Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 4,341 - 4,360 results of 4,440 for search 'Vector processes', query time: 0.13s Refine Results
  1. 4341

    Optimizing Agri-PV System: Systematic Methodology to Assess Key Design Parameters by Kedar Mehta, Wilfried Zörner

    Published 2025-07-01
    “…We introduce a novel dual matrix Analytic Hierarchy Process (AHP) to evaluate their relative significance. …”
    Get full text
    Article
  2. 4342

    Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure by Anas Motii, Mahmoud El Hamlaoui, Robert Basmadjian

    Published 2024-11-01
    “…With the proliferation of charging points, new attack vectors are opened up for cybercriminals. The threat landscape targeting charging systems encompasses various types of attacks ranging from physical attacks to data breaches including customer information. …”
    Get full text
    Article
  3. 4343

    BERT-Residual Quantum Language Model Inspired by ODE Multi-Step Method by Shaohui Liang, Yingkui Wang, Shuxin Chen

    Published 2025-01-01
    “…However, previous methods usually capture semantic features based on context-free word vectors such as Word2Vec and GloVe. Building on natural language encoding, incorporating quantum-inspired density matrix modeling can capture more fine-grained semantic interactions. …”
    Get full text
    Article
  4. 4344

    Russian-Chinese Relations: Political and Economic Aspect by O. E. Grishin, A. V. Trofimova

    Published 2018-08-01
    “…Russian-Chinese trade and economic cooperation is actively analyzed in the works of many researchers, but there is no consensus on the most important vectors of cooperation and prospects for its development. …”
    Get full text
    Article
  5. 4345

    Representation Learning for Place Recognition Using MIMO Radar by Prashant Kumar Rai, Nataliya Strokina, Reza Ghabcheloo

    Published 2025-01-01
    “…The architecture consists of two identical U-Net encoders that extract features from the pair of radar scans, which are then processed by a transformer encoder to estimate ego-motion. …”
    Get full text
    Article
  6. 4346

    Secure Biometric Identification Using Orca Predators Algorithm With Deep Learning: Retinal Iris Image Analysis by Louai A. Maghrabi, Mohammed Altwijri, Sami Saeed Binyamin, Fouad Shoie Alallah, Diaa Hamed, Mahmoud Ragab

    Published 2024-01-01
    “…Besides, the SBRIC-OPADL technique exploits the EfficientNet model for the extraction of feature vectors. Moreover, the hyperparameter tuning process of the EfficientNet model takes place using OPA. …”
    Get full text
    Article
  7. 4347

    Use of a Method for Contour Analysis of Radiation Images of Malignant Breast Tumors on the Basis of Retrospective Material by M. K. Mikhailov, E. A. Romanycheva, V. V. Sevast’yanov, Ya. A. Furman

    Published 2019-11-01
    “…The sequence of complex-valued vectors approximating its curve was used as a mathematical model of the outline. …”
    Get full text
    Article
  8. 4348

    Pedagogical management in the digital educational environment: Theoretical aspect by S. S. Kulikova, O. V. Yakovleva

    Published 2022-02-01
    “…The features and nature of pedagogical management in digital educational environment were determined, its structural components were highlighted: motivational-target, information-content, organisational-activity and control-evaluative. The vectors of strengthening the professional training of specialists in the field of education were determined.Scientific novelty. …”
    Get full text
    Article
  9. 4349

    Development of a New Trapping System with Potential Implementation as a Tool for Mosquito-Borne Arbovirus Surveillance by Luísa Maria Inácio da Silva, Larissa Krokovsky, Rafaela Cassiano Matos, Gabriel da Luz Wallau, Marcelo Henrique Santos Paiva

    Published 2025-06-01
    “…Mosquitoes of the <i>Aedes</i> and <i>Culex</i> genera are primary vectors of arboviruses such as the dengue, Zika, chikungunya (CHIKV), Oropouche, and West Nile viruses, causing millions of infections annually. …”
    Get full text
    Article
  10. 4350

    Adaptive pixel attention network for hyperspectral image classification by Yuefeng Zhao, Chengmin Zai, Nannan Hu, Lu Shi, Xue Zhou, Jingqi Sun

    Published 2024-11-01
    “…Specifically, a Spectral–Spatial Superposition Enhancement module is first proposed for enhancing the spectral–spatial information of 3D input cubes via complementing the 1D spectral vectors by zero and reflection filling operations. …”
    Get full text
    Article
  11. 4351

    Protein C deficiency with recurrent systemic thrombosis associated with compound heterozygous PROC missense variants by Mikio Shiba, Shuichiro Higo, Yu Morishita, Yasuhiro Ichibori, Yoshihiro Kin, Yasushi Sakata, Yoshiharu Higuchi

