Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 4,181 - 4,200 results of 4,440 for search 'Vector processes', query time: 0.12s Refine Results
  1. 4181

    Information extraction from green channel textual records on expressways using hybrid deep learning by Jiaona Chen, Jing Zhang, Weijun Tao, Yinli Jin, Heng Fan

    Published 2024-12-01
    “…Eight entities are designed and proposed in the NER processing for the expressway green channel. three typical pre-trained natural language processing models are utilized and compared to recognize entities and obtain feature vectors, including bidirectional encoder representations from transformer (BERT), ALBERT, and RoBERTa. …”
    Get full text
    Article
  2. 4182

    Automatic Compressive Sensing of Shack–Hartmann Sensors Based on the Vision Transformer by Qingyang Zhang, Heng Zuo, Xiangqun Cui, Xiangyan Yuan, Tianzhu Hu

    Published 2024-10-01
    “…This study introduces a new method of using the Vision Transformer model to process image information from SHWFSs. Compared with previous traditional methods, this model can assign a weight value to each subaperture by considering the position and image information of each subaperture of this sensor, and it can process to obtain wavefront reconstruction results. …”
    Get full text
    Article
  3. 4183

    Distribution of <i>Solidago canadensis</i> L. (Asteraceae) in the Russian Federation by N. N. Luneva, E. N. Mysnik

    Published 2025-07-01
    “…The map was built using IDRISI Selva 17.0 and vectorized in MapInfo 16.0. S. canadensis has spread quite widely in Russia, growing in the European part, the North Caucasus, the Urals, Western Siberia, and the Far East. …”
    Get full text
    Article
  4. 4184

    Analysis of a case of imported tsutsugamushi disease in Shanghai by ZHU Lin, HE Xiaoding

    Published 2024-10-01
    “…The patient resides in Shanghai, where the likelihood of hosts and vectors being present in winter is low, hence the risk of epidemic transmission was deemed low.ConclusionThe clinical manifestations of tsutsugamushi disease are not typical in the early stages of the disease. …”
    Get full text
    Article
  5. 4185

    Identification of key nodes and vulnerability analysis in airport networks with attention mechanism by Guangjian Ren, Zongqian Zhang, Yanhua Li

    Published 2025-07-01
    “…In this method, the core indicators such as degree, betweenness, closeness, eigenvector, and throughput centrality are adopted, and the input layer is constructed by normalization processing. The query, key and value vectors are calculated by a linear transformation, and then the attention score and weight coefficient are obtained, and finally, the comprehensive importance of the airport is evaluated. …”
    Get full text
    Article
  6. 4186

    Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain by Miao Tian, Yuanyue Cui, Zhengjun Liu, Hang Chen

    Published 2025-05-01
    “…To enhance security, the hyperchaotic system generates various hyperchaotic states involved in the disruption process. Subsequently, Random Mode Decomposition (RMD) is employed to generate two asymmetric independent vectors, leading to the acquisition of the ciphertext and private key. …”
    Get full text
    Article
  7. 4187

    A New Dynamic Path Planning Approach for Unmanned Aerial Vehicles by Chenxi Huang, Yisha Lan, Yuchen Liu, Wen Zhou, Hongbin Pei, Longzhi Yang, Yongqiang Cheng, Yongtao Hao, Yonghong Peng

    Published 2018-01-01
    “…Cost functions are established to represent the dynamically changing threats, and the cost value is considered as a scalar value of mobile threats which are vectors actually. In the process of searching for an optimal moving direction for UAV, the cost values of path, mobile threats, and total cost are optimized using ant optimization algorithm. …”
    Get full text
    Article
  8. 4188

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article
  9. 4189

    Comparison Between State-of-the-Art Color Local Binary Pattern-Based Descriptors for Image Retrieval by Mahmood Sotoodeh, Ali Kohan, Mohamad Roshanzamir, Senthil Kumar Jagatheesaperumal, Mohammad Reza Chalak Qazani, Javad Hassannataj Joloudari, Roohallah Alizadehsani, Pawel Plawiak

    Published 2024-01-01
    “…The research compares these descriptors based on mean Average Precision (mAP) scores, the dimensionality of their feature vectors, feature extraction time, and retrieval time. …”
    Get full text
    Article
  10. 4190

    Understanding metro station areas’ functional characteristics via embedding representation: A case study of shanghai by Heping Jiang, Ruihua Liu, Shijia Luo, Disheng Yi, Jing Zhang

