Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 1,901 - 1,920 results of 4,440 for search 'Vector processes', query time: 0.14s Refine Results
  1. 1901

    Advances in machine learning for the detection and characterization of microplastics in the environment by M. Maksuda Khanam, M. Khabir Uddin, Julhash U. Kazi

    Published 2025-05-01
    “…Recent advances in machine learning (ML) have revolutionized the field of microplastic research by automating and enhancing detection processes. In particular, algorithms such as support vector machines, random forests, and convolutional neural networks have demonstrated considerable success in classifying microplastics based on chemical signatures and visual characteristics. …”
    Get full text
    Article
  2. 1902

    Gluconeogenesis related gene signatures as biomarkers for nonspecific orbital inflammation by Bahe Dong, Man Zheng, Xiaofeng Xie

    Published 2025-07-01
    “…Functional analyses revealed their involvement in processes such as pyruvate metabolic process, hexose metabolic process, monosaccharide metabolic process. …”
    Get full text
    Article
  3. 1903
  4. 1904

    THEORY OF DEMOGRAPHIC RESEARCH IN THE UNIVERSITY SCIENTIFIC SCHOOL by N. V. Zvereva

    Published 2018-03-01
    “…The scientific article is targeted at researchers of social processes in society attributable to the group of social anomalies. …”
    Get full text
    Article
  5. 1905

    Hidden-like Attractors in a Class of Discontinuous Dynamical Systems by Hany A. Hosham, Mashael A. Aljohani, Eman D. Abou Elela, Nada A. Almuallem, Thoraya N. Alharthi

    Published 2024-11-01
    “…The proposed system evolves by adding a nonlinear function to one of the vector fields while still preserving the condition that equilibrium points do not exist in the whole system. …”
    Get full text
    Article
  6. 1906

    An Enhanced Adaptive Ensemble Kalman Filter for Autonomous Underwater Vehicle Integrated Navigation by Zeming Liang, Shuangshuang Fan, Jiacheng Feng, Peng Yuan, Jiangjiang Xu, Xinling Wang, Dongxiao Wang

    Published 2024-11-01
    “…This study proposes an enhanced adaptive EnKF algorithm to improve the smoothness and accuracy of the filtering process. Instead of the conventional Gaussian distribution, this algorithm employs a Laplace distribution to construct the system state vector and observation vector ensembles, enhancing stability against non-Gaussian noise. …”
    Get full text
    Article
  7. 1907
  8. 1908

    Filtering and Overlapping Data for Accuracy Enhancement of Doppler-Based Location Method by Rafał Szczepanik, Jan M. Kelner

    Published 2025-02-01
    “…The application of low-pass filtering at the DFS vector level improves localization accuracy. In the study, three types of filters for different cutoff frequencies are considered. …”
    Get full text
    Article
  9. 1909

    The effect of beta-globin intron and WPRE on transient expression of SARS-CoV-2 spike and generation of pseudotyped lentiviruses by Hyeop Jin, Ye Rae Cho, Yong Tae Jung

    Published 2025-04-01
    “…In this study, we aimed to identify an effective expression vector for pseudotyping by inserting SARS-CoV-2 S Δ19 into the intron-containing pcDNA3.1 vector. …”
    Get full text
    Article
  10. 1910

    A data matching algorithm based on instruction pipeline by Yang Jiajia, Li Zheng, Zheng Er, Zhao Jing, Yan Wei, Liu Jin

    Published 2025-02-01
    “…To address this issue, a high-performance data matching algorithm based on instruction pipelining is proposed, known as γFA. It utilizes the vector instruction pipelining built into the Intel architecture to read in multiple character segments, performs pipeline ratio processing of the character segments with untrusted character sets through a wide-width vector comparison function, and converts them into integer vectors. …”
    Get full text
    Article
  11. 1911

    Off-line Recognition of Unconstrained Handwritten Numerals Using Fuzzy Hough Transform by Mohammed Khedher, Ghayda Al-Talib, Shayma Al mashhadany

    Published 2009-09-01
    “…The system is an off-line system since the data processed was written before the time of recognition. …”
    Get full text
    Article
  12. 1912

    Perbandingan Teknik Klasifikasi Dalam Data Mining Untuk Bank Direct Marketing by Irvi Oktanisa, Ahmad Afif Supianto

    Published 2018-10-01
    “…Teknik klasifikasi yang digunakan yaitu Support Vector Machine, AdaBoost, Naïve Bayes, Constant, KNN, Tree, Random Forest, Stochastic Gradient Descent, dan CN2 Rule. …”
    Get full text
    Article
  13. 1913
  14. 1914

    ASSESSMENT OF THE OCCLUSAL RELATIONS NATURE AT THE STAGES OF ORTHOPEDIC REHABILITATION OF PERSONS WITH PERIODONTAL TISSUE DISEASES COMPLICATED BY DENTITION DEFECTS by О.V. Bida, О.V. Bida

    Published 2021-03-01
    “…Long-term chronic generalized lesions of recurrent and progressive inflammatory-dystrophic process lead to the destruction of alveolar processes, pathological mobility of teeth, tooth loss and dentofacial dysfunctions. …”
    Get full text
    Article
  15. 1915

    Evaluation approach for network components performance using trustworthiness measurement by Gang XIONG, Ju-long LAN, Yu-xiang HU, Shi-ran LIU

    Published 2016-03-01
    “…For the network components selecting problem involved the process of building the new network and net-work service,a network component evaluation method was proposed based on the trustworthiness measurement and the model of the multiple attribute decision analysis.First of all,according to the flexible characteristics of the network ap-plication environment,an on-demand driven and dynamic strategy was designed for constructing trustworthiness index tree.Secondly,the uncertainty of the subjective weight was reduced by using the fuzzy analytic hierarchy process,and the combination weight calculated from the subjective objective weight was used to improve the fairness of weight-ing operation.Next,in the decision stage,the evaluation results were obtained through the integrated use of processing strategies which include the index data utility transformation,the trustworthiness attribute vector construction and the calculation of vector relative approximation degree.Finally,the rationality,applicability and validity of the presented ap-proach are demonstrated with the evaluation of the software defined network controllers,and the results contribute to provide operators more decision information.…”
    Get full text
    Article
  16. 1916

    MAPPING OF AREAS OF MODEL SPECIES OF ANIMAL POPULATION OF THE REPUBLIC OF DAGESTAN by Asiyat M. Mukhtarova, Vitalij V. Bratkov, Nailya M. Biktimirova, Gulnara M. Mukhtarova, Patimat A. Bekshokova, Gyulnara M. Nakhibasheva

    Published 2019-01-01
    “…Processing of the materials and creation of maps were carried out using such software platforms as ArcGIS, MapInfo and Adobe Illustrator CC. …”
    Get full text
    Article
  17. 1917

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  18. 1918
  19. 1919

    Scientific objectives of research on road machines life cycle in modern conditions by S. A. Evtiukov, S. V. Repin, S. M. Grushetskii, G. A. Kаrro

    Published 2020-08-01
    “…In the course of the study, a vector was determined for the further development of such a scientific direction as the study of the life cycle system of the road machines in modern conditions. …”
    Get full text
    Article
  20. 1920

    Concrete Dam Deformation Prediction Model Based on Attention Mechanism and Deep Learning by ZHANG Hongrui, CAO Xin, JIANG Chao, ZU Anjun, XU Mingxiang

    Published 2025-01-01
    “…Machine learning models such as random forest, support vector regression, and extreme learning machine (ELM) extend statistical approaches but still lack the ability to establish temporal dependencies due to their static input-output mapping relationships. …”
    Get full text
    Article