    Published 2025-02-01
    “…This suggests that these variants may affect both protein activity and the secretory process of protein C.…”
    Get full text
    Article
  12. 4352

    Optimizing Lattice Basis Reduction Algorithm on ARM V8 Processors by Ronghui Cao, Julong Wang, Liming Zheng, Jincheng Zhou, Haodong Wang, Tiaojie Xiao, Chunye Gong

    Published 2025-02-01
    “…The optimization begins with the vectorization of the Gram–Schmidt coefficient calculation and row transformation using the SIMD instruction set of the Phytium chip, which significantly improve computational efficiency. …”
    Get full text
    Article
  13. 4353

    Optimization of cable connection layout of unattended AC/DC joint construction station based on INFO algorithm by Long Hu, Zhiwei Yu, Minxin Liang, Xiaoying Chen, Lixia Chen, Guohui Huang

    Published 2025-05-01
    “…Abstract In order to improve the comprehensive evaluation performance of the optimization of cable connection layout for unattended AC and DC joint construction stations, and avoid falling into local optimal solutions in the optimization process. An optimization method based on INFO algorithm for cable connection layout of unattended AC-DC joint construction station is studied. …”
    Get full text
    Article
  14. 4354

    Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems by Ariadna Claudia Moreno, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado, Luis Javier García Villalba

    Published 2025-01-01
    “…This study considers these challenges, proposing a recommendation system based on a context-rich, vocabulary-aware transformer capable of processing questions related to the target environment and offering responses based on necessary pentest batteries evaluated by a Reinforcement Learning (RL) estimator. …”
    Get full text
    Article
  15. 4355

    Integrating IT and OT for Cybersecurity: A Stochastic Optimization Approach via Attack Graphs by Gonzalo Martinez Medina, Krystel K. Castillo-Villar, Tanveer Hossain Bhuiyan

    Published 2025-01-01
    “…This work addresses this gap by presenting an approach to represent a manufacturing IT and OT network as an attack graph that captures vulnerabilities in components, such as the motion control system, spindle, tool changer, sensors, network interfaces, and connectivity through potential vectors. A two-stage stochastic programming model is formulated based on the attack graph to optimize the allocation of countermeasures under budget constraints considering distinct defense strategies to minimize expected cyber risk. …”
    Get full text
    Article
  16. 4356

    Low-dose computed tomography image denoising using pixel level non-local self-similarity prior with non-local means for healthcare informatics by Dawa Chyophel Lepcha, Bhawna Goyal, Ayush Dogra, Krunal Vaghela, Ashish Singh, K. S. Ravi Kumar, Durga Prasad Bavirisetti

    Published 2025-07-01
    “…This revised approach uses discrete neighbourhood filtering properties to enable efficient, vectorized, and parallel computation on modern shared-memory platforms thereby reducing computational complexity. …”
    Get full text
    Article
  17. 4357

    A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection by Sainag Nethala, Pronoy Chopra, Khaja Kamaluddin, Shahid Alam, Soltan Alharbi, Mohammad Alsaffar

    Published 2025-01-01
    “…The extracted byte data is converted into 1D vectors and reshaped into 2D grayscale images, enabling efficient feature learning through CNNs. …”
    Get full text
    Article
  18. 4358

    AAV-mediated transduction of songbird retina by Pranav Kumar Seth, Pranav Kumar Seth, Dominik Heyers, Dominik Heyers, Baladev Satish, Ezequiel Mendoza, Katrin Haase, Lisa Borowsky, Isabelle Musielak, Karl-Wilhelm Koch, Karl-Wilhelm Koch, Regina Feederle, Constance Scharff, Karin Dedek, Karin Dedek, Henrik Mouritsen, Henrik Mouritsen

    Published 2025-03-01
    “…Resultantly, developments of recombinant viral vectors with improved transduction efficiency and further methodological improvements have mostly focused on murine tissue, whereas AAVs successfully targeting avian retinae have remained scarce.MethodologyUsing a custom-designed injection setup, we identified a viral serotype with the capability to successfully induce widespread transduction of the bird retina.ResultsIntravitreal administration of an AAV type 2/9 encoding for enhanced green fluorescent protein (EGFP) in night-migratory European robins (Erithacus rubecula) resulted in transduction coverages of up to 60% within retinal tissue. …”
    Get full text
    Article
  19. 4359
  20. 4360

    Quantifying key economic uncertainties in the cost of trading green hydrogen by Cameron Aldren, Nilay Shah, Adam Hawkes

    Published 2025-05-01
    “…Summary: In a fully decarbonized global energy system, hydrogen is likely to be one of few energy vectors that can facilitate long-distance export of renewable energy. …”
    Get full text
    Article