Orphan Drugs on the Market of the Eurasian Economic Union as a Mechanism to Increase the Availability of Treatment for Rare Diseases (Review) by A. V. Foteeva, N. A. Koneva, O. S. Beloglazova, N. B. Rostova

    Published 2023-05-01
    “…Providing high-quality, effective and safe drugs intended for the treatment of rare (orphan) diseases among the population of the Member States of the Union is one of the most significant and promising development vectors for manufacturers-developers. Ensuring the availability of medicines (MP) for patients suffering from rare diseases should be regulated by state incentives for the development and launch of orphan drugs on the market by domestic manufacturers through updating and timely updating of regulatory legal acts in the field of drug registration, as well as providing benefits when initiating the registration process.Text. …”
    Get full text
    Article