-
4141
K-mer analysis of long-read alignment pileups for structural variant genotyping
Published 2025-04-01“…We present a novel method (kanpig) for genotyping SVs that leverages variant graphs and k-mer vectors to rapidly generate accurate SV genotypes. …”
Get full text
Article -
4142
LIO-SAM++: A Lidar-Inertial Semantic SLAM with Association Optimization and Keyframe Selection
Published 2024-11-01“…The issue of incorrect feature association arises because the matching process is susceptible to influences such as dynamic objects, occlusion, and environmental changes. …”
Get full text
Article -
4143
An Empirical Configuration Study of a Common Document Clustering Pipeline
Published 2023-09-01“… Document clustering is frequently used in applications of natural language processing, e.g. to classify news articles or creating topic models. …”
Get full text
Article -
4144
THE MAPPING OF MOVEMENT VERBS FOUND IN THE GOOD EARTH
Published 2020-12-01“…The Natural Semantic Metalanguage (NSM) is applied in translation process. The novel The Good Earth was chosen as data source because it has two texts which have different language types. …”
Get full text
Article -
4145
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01“…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
Get full text
Article -
4146
Les politiques européennes et les villes frontalières en Europe
Published 2022-03-01“…And yet, as part of the opening regime specific to internal borders, those urban spaces are emblems and vectors of European integration on the local scale. …”
Get full text
Article -
4147
Text-Dependent Writer Identification for Arabic Handwriting
Published 2012-01-01“…First, a database of words was assembled and used as a test base. Next, features vectors were extracted from writers' word images. …”
Get full text
Article -
4148
A model of mobile robots in networks with resolvability properties.
Published 2025-01-01“…This is made in order to detect failures or intruders, by means of dynamic vectors of distances to the set of mobile robots. …”
Get full text
Article -
4149
Illumination-adaptative granularity progressive multimodal image fusion method
Published 2025-06-01“…This module leverages a pretrained image encoder to model the scene, generating scene vectors that are processed through various linear layers. …”
Get full text
Article -
4150
Macropinocytosis: Both a Target and a Tool for Cancer Therapy
Published 2025-06-01“…This evolutionarily conserved cellular process plays important roles in nutrient supply, immune response, and metabolism. …”
Get full text
Article -
4151
A model of feature extraction for well logging data based on graph regularized non-negative matrix factorization with optimal estimation
Published 2025-02-01“…Abstract Reservoir oil-bearing recognition is the process of predicting reservoir types based on well logging data, which determines the accuracy of recognition. …”
Get full text
Article -
4152
Construction and Recording Method of a Three-Dimensional Model to Automatically Manage Thermal Abnormalities in Building Exteriors
Published 2025-05-01“…Conventional 3D-modeling methods for thermal imaging management either require the processing of large volumes of data due to the use of thermal distribution information from entire image regions or involve increased processing time when architectural drawings are unavailable. …”
Get full text
Article -
4153
FORMATION OF FOREIGN STUDENTS’ SOCIAL COMPETENCE SWOT-ANALYSIS
Published 2021-12-01“…Highly qualified teachers and general humanization of the educational process are the factors to be relied upon in forming social competence of foreign students. …”
Get full text
Article -
4154
COMPUTER SCIENCE, COMPUTER ENGINEERING AND MANAGEMENT SYNTHESISING THE MODEL OF THE PREDICTIVE MAINTENANCE OF ATMOSPHERIC PIPE STILL
Published 2020-01-01“…Based on the analysis of the technological process and design features of the atmospheric distillation column, the vectors of maintaining and disturbing actions are determined along with the optimisation criterion for the maintenance problem. …”
Get full text
Article -
4155
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach
Published 2025-07-01“…Our study intends to improve real-time protection against new attack vectors. The proposed approach ensures key sensitivity by generating an initial value set throughout the Noor iteration process. …”
Get full text
Article -
4156
EXTRUDATES FROM VEGETABLE RAW MATERIALS WITH A HIGH LIPID AND FIBER CONTENT
Published 2016-09-01“…Meanwhile to obtain high quality extrudates from the raw materials with such a composition on the commercially available equipment is impossible because of the unstable nature of the extrusion process. One of the important vectors of thermoplastic extrusion development of multicomponent vegetable raw materials has been proved in this article based on the study of the reaction of capillary-porous extrudates on a medium with reduced air pressure. …”
Get full text
Article -
4157
Constrained adversarial learning for automated software testing: a literature review
Published 2025-05-01“…Automated software testing can be a promising solution to quickly analyze many lines of code and detect vulnerabilities and possible attack vectors by generating function-specific testing data. …”
Get full text
Article -
4158
A Revised Counter-Propagation Network Model Integrating Rough Set for Structural Damage Detection
Published 2013-11-01“…This paper proposes a revised counter-propagation network (CPN) model by integrating rough set in structural damage detection, applicable for processing redundant and uncertain information as well as assessing structural health states. …”
Get full text
Article -
4159
Sequential Discrimination of Mixed Quantum States
Published 2025-02-01“…Classical mixtures of quantum states often give rise to decoherence and are generally considered detrimental to quantum processing. However, in the framework of sequential measurement, such mixtures can be beneficial for state discrimination. …”
Get full text
Article -
4160
Regulation of the Launch of Orphan Drugs on the Market of the Eurasian Economic Union as a Mechanism to Increase the Availability of Treatment for Rare Diseases (Review)
Published 2023-05-01“…Providing high-quality, effective and safe drugs intended for the treatment of rare (orphan) diseases among the population of the Member States of the Union is one of the most significant and promising development vectors for manufacturers-developers. Ensuring the availability of medicines (MP) for patients suffering from rare diseases should be regulated by state incentives for the development and launch of orphan drugs on the market by domestic manufacturers through updating and timely updating of regulatory legal acts in the field of drug registration, as well as providing benefits when initiating the registration process.Text. …”
Get full text
Article