Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 4,201 - 4,220 results of 4,440 for search 'Vector processes', query time: 0.11s Refine Results
  1. 4201

    Ecological-Epizootiological Differentiation of Natural Plague Foci by V. M. Dubyansky, A. Kh. Khalidov

    Published 2022-01-01
    “…The put forward differentiation of focal areas allows for searching the common patterns of plague epizootic process in foci with different species of hosts and vectors, plague microbe variants and geographic setting, as well as for additional typification alongside the existing ones.…”
    Get full text
    Article
  2. 4202

    Functionalisation of Virus-Like Particles Enhances Antitumour Immune Responses by Katrin Kramer, Farah Al-Barwani, Margaret A. Baird, Vivienne L. Young, David S. Larsen, Vernon K. Ward, Sarah L. Young

    Published 2019-01-01
    “…This study showed that functionalisation of RHDV VLP by addition of an epitope-processing linker and mannosylation of the surface facilitates the efficacy of VLP as vaccination vectors for tumour immunotherapy.…”
    Get full text
    Article
  3. 4203

    Entropy-extreme concept of data gaps filling in a small-sized collection by Viacheslav Kovtun, Krzysztof Grochla, Mohammed Al-Maitah, Saad Aldosary, Oleksii Kozachko

    Published 2025-03-01
    “…Annotation: The article investigates the process of filling data gaps in a small-sized collection, which generalizes information about periodic measurement of input and output parameters of a target object. …”
    Get full text
    Article
  4. 4204
  5. 4205

    An Embedding-Based Semantic Analysis Approach: A Preliminary Study on Redundancy Detection in Psychological Concepts Operationalized by Scales by Zhen Huang, Yitian Long, Kaiping Peng, Song Tong

    Published 2025-01-01
    “…This study introduces an Embedding-based Semantic Analysis Approach (ESAA) for detecting redundancy in psychological concepts, which are operationalized through their respective scales, using natural language processing techniques. The ESAA utilizes OpenAI’s text-embedding-3-large model to generate high-dimensional semantic vectors (i.e., embeddings) of scale items and applies hierarchical clustering to group semantically similar items, revealing potential redundancy. …”
    Get full text
    Article
  6. 4206

    Ubiquitous memory augmentation via mobile multimodal embedding system by Dongqi Cai, Shangguang Wang, Chen Peng, Zeling Zhang, Zhenyan Lu, Tao Qi, Nicholas D. Lane, Mengwei Xu

    Published 2025-06-01
    “…Recently, multimodal embedding models have been proposed to vectorize multimodal reality into a unified embedding space. …”
    Get full text
    Article
  7. 4207

    AlexCapsNet: An Integrated Architecture for Image Classification With Background Noise by Muyi Bao, Nanlin Jin, Ming Xu

    Published 2025-01-01
    “…Capsule networks (CapsNet) are a pioneering architecture that can encode image features into vectors rather than scalars, addressing the limitations of traditional Convolutional Neural Networks (CNNs). …”
    Get full text
    Article
  8. 4208

    Enhancement in Bearing Fault Classification Parameters Using Gaussian Mixture Models and Mel Frequency Cepstral Coefficients Features by Youcef ATMANI, Said RECHAK, Ammar MESLOUB, Larbi HEMMOUCHE

    Published 2020-04-01
    “…In every test performed, the generated features vectors are considered along to discriminate between four fault conditions as normal bearings, bearings with inner and outer race faults and ball faults. …”
    Get full text
    Article
  9. 4209

    HALFORD MACKINDER AND THE GEOGRAPHICAL FORMATION OF POLITICS IN THE EARLY by Artamoshin S. V., Sagimbaev A.V., Fedin A.V.

    Published 2024-09-01
    “…His approach involved identifying key geographical regions of the world that influenced the vectors of European politics in the late 19th – early 20th centuries. …”
    Get full text
    Article
  10. 4210

    Reverse Engineering of Free-Form Surface Based on the Closed-Loop Theory by Xue Ming He, Jun Fei He, Mei Ping Wu, Rong Zhang, Xiao Gang Ji

    Published 2015-01-01
    “…Based on this, a new method of adaptive measurement, real-time reconstruction, and online evaluation of free-form surface was presented in this paper. The coordinates and vectors of the prediction points are calculated according to a Bézier curve which is fitted by measured points. …”
    Get full text
    Article
  11. 4211

    Penetration Testing and Attack Automation Simulation: Deep Reinforcement Learning Approach by Ismael Jabr, Yanal Salman, Motasem Shqair, Amjad Hawash

    Published 2024-08-01
    “…Experimental tests conducted in this work reveal the effectiveness of DQN automated penetration testing by utilizing the most effective attack vectors in the attack automation process…”
    Get full text
    Article
  12. 4212

