Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 4,161 - 4,180 results of 4,440 for search 'Vector processes', query time: 0.12s Refine Results
  1. 4161

    Feature Representation Using Deep Autoencoder for Lung Nodule Image Classification by Keming Mao, Renjie Tang, Xinqi Wang, Weiyi Zhang, Haoxiang Wu

    Published 2018-01-01
    “…Then these patches are transformed into fixed-length local feature vectors using unsupervised deep autoencoder (DAE). …”
    Get full text
    Article
  2. 4162

    Vibration-Based Fault Diagnosis of Commutator Motor by Adam Glowacz, Witold Glowacz

    Published 2018-01-01
    “…Proposed techniques used vibration signals and signal processing methods. The authors analysed recognition efficiency for 3 states of the CM: healthy CM, CM with broken tooth on sprocket, CM with broken rotor coil. …”
    Get full text
    Article
  3. 4163
  4. 4164

    A Color Reproduction Method for Exploring the Laser-Induced Color Gamut on Stainless Steel Surfaces Based on a Genetic Algorithm by Xiao Qin, Zhishuang Xue, Xueqiang Wang, Kun Song, Xiaoxia Wan

    Published 2024-12-01
    “…Building on this, we devised a comprehensive image color reproduction process and developed an image color gamut mapping toolkit and an image vectorization toolkit. …”
    Get full text
    Article
  5. 4165

    CHOOSING THE TEST AUTOMATION SYSTEM ACCORDING TO CUSTOMER REQUIREMENTS by Andrei Popov, Myroslav Momot, Alina Yelizieva

    Published 2022-04-01
    “… The subject of the research are methods and technologies for automating the process of software product testing. The aim of the work is to optimize the time and costs for performing automated testing of software products. …”
    Get full text
    Article
  6. 4166

    Study of the slant fracture in solid and hollow cylinders: Experimental analysis and numerical prediction by Nassima Ben Chabane, Nassim Aguechari, Mohand Ould Ouali

    Published 2022-12-01
    “…These two models have been extended to take into account the thermal heating effect induced by the mechanical dissipation within the material during the metal forming process. The two models have been implemented into the finite element code Abaqus/Explicit using a Vectorized User MATerial (VUMAT) subroutine. …”
    Get full text
    Article
  7. 4167

    Pansharpening via Multiscale Embedding and Dual Attention Transformers by Wensheng Fan, Fan Liu, Jingzhi Li

    Published 2024-01-01
    “…Specifically, a multiscale embedding block is proposed to embed multiscale information of the images into vectors. Thus, transformers only need to process a multispectral embedding sequence and a panchromatic embedding sequence to efficiently use multiscale information. …”
    Get full text
    Article
  8. 4168

    PROSPECT-DP: A coupled leaf optical properties model for improving leaf spectra simulation in the red-edge domain by excluding the ChlF effect by Shanshan Du, Dianrun Zhao, LinLin Guan, Mengjia Qi, Xinjie Liu, Liangyun Liu

    Published 2025-07-01
    “…A new leaf spectra dataset without ChlF contributions, including reflectance and transmittance data for 849 leaves, was first measured and replace the existing leaf spectra datasets in the modelling process. A coupled leaf optical properties model (PROSPECT-DP) was then established, in which a principal component analysis (PCA) approach was employed to model leaf spectra in red-edge domain using the spectral vectors derived from the training dataset, while the coefficients of spectral vectors were determined by leveraging the PROSPECT-D simulated leaf spectra except for the red-edge domain. …”
    Get full text
    Article
  9. 4169

    Geographic Named Entity Matching and Evaluation Recommendation Using Multi-Objective Tasks: A Study Integrating a Large Language Model (LLM) and Retrieval-Augmented Generation (RAG... by Jiajun Zhang, Junjie Fang, Chengkun Zhang, Wei Zhang, Huanbing Ren, Liuchang Xu

    Published 2025-02-01
    “…To further mimic the human cognitive process during address search, it incorporates the Retrieval-Augmented Generation (RAG) technique. …”
    Get full text
    Article
  10. 4170

    Research on Analyzing the Emotional Polarity of Malicious Swipe Comments on E-commerce Platforms Based on NPL by Ren Chaoyi

    Published 2025-01-01
    “…In the era of rapid advancements in natural language processing (NLP) models, these technologies have immense potential to detect and address societal issues, enhancing the functioning of the digital society. …”
    Get full text
    Article
  11. 4171

    On the Ethics of Mediating Embodied Vulnerability to Violence by Meenakshi Gigi Durham

    Published 2024-09-01
    “…As a starting point, I argue for the politics of embodiment as a generative process that constitutes differential vulnerabilities. …”
    Get full text
    Article
  12. 4172

    REFORMING THE EUROPEAN DOCTORAL EDUCATION SYSTEM IN THE CONTEXT OF FORMATION OF GENERIC COMPETENCES by Derstuganova Natalia

    Published 2024-12-01
    “…The purpose of the article is to identify the vectors of doctoral education development by analyzing the EU regulatory and recommendation documents which govern the process of reform- ing the doctoral education system in the context of formation of generic competences. …”
    Get full text
    Article
  13. 4173

    Amino acid deprivation triggers a novel GCN2-independent response leading to the transcriptional reactivation of non-native DNA sequences. by Annarosaria De Vito, Massimo Lazzaro, Ilaria Palmisano, Davide Cittaro, Michela Riba, Dejan Lazarevic, Dejan Lazarevic, Makoto Bannai, Davide Gabellini, Maria Vittoria Schiaffino

    Published 2018-01-01
    “…We have previously shown that, in mammalian cells, deprivation of essential AAs (methionine/cysteine or tyrosine) leads to the transcriptional reactivation of integrated silenced transgenes, including plasmid and retroviral vectors and latent HIV-1 provirus, by a process involving epigenetic chromatic remodeling and histone acetylation. …”
    Get full text
    Article
  14. 4174

    Experimental Observation and Validation of EV Model for Real Driving Behavior by Antonio Covello, Andrea Di Martino, Michela Longo

    Published 2024-01-01
    “…Efforts are oriented to progressively dismiss old and outdated Internal Combustion Engines, replacing oil energy sources with electricity vectors. An important switch is involving transportation sector, responsible for 16% of global emissions produced, where the electrification process is converting the private mobility to the use of more sustainable electric vehicles. …”
    Get full text
    Article
  15. 4175

    A data augmentation approach to enhance breast cancer detection using generative adversarial and artificial neural networks by Alawee Wissam H., Al-Haddad Luttfi A., Basem Ali, Al-Haddad Abdullah A.

    Published 2024-11-01
    “…Prior to analysis, the images were subjected to a sophisticated data augmentation process that leveraged data denoising, contrast enhancement, and the application of a generative adversarial network (GAN). …”
    Get full text
    Article
  16. 4176

    THE RESEARCH ACTIVITY OF THE UNIVERSITY TEACHERS: DIRECTIONS, RESULTS, AND PROSPECTS. SOCIOLOGICAL CONTENT by I. A. Vasilyev

    Published 2016-05-01
    “…The classification (depending on the translation vectors results) of dissertation works of graduate students, doctoral candidates is carried out in the course of the present study. …”
    Get full text
    Article
  17. 4177

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  18. 4178

    Distributed semi-supervised partial multi-dimensional learning via subspace learning by Zhen Xu, Weibin Chen

    Published 2025-06-01
    “…By tracking the representations of non-noisy label vectors in the learned subspace, the reliable labels of training data can be recovered. …”
    Get full text
    Article
  19. 4179

    Cluster Networking and Cooperative Localization Based on Biogeography Optimization and Improved Super-Multidimensional Scaling for Multi-Unmanned Aerial Vehicles by Shuhao Zhang, Huimin Zhang, Ying Zhan, Xiaokai Wei, Yang Liu

    Published 2025-05-01
    “…Subsequently, an improved adaptive sampling Nystrom super-multidimensional scaling algorithm is employed to dynamically select the kernel matrix row vectors. This selection process not only reduces data processing requirements but also enhances the accuracy of the similarity matrix approximation, thus diminishing computational complexity and achieving precise relative positioning of UAVs. …”
    Get full text
    Article
  20. 4180

    ARK: Aggregation of Reads by K-Means for Estimation of Bacterial Community Composition. by David Koslicki, Saikat Chatterjee, Damon Shahrivar, Alan W Walker, Suzanna C Francis, Louise J Fraser, Mikko Vehkaperä, Yueheng Lan, Jukka Corander

    Published 2015-01-01
    “…The aggregation of reads is a pre-processing approach where we use a standard K-means clustering algorithm that partitions a large set of reads into subsets with reasonable computational cost to provide several vectors of first order statistics instead of only single statistical summarization in terms of k-mer frequencies. …”
    Get full text
    Article