-
4181
Information extraction from green channel textual records on expressways using hybrid deep learning
Published 2024-12-01“…Eight entities are designed and proposed in the NER processing for the expressway green channel. three typical pre-trained natural language processing models are utilized and compared to recognize entities and obtain feature vectors, including bidirectional encoder representations from transformer (BERT), ALBERT, and RoBERTa. …”
Get full text
Article -
4182
Automatic Compressive Sensing of Shack–Hartmann Sensors Based on the Vision Transformer
Published 2024-10-01“…This study introduces a new method of using the Vision Transformer model to process image information from SHWFSs. Compared with previous traditional methods, this model can assign a weight value to each subaperture by considering the position and image information of each subaperture of this sensor, and it can process to obtain wavefront reconstruction results. …”
Get full text
Article -
4183
Distribution of <i>Solidago canadensis</i> L. (Asteraceae) in the Russian Federation
Published 2025-07-01“…The map was built using IDRISI Selva 17.0 and vectorized in MapInfo 16.0. S. canadensis has spread quite widely in Russia, growing in the European part, the North Caucasus, the Urals, Western Siberia, and the Far East. …”
Get full text
Article -
4184
Analysis of a case of imported tsutsugamushi disease in Shanghai
Published 2024-10-01“…The patient resides in Shanghai, where the likelihood of hosts and vectors being present in winter is low, hence the risk of epidemic transmission was deemed low.ConclusionThe clinical manifestations of tsutsugamushi disease are not typical in the early stages of the disease. …”
Get full text
Article -
4185
Identification of key nodes and vulnerability analysis in airport networks with attention mechanism
Published 2025-07-01“…In this method, the core indicators such as degree, betweenness, closeness, eigenvector, and throughput centrality are adopted, and the input layer is constructed by normalization processing. The query, key and value vectors are calculated by a linear transformation, and then the attention score and weight coefficient are obtained, and finally, the comprehensive importance of the airport is evaluated. …”
Get full text
Article -
4186
Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain
Published 2025-05-01“…To enhance security, the hyperchaotic system generates various hyperchaotic states involved in the disruption process. Subsequently, Random Mode Decomposition (RMD) is employed to generate two asymmetric independent vectors, leading to the acquisition of the ciphertext and private key. …”
Get full text
Article -
4187
A New Dynamic Path Planning Approach for Unmanned Aerial Vehicles
Published 2018-01-01“…Cost functions are established to represent the dynamically changing threats, and the cost value is considered as a scalar value of mobile threats which are vectors actually. In the process of searching for an optimal moving direction for UAV, the cost values of path, mobile threats, and total cost are optimized using ant optimization algorithm. …”
Get full text
Article -
4188
Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
Published 2025-06-01“…Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
Get full text
Article -
4189
Comparison Between State-of-the-Art Color Local Binary Pattern-Based Descriptors for Image Retrieval
Published 2024-01-01“…The research compares these descriptors based on mean Average Precision (mAP) scores, the dimensionality of their feature vectors, feature extraction time, and retrieval time. …”
Get full text
Article -
4190
Understanding metro station areas’ functional characteristics via embedding representation: A case study of shanghai
Published 2025-01-01“…This study introduces a framework that improves the process of accurately representing station areas. …”
Get full text
Article -
4191
Subspace Projection Attention Network for GPR Heterogeneous Clutter Removal
Published 2024-01-01“…By learning the subspace basis vectors adaptively, the SPA exploits both local and global spatial information to extract target features precisely. …”
Get full text
Article -
4192
Avian Influenza Virus: Comparative Evolution as the Key for Predicting Host Tropism Expansion
Published 2025-06-01“…Eight viral proteins involved in the process of adaptation to new hosts were selected, and 156 amino acid mutations potentially associated with interspecies transmission were analyzed. …”
Get full text
Article -
4193
Off-Shore wind potential estimation along the coast of Chile by using scatterometer and Reanalysis data
Published 2014-06-01“…<p>This work presents the first offshore wind potential estimation over the coast of Chile using long term data series from “QuikSCAT (V04) wind vectors” and ERA-interim’s wind product between 1999-2009 and 1979-2012, respectively. …”
Get full text
Article -
4194
Discovering Representations of Democracy in Big Data: Purposive Semantic Sample Selection for Qualitative and Mixed-Methods Research
Published 2024-11-01“…To address this, we propose purposive semantic sampling – a Natural Language Processing approach using document-level embeddings created by a weighted average of word vectors with term frequency-inverse document frequency (tf-idf). …”
Get full text
Article -
4195
Hyperspectral target detection based on graph sampling and aggregation network.
Published 2025-01-01“…This proposed model is capable of autonomously learning the effective feature representations of nodes within the graph, thereby facilitating the extraction and processing of graph data. It achieves this by extracting feature vectors through principal component analysis to construct adjacency matrices and performing convolution operations on hyperspectral images via sparse matrix multiplication, which enables the propagation and aggregation of node features within the graph structure. …”
Get full text
Article -
4196
Systematic Inherent Safety Assessment of Electrolytic Hydrogen Production via Nr-topsis Approach
Published 2025-07-01“…Judgment matrices were generated, and weight vectors were calculated, followed by consistency checks to ensure the rationality of the weight allocation. …”
Get full text
Article -
4197
Innovative Potential of the Knowledge-Intensive Services Sector in Russia
Published 2011-12-01“…This paper addresses theinnovative capacity of the KIS from data obtained from an annual monitoring survey of the KIS sector performed by the HSE ISSEK since 2006.It shows that the evolution of the KIS sector is dominated by two vectors, aimed respectively at standardizing and customizing services. …”
Get full text
Article -
4198
Differentiable architecture search-based automatic modulation recognition for multi-carrier signals
Published 2024-09-01“…The time-frequency images, which were insensitive to modulation parameters, were selected as feature vectors to train the neural network. Secondly, DARTS was employed to automatically search the optimal network architecture. …”
Get full text
Article -
4199
Modeling spatiotemporal dynamics of Amblyomma americanum questing activity in the central Great Plains.
Published 2024-01-01“…Ticks represent important vectors of a number of bacterial and viral disease agents, owing to their hematophagous nature and their questing behavior (the process in which they seek new hosts). …”
Get full text
Article -
4200
Relativity: photon
Published 2021-07-01“…From the perspective of the orthogonality of the electromagnetic field vectors E and B, the Heisenberg equation of the form Δp × Δx = ħ/2 is considered. …”
Get full text
Article