    Published 2025-01-01
    “…This study introduces a framework that improves the process of accurately representing station areas. …”
    Get full text
    Article
  11. 4191

    Subspace Projection Attention Network for GPR Heterogeneous Clutter Removal by Yanjie Cao, Xiaopeng Yang, Conglong Guo, Dong Li, Peng Yin, Tian Lan

    Published 2024-01-01
    “…By learning the subspace basis vectors adaptively, the SPA exploits both local and global spatial information to extract target features precisely. …”
    Get full text
    Article
  12. 4192

    Avian Influenza Virus: Comparative Evolution as the Key for Predicting Host Tropism Expansion by Matteo Mellace, Carlotta Ceniti, Marielda Cataldi, Luca Borrelli, Bruno Tilocca

    Published 2025-06-01
    “…Eight viral proteins involved in the process of adaptation to new hosts were selected, and 156 amino acid mutations potentially associated with interspecies transmission were analyzed. …”
    Get full text
    Article
  13. 4193

    Off-Shore wind potential estimation along the coast of Chile by using scatterometer and Reanalysis data by C. Mattar, N. Villar-Poblete

    Published 2014-06-01
    “…<p>This work presents the first offshore wind potential estimation over the coast of Chile using long term data series from “QuikSCAT (V04) wind vectors” and ERA-interim’s wind product between 1999-2009 and 1979-2012, respectively. …”
    Get full text
    Article
  14. 4194

    Discovering Representations of Democracy in Big Data: Purposive Semantic Sample Selection for Qualitative and Mixed-Methods Research by Hubert Plisiecki, Agnieszka Kwiatkowska

    Published 2024-11-01
    “…To address this, we propose purposive semantic sampling – a Natural Language Processing approach using document-level embeddings created by a weighted average of word vectors with term frequency-inverse document frequency (tf-idf). …”
    Get full text
    Article
  15. 4195

    Hyperspectral target detection based on graph sampling and aggregation network. by Tie Li, Hongfeng Jin, Zhiqiu Li

    Published 2025-01-01
    “…This proposed model is capable of autonomously learning the effective feature representations of nodes within the graph, thereby facilitating the extraction and processing of graph data. It achieves this by extracting feature vectors through principal component analysis to construct adjacency matrices and performing convolution operations on hyperspectral images via sparse matrix multiplication, which enables the propagation and aggregation of node features within the graph structure. …”
    Get full text
    Article
  16. 4196

    Systematic Inherent Safety Assessment of Electrolytic Hydrogen Production via Nr-topsis Approach by Jing Dang, Zijian Deng, Valerio Cozzani, Yi Liu

    Published 2025-07-01
    “…Judgment matrices were generated, and weight vectors were calculated, followed by consistency checks to ensure the rationality of the weight allocation. …”
    Get full text
    Article
  17. 4197

    Innovative Potential of the Knowledge-Intensive Services Sector in Russia by Marina Doroshenko

    Published 2011-12-01
    “…This paper addresses theinnovative capacity of the KIS from data obtained from an annual monitoring survey of the KIS sector performed by the HSE ISSEK since 2006.It shows that the evolution of the KIS sector is dominated by  two vectors, aimed respectively at standardizing and customizing services. …”
    Get full text
    Article
  18. 4198

    Differentiable architecture search-based automatic modulation recognition for multi-carrier signals by LI Jie, LI Jing, LYU Lu, GONG Fengkui

    Published 2024-09-01
    “…The time-frequency images, which were insensitive to modulation parameters, were selected as feature vectors to train the neural network. Secondly, DARTS was employed to automatically search the optimal network architecture. …”
    Get full text
    Article
  19. 4199

    Modeling spatiotemporal dynamics of Amblyomma americanum questing activity in the central Great Plains. by Marlon E Cobos, Taylor Winters, Ismari Martinez, Yuan Yao, Xiangming Xiao, Anuradha Ghosh, Kellee Sundstrom, Kathryn Duncan, Robert E Brennan, Susan E Little, A Townsend Peterson

    Published 2024-01-01
    “…Ticks represent important vectors of a number of bacterial and viral disease agents, owing to their hematophagous nature and their questing behavior (the process in which they seek new hosts). …”
    Get full text
    Article
  20. 4200

    Relativity: photon by I. O. Sazonenko, V. I. Sapon

    Published 2021-07-01
    “…From the perspective of the orthogonality of the electromagnetic field vectors E and B, the Heisenberg equation of the form Δp × Δx = ħ/2 is considered. …”
    Get full text
    Article