-
41
Verification of the Scots Pine (<i>Pinus sylvestris</i> L.) Crown Length Model
Published 2025-03-01“…One of the key modeling procedures is model verification, which ensures its reliability and confidence. …”
Get full text
Article -
42
Leveraging Multi-Level Semantic Understanding in a Unified NER Model
Published 2024-01-01“…To this end, we propose the MLSU (Multi-level Semantic Understanding) model for unified NER tasks. …”
Get full text
Article -
43
Semantic Representation of Social and Role Identification in Subject Self-Organization of Personality
Published 2020-04-01“…The empirical material reflects the verification of the semantic model and methodology. Modified repertoire lattices by J. …”
Get full text
Article -
44
A Multimodal Semantic-Enhanced Attention Network for Fake News Detection
Published 2025-07-01“…First, we extract modality-specific features and enhance semantics by identifying entities in both text and visual data. …”
Get full text
Article -
45
Semantic influence of programming on the development of thinking of students: background, research and prospects
Published 2020-03-01“…Altynsarin with the support of the grant from the Ministry of Education and Science of the Republic of Kazakhstan. The semantic influence of programming on the development of computational thinking implies that with continuous learning to program, that requires high level of abstraction and logic, repetition of experimental verification actions (automatism), visual representation of results, and the work with the elimination of syntactic and logical errors have a significant impact on the development of students’ mental abilities.Purpose is to study the semantic influence of knowledge and programming skills on the development of secondary school students’ computational thinking in the context of programming training.Materials and methods. …”
Get full text
Article -
46
Spatial Semantic Expression of Terrain Viewshed: A Data Mining Method
Published 2025-03-01“…With the rapid development of geographic information technology, the expression of topographical spatial semantic relationships has become a research hotspot in the field of intelligent geographic information systems. …”
Get full text
Article -
47
Product-semantics based form design of active wearable upper-limb exoskeletons
Published 2025-01-01“…Then, the design process for the form design of active wearable upper-limb exoskeletons based on product semantics is proposed. Finally, design verification is implemented through design proposals of active wearable upper-limb exoskeletons used in logistics handling, fully considering the intrinsic connection between exoskeletons and their product semantics without interfering with the key technical structure of the exoskeleton and effectively integrating refined product semantic symbols into design practice. …”
Get full text
Article -
48
Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
Published 2024-11-01Get full text
Article -
49
Research on group type theory and its functorial semantic models in category logic.
Published 2025-01-01“…Furthermore, our exploration is not limited to mathematical conversions; it is also envisioned to extend to the application in various type systems, providing support for future research in formal verification and program analysis in computer science.…”
Get full text
Article -
50
Advancing Semantic Enrichment Compliance in BIM: An Ontology-Based Framework and IDS Evaluation
Published 2025-07-01Get full text
Article -
51
A Novel Semantic Driven Meta-Learning Model for Rare Attack Detection
Published 2025-01-01“…It uses advanced learning techniques to improve detection through a two-stage verification process. Our approach enhances intrusion detection by integrating an attention-based model for semantic feature extraction and the Simple Neural Attentive Meta-Learner (SNAIL) for rare attack class detection. …”
Get full text
Article -
52
-
53
Towards Automatic Deductive Verification of C Programs with Sisal Loops Using the C-lightVer System
Published 2021-12-01“…The use of mixed axiomatic semantics results to simpler verification conditions in some cases.…”
Get full text
Article -
54
A Distributed and Parallel (<i>k</i>, <i>n</i>) QSS Scheme with Verification Capability
Published 2024-11-01“…This paper presents a new quantum secret sharing scheme featuring a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mtext> </mtext><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula> threshold and built-in verification. …”
Get full text
Article -
55
On 0-Complete Partial Metric Spaces and Quantitative Fixed Point Techniques in Denotational Semantics
Published 2013-01-01“…In 1994, Matthews introduced the notion of partial metric space with the aim of providing a quantitative mathematical model suitable for program verification. Concretely, Matthews proved a partial metric version of the celebrated Banach fixed point theorem which has become an appropriate quantitative fixed point technique to capture the meaning of recursive denotational specifications in programming languages. …”
Get full text
Article -
56
-
57
Sensitive Object Trