-
1901
Advances in machine learning for the detection and characterization of microplastics in the environment
Published 2025-05-01“…Recent advances in machine learning (ML) have revolutionized the field of microplastic research by automating and enhancing detection processes. In particular, algorithms such as support vector machines, random forests, and convolutional neural networks have demonstrated considerable success in classifying microplastics based on chemical signatures and visual characteristics. …”
Get full text
Article -
1902
Gluconeogenesis related gene signatures as biomarkers for nonspecific orbital inflammation
Published 2025-07-01“…Functional analyses revealed their involvement in processes such as pyruvate metabolic process, hexose metabolic process, monosaccharide metabolic process. …”
Get full text
Article -
1903
-
1904
THEORY OF DEMOGRAPHIC RESEARCH IN THE UNIVERSITY SCIENTIFIC SCHOOL
Published 2018-03-01“…The scientific article is targeted at researchers of social processes in society attributable to the group of social anomalies. …”
Get full text
Article -
1905
Hidden-like Attractors in a Class of Discontinuous Dynamical Systems
Published 2024-11-01“…The proposed system evolves by adding a nonlinear function to one of the vector fields while still preserving the condition that equilibrium points do not exist in the whole system. …”
Get full text
Article -
1906
An Enhanced Adaptive Ensemble Kalman Filter for Autonomous Underwater Vehicle Integrated Navigation
Published 2024-11-01“…This study proposes an enhanced adaptive EnKF algorithm to improve the smoothness and accuracy of the filtering process. Instead of the conventional Gaussian distribution, this algorithm employs a Laplace distribution to construct the system state vector and observation vector ensembles, enhancing stability against non-Gaussian noise. …”
Get full text
Article -
1907
-
1908
Filtering and Overlapping Data for Accuracy Enhancement of Doppler-Based Location Method
Published 2025-02-01“…The application of low-pass filtering at the DFS vector level improves localization accuracy. In the study, three types of filters for different cutoff frequencies are considered. …”
Get full text
Article -
1909
The effect of beta-globin intron and WPRE on transient expression of SARS-CoV-2 spike and generation of pseudotyped lentiviruses
Published 2025-04-01“…In this study, we aimed to identify an effective expression vector for pseudotyping by inserting SARS-CoV-2 S Δ19 into the intron-containing pcDNA3.1 vector. …”
Get full text
Article -
1910
A data matching algorithm based on instruction pipeline
Published 2025-02-01“…To address this issue, a high-performance data matching algorithm based on instruction pipelining is proposed, known as γFA. It utilizes the vector instruction pipelining built into the Intel architecture to read in multiple character segments, performs pipeline ratio processing of the character segments with untrusted character sets through a wide-width vector comparison function, and converts them into integer vectors. …”
Get full text
Article -
1911
Off-line Recognition of Unconstrained Handwritten Numerals Using Fuzzy Hough Transform
Published 2009-09-01“…The system is an off-line system since the data processed was written before the time of recognition. …”
Get full text
Article -
1912
Perbandingan Teknik Klasifikasi Dalam Data Mining Untuk Bank Direct Marketing
Published 2018-10-01“…Teknik klasifikasi yang digunakan yaitu Support Vector Machine, AdaBoost, Naïve Bayes, Constant, KNN, Tree, Random Forest, Stochastic Gradient Descent, dan CN2 Rule. …”
Get full text
Article -
1913
-
1914
ASSESSMENT OF THE OCCLUSAL RELATIONS NATURE AT THE STAGES OF ORTHOPEDIC REHABILITATION OF PERSONS WITH PERIODONTAL TISSUE DISEASES COMPLICATED BY DENTITION DEFECTS
Published 2021-03-01“…Long-term chronic generalized lesions of recurrent and progressive inflammatory-dystrophic process lead to the destruction of alveolar processes, pathological mobility of teeth, tooth loss and dentofacial dysfunctions. …”
Get full text
Article -
1915
Evaluation approach for network components performance using trustworthiness measurement
Published 2016-03-01“…For the network components selecting problem involved the process of building the new network and net-work service,a network component evaluation method was proposed based on the trustworthiness measurement and the model of the multiple attribute decision analysis.First of all,according to the flexible characteristics of the network ap-plication environment,an on-demand driven and dynamic strategy was designed for constructing trustworthiness index tree.Secondly,the uncertainty of the subjective weight was reduced by using the fuzzy analytic hierarchy process,and the combination weight calculated from the subjective objective weight was used to improve the fairness of weight-ing operation.Next,in the decision stage,the evaluation results were obtained through the integrated use of processing strategies which include the index data utility transformation,the trustworthiness attribute vector construction and the calculation of vector relative approximation degree.Finally,the rationality,applicability and validity of the presented ap-proach are demonstrated with the evaluation of the software defined network controllers,and the results contribute to provide operators more decision information.…”
Get full text
Article -
1916
MAPPING OF AREAS OF MODEL SPECIES OF ANIMAL POPULATION OF THE REPUBLIC OF DAGESTAN
Published 2019-01-01“…Processing of the materials and creation of maps were carried out using such software platforms as ArcGIS, MapInfo and Adobe Illustrator CC. …”
Get full text
Article -
1917
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1918
Black-box and white-box machine learning tools to estimate the frost formation condition during cryogenic CO2 capture from natural gas blends
Published 2025-03-01“…The findings of the current study, in turn, contribute to the understanding of FFT of CO2 and the optimal design of the CCC processes in natural gas industries.…”
Get full text
Article -
1919
Scientific objectives of research on road machines life cycle in modern conditions
Published 2020-08-01“…In the course of the study, a vector was determined for the further development of such a scientific direction as the study of the life cycle system of the road machines in modern conditions. …”
Get full text
Article -
1920
Concrete Dam Deformation Prediction Model Based on Attention Mechanism and Deep Learning
Published 2025-01-01“…Machine learning models such as random forest, support vector regression, and extreme learning machine (ELM) extend statistical approaches but still lack the ability to establish temporal dependencies due to their static input-output mapping relationships. …”
Get full text
Article