-
4161
Feature Representation Using Deep Autoencoder for Lung Nodule Image Classification
Published 2018-01-01“…Then these patches are transformed into fixed-length local feature vectors using unsupervised deep autoencoder (DAE). …”
Get full text
Article -
4162
Vibration-Based Fault Diagnosis of Commutator Motor
Published 2018-01-01“…Proposed techniques used vibration signals and signal processing methods. The authors analysed recognition efficiency for 3 states of the CM: healthy CM, CM with broken tooth on sprocket, CM with broken rotor coil. …”
Get full text
Article -
4163
A CRISPR Cas12a/Cpf1 strategy to facilitate robust multiplex gene editing in Aspergillus Niger
Published 2025-04-01“…The precursor can be processed via Cpf1 RNase activity to produce multiple functional gRNAs in vivo. …”
Get full text
Article -
4164
A Color Reproduction Method for Exploring the Laser-Induced Color Gamut on Stainless Steel Surfaces Based on a Genetic Algorithm
Published 2024-12-01“…Building on this, we devised a comprehensive image color reproduction process and developed an image color gamut mapping toolkit and an image vectorization toolkit. …”
Get full text
Article -
4165
CHOOSING THE TEST AUTOMATION SYSTEM ACCORDING TO CUSTOMER REQUIREMENTS
Published 2022-04-01“… The subject of the research are methods and technologies for automating the process of software product testing. The aim of the work is to optimize the time and costs for performing automated testing of software products. …”
Get full text
Article -
4166
Study of the slant fracture in solid and hollow cylinders: Experimental analysis and numerical prediction
Published 2022-12-01“…These two models have been extended to take into account the thermal heating effect induced by the mechanical dissipation within the material during the metal forming process. The two models have been implemented into the finite element code Abaqus/Explicit using a Vectorized User MATerial (VUMAT) subroutine. …”
Get full text
Article -
4167
Pansharpening via Multiscale Embedding and Dual Attention Transformers
Published 2024-01-01“…Specifically, a multiscale embedding block is proposed to embed multiscale information of the images into vectors. Thus, transformers only need to process a multispectral embedding sequence and a panchromatic embedding sequence to efficiently use multiscale information. …”
Get full text
Article -
4168
PROSPECT-DP: A coupled leaf optical properties model for improving leaf spectra simulation in the red-edge domain by excluding the ChlF effect
Published 2025-07-01“…A new leaf spectra dataset without ChlF contributions, including reflectance and transmittance data for 849 leaves, was first measured and replace the existing leaf spectra datasets in the modelling process. A coupled leaf optical properties model (PROSPECT-DP) was then established, in which a principal component analysis (PCA) approach was employed to model leaf spectra in red-edge domain using the spectral vectors derived from the training dataset, while the coefficients of spectral vectors were determined by leveraging the PROSPECT-D simulated leaf spectra except for the red-edge domain. …”
Get full text
Article -
4169
Geographic Named Entity Matching and Evaluation Recommendation Using Multi-Objective Tasks: A Study Integrating a Large Language Model (LLM) and Retrieval-Augmented Generation (RAG...
Published 2025-02-01“…To further mimic the human cognitive process during address search, it incorporates the Retrieval-Augmented Generation (RAG) technique. …”
Get full text
Article -
4170
Research on Analyzing the Emotional Polarity of Malicious Swipe Comments on E-commerce Platforms Based on NPL
Published 2025-01-01“…In the era of rapid advancements in natural language processing (NLP) models, these technologies have immense potential to detect and address societal issues, enhancing the functioning of the digital society. …”
Get full text
Article -
4171
On the Ethics of Mediating Embodied Vulnerability to Violence
Published 2024-09-01“…As a starting point, I argue for the politics of embodiment as a generative process that constitutes differential vulnerabilities. …”
Get full text
Article -
4172
REFORMING THE EUROPEAN DOCTORAL EDUCATION SYSTEM IN THE CONTEXT OF FORMATION OF GENERIC COMPETENCES
Published 2024-12-01“…The purpose of the article is to identify the vectors of doctoral education development by analyzing the EU regulatory and recommendation documents which govern the process of reform- ing the doctoral education system in the context of formation of generic competences. …”
Get full text
Article -
4173
Amino acid deprivation triggers a novel GCN2-independent response leading to the transcriptional reactivation of non-native DNA sequences.
Published 2018-01-01“…We have previously shown that, in mammalian cells, deprivation of essential AAs (methionine/cysteine or tyrosine) leads to the transcriptional reactivation of integrated silenced transgenes, including plasmid and retroviral vectors and latent HIV-1 provirus, by a process involving epigenetic chromatic remodeling and histone acetylation. …”
Get full text
Article -
4174
Experimental Observation and Validation of EV Model for Real Driving Behavior
Published 2024-01-01“…Efforts are oriented to progressively dismiss old and outdated Internal Combustion Engines, replacing oil energy sources with electricity vectors. An important switch is involving transportation sector, responsible for 16% of global emissions produced, where the electrification process is converting the private mobility to the use of more sustainable electric vehicles. …”
Get full text
Article -
4175
A data augmentation approach to enhance breast cancer detection using generative adversarial and artificial neural networks
Published 2024-11-01“…Prior to analysis, the images were subjected to a sophisticated data augmentation process that leveraged data denoising, contrast enhancement, and the application of a generative adversarial network (GAN). …”
Get full text
Article -
4176
THE RESEARCH ACTIVITY OF THE UNIVERSITY TEACHERS: DIRECTIONS, RESULTS, AND PROSPECTS. SOCIOLOGICAL CONTENT
Published 2016-05-01“…The classification (depending on the translation vectors results) of dissertation works of graduate students, doctoral candidates is carried out in the course of the present study. …”
Get full text
Article -
4177
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01“…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
Get full text
Article -
4178
Distributed semi-supervised partial multi-dimensional learning via subspace learning
Published 2025-06-01“…By tracking the representations of non-noisy label vectors in the learned subspace, the reliable labels of training data can be recovered. …”
Get full text
Article -
4179
Cluster Networking and Cooperative Localization Based on Biogeography Optimization and Improved Super-Multidimensional Scaling for Multi-Unmanned Aerial Vehicles
Published 2025-05-01“…Subsequently, an improved adaptive sampling Nystrom super-multidimensional scaling algorithm is employed to dynamically select the kernel matrix row vectors. This selection process not only reduces data processing requirements but also enhances the accuracy of the similarity matrix approximation, thus diminishing computational complexity and achieving precise relative positioning of UAVs. …”
Get full text
Article -
4180
ARK: Aggregation of Reads by K-Means for Estimation of Bacterial Community Composition.
Published 2015-01-01“…The aggregation of reads is a pre-processing approach where we use a standard K-means clustering algorithm that partitions a large set of reads into subsets with reasonable computational cost to provide several vectors of first order statistics instead of only single statistical summarization in terms of k-mer frequencies. …”
Get full text
Article