Search alternatives:
semantics » semantic (Expand Search)
Showing 41 - 60 results of 187 for search 'semantics verification', query time: 0.08s Refine Results
  1. 41

    Verification of the Scots Pine (<i>Pinus sylvestris</i> L.) Crown Length Model by Monika Sporek, Kazimierz Sporek, Martin Kučerka

    Published 2025-03-01
    “…One of the key modeling procedures is model verification, which ensures its reliability and confidence. …”
    Get full text
    Article
  2. 42

    Leveraging Multi-Level Semantic Understanding in a Unified NER Model by Yuqian Zhao, Jiuchun Ren

    Published 2024-01-01
    “…To this end, we propose the MLSU (Multi-level Semantic Understanding) model for unified NER tasks. …”
    Get full text
    Article
  3. 43

    Semantic Representation of Social and Role Identification in Subject Self-Organization of Personality by Сергій Дьяков

    Published 2020-04-01
    “…The empirical material reflects the verification of the semantic model and methodology. Modified repertoire lattices by J. …”
    Get full text
    Article
  4. 44

    A Multimodal Semantic-Enhanced Attention Network for Fake News Detection by Weijie Chen, Yuzhuo Dang, Xin Zhang

    Published 2025-07-01
    “…First, we extract modality-specific features and enhance semantics by identifying entities in both text and visual data. …”
    Get full text
    Article
  5. 45

    Semantic influence of programming on the development of thinking of students: background, research and prospects by M. U. Mukasheva, Y. V. Payevskaya

    Published 2020-03-01
    “…Altynsarin with the support of the grant from the Ministry of Education and Science of the Republic of Kazakhstan. The semantic influence of programming on the development of computational thinking implies that with continuous learning to program, that requires high level of abstraction and logic, repetition of experimental verification actions (automatism), visual representation of results, and the work with the elimination of syntactic and logical errors have a significant impact on the development of students’ mental abilities.Purpose is to study the semantic influence of knowledge and programming skills on the development of secondary school students’ computational thinking in the context of programming training.Materials and methods. …”
    Get full text
    Article
  6. 46

    Spatial Semantic Expression of Terrain Viewshed: A Data Mining Method by Cheng Zhang, Yiwen Wang, Haozhe Cheng, Wanfeng Dou

    Published 2025-03-01
    “…With the rapid development of geographic information technology, the expression of topographical spatial semantic relationships has become a research hotspot in the field of intelligent geographic information systems. …”
    Get full text
    Article
  7. 47

    Product-semantics based form design of active wearable upper-limb exoskeletons by Huang Jiawei, Wu Hao, Yu Zhiyuan

    Published 2025-01-01
    “…Then, the design process for the form design of active wearable upper-limb exoskeletons based on product semantics is proposed. Finally, design verification is implemented through design proposals of active wearable upper-limb exoskeletons used in logistics handling, fully considering the intrinsic connection between exoskeletons and their product semantics without interfering with the key technical structure of the exoskeleton and effectively integrating refined product semantic symbols into design practice. …”
    Get full text
    Article
  8. 48
  9. 49

    Research on group type theory and its functorial semantic models in category logic. by Jian-Gang Tang, Yimamujiang Aishan, Ji-Yu Liu, Jia-Yin Peng

    Published 2025-01-01
    “…Furthermore, our exploration is not limited to mathematical conversions; it is also envisioned to extend to the application in various type systems, providing support for future research in formal verification and program analysis in computer science.…”
    Get full text
    Article
  10. 50
  11. 51

    A Novel Semantic Driven Meta-Learning Model for Rare Attack Detection by Y. Annie Jerusha, S. P. Syed Ibrahim, Vijay Varadharajan

    Published 2025-01-01
    “…It uses advanced learning techniques to improve detection through a two-stage verification process. Our approach enhances intrusion detection by integrating an attention-based model for semantic feature extraction and the Simple Neural Attentive Meta-Learner (SNAIL) for rare attack class detection. …”
    Get full text
    Article
  12. 52
  13. 53

    Towards Automatic Deductive Verification of C Programs with Sisal Loops Using the C-lightVer System by Dmitry A. Kondratyev

    Published 2021-12-01
    “…The use of mixed axiomatic semantics results to simpler verification conditions in some cases.…”
    Get full text
    Article
  14. 54

    A Distributed and Parallel (<i>k</i>, <i>n</i>) QSS Scheme with Verification Capability by Theodore Andronikos

    Published 2024-11-01
    “…This paper presents a new quantum secret sharing scheme featuring a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mtext> </mtext><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula> threshold and built-in verification. …”
    Get full text
    Article
  15. 55

    On 0-Complete Partial Metric Spaces and Quantitative Fixed Point Techniques in Denotational Semantics by N. Shahzad, O. Valero

    Published 2013-01-01
    “…In 1994, Matthews introduced the notion of partial metric space with the aim of providing a quantitative mathematical model suitable for program verification. Concretely, Matthews proved a partial metric version of the celebrated Banach fixed point theorem which has become an appropriate quantitative fixed point technique to capture the meaning of recursive denotational specifications in programming languages. …”
    Get full text
    Article
  16. 56
  17. 57

    Sensitive Object Trigger-Based Fragile Watermarking for Integrity Verification of Remote Sensing Object Detection Models by Xin Xu, Zihao Wang, Weitong Chen, Wei Tang, Na Ren, Changqing Zhu

    Published 2025-07-01
    “…The original model ensures that the trigger remains recognizable, while the tampered model encourages sensitivity to parameter changes. During integrity verification, the model is queried with all the fragile watermark samples. …”
    Get full text
    Article
  18. 58

    Semantic Outbreak Power Based Evolution of Web Event in Large-Scale Ubiquitous Contexts by Zheng Xu, Hai-Yan Chen

    Published 2015-07-01
    “…Finally, we give some instances validation of semantic outbreak power of web event and the correctness verification of the event type distinguish of Web event.…”
    Get full text
    Article
  19. 59

    Sentence Embeddings and Semantic Entity Extraction for Identification of Topics of Short Fact-Checked Claims by Krzysztof Węcel, Marcin Sawiński, Włodzimierz Lewoniewski, Milena Stróżyna, Ewelina Księżniak, Witold Abramowicz

    Published 2024-10-01
    “…The assignment of semantic entities is also crucial for the automatic verification of facts using the underlying knowledge graphs. …”
    Get full text
    Article
  20. 60

    Multi-Focus Image Fusion Based on Dual-Channel Rybak Neural Network and Consistency Verification in NSCT Domain by Ming Lv, Sensen Song, Zhenhong Jia, Liangliang Li, Hongbing Ma

    Published 2025-06-01
    “…Experimental results show that our method consistently outperforms several state-of-the-art image fusion techniques, including both traditional algorithms and deep learning-based approaches, in terms of visual quality and objective performance metrics (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>A</mi><mi>B</mi><mo>/</mo><mi>F</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>C</mi><mi>B</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mi>E</mi></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>F</mi><mi>M</mi><mi>I</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>M</mi><mi>I</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>M</mi><mi>S</mi><mi>E</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>N</mi><mi>C</mi><mi>I</mi><mi>E</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>N</mi><mi>M</mi><mi>I</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mi>P</mi></msub></mrow></semantics></math></inline-formula>, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>P</mi><mi>S</mi><mi>N</mi><mi>R</mi></mrow></msub></mrow></semantics></math></inline-formula>). …”
    Get full text
    Article