    A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication by Babatunde Ojetunde, Takuya Kurihara, Kazuto Yano, Toshikazu Sakano, Hiroyuki Yokoyama

    Published 2025-06-01
    “…The extended PQC-based protocols use a sequence number-based mechanism to effectively counter replay and man-in-the-middle attacks and mitigate standard cybersecurity attack vectors. Experimental evaluations examined encryption/decryption speeds, throughput, and processing overhead for the standalone PQC and the PQC–AES hybrid schemes, benchmarking them against traditional AES-256 in an existing client–server environment. …”
    Get full text
    Article
  13. 4213

    Medical image segmentation assisted with clinical inputs via language encoder in a deep learning framework by Hengrui Zhao, Biling Wang, Deepkumar Mistry, Jing Wang, Michael Dohopolski, Daniel Yang, Weiguo Lu, Steve Jiang, Dan Nguyen

    Published 2025-01-01
    “…A transformer-based text encoder converts textual clinical data into vectors, which are incorporated into the segmentation process with image features. …”
    Get full text
    Article
  14. 4214

    The Epidemic Risk of Dengue Fever in Japan: Climate Change and Seasonality by Xia Wang, Hiroshi Nishiura

    Published 2021-01-01
    “…Dengue fever is a leading cause of illness and death in the tropics and subtropics, and the disease has become a threat to many nonendemic countries where the competent vectors such as Aedes albopictus and Aedes aegypti are abundant. …”
    Get full text
    Article
  15. 4215

    Evaluation of an inducible knockout system in insect cells based on co-infection and CRISPR/Cas9. by Christina Sophie Hausjell, Miriam Klausberger, Wolfgang Ernst, Reingard Grabherr

    Published 2023-01-01
    “…However, the co-formation of budded baculovirus during VLP production poses a severe challenge to downstream processing. In order to reduce the amount of budded baculovirus in the expression supernatant we developed an inducible knockout system based on CRISPR/Cas9 and co-infection with two baculoviral vectors: one bringing along the Cas9 nuclease and the other one having incorporated the sequence for sgRNA expression. …”
    Get full text
    Article
  16. 4216

    GMTP: Enhanced Travel Time Prediction with Graph Attention Network and BERT Integration by Ting Liu, Yuan Liu

    Published 2024-12-01
    “…(1) Background: Existing Vehicle travel time prediction applications face challenges in modeling complex road network and handling irregular spatiotemporal traffic state propagation. (2) Methods: To address these issues, we propose a Graph Attention-based Multi-Spatiotemporal Features for Travel Time Prediction (GMTP) model, which integrates an enhanced graph attention network (GATv2) and Bidirectional Encoder Representations from Transformers (BERT) to analyze dynamic correlations across spatial and temporal dimensions. The pre-training process consists of two blocks: the Road Segment Interaction Pattern to Enhance GATv2, which generates road segment representation vectors, and a traffic congestion-aware trajectory encoder by incorporating a shared attention mechanism for high computational efficiency. …”
    Get full text
    Article
  17. 4217

    Fraud Detection Based on Credit Review Texts with Dual Channel Memory Networks by Yansong Wang, Defu Lian, Enhong Chen

    Published 2024-12-01
    “…Graph neural networks and memory networks have strong capabilities for processing the textual data containing massive complex associations, providing a new perspective for fraud detection. …”
    Get full text
    Article
  18. 4218

    Both strands of siRNA have potential to guide posttranscriptional gene silencing in mammalian cells. by Jun-Xia Wei, Jie Yang, Ji-Feng Sun, Lin-Tao Jia, Yong Zhang, Hui-Zhong Zhang, Xia Li, Yan-Ling Meng, Li-Bo Yao, An-Gang Yang

    Published 2009-01-01
    “…Transfection of the synthetic siRNA duplexes with different thermodynamic profiles or short hairpin RNA (shRNA) vectors that generate double-stranded RNAs (dsRNAs), permitting processing specifically from either the 5' or 3' end of the incipient siRNA, results in the degradation of the respective target mRNAs of either strand of the siRNA duplex with comparable efficiencies. …”
    Get full text
    Article
  19. 4219

    The analysis of artificial intelligence knowledge graphs for online music learning platform under deep learning by Shen Jiang, Ningning Shi, Chang Liu

    Published 2025-05-01
    “…In addition, the platform can maintain high accuracy when processing sparse data, demonstrating stronger robustness and adaptability. …”
    Get full text
    Article
  20. 4220

    Drug-Drug interactions prediction calculations between cardiovascular drugs and antidepressants for discovering the potential co-medication risks. by Tie Hua Zhou, Tian Yu Jin, Xi Wei Wang, Ling Wang

    Published 2025-01-01
    “…First, we map feature vectors representing drugs in different feature spaces to the same. …”
    Get full text
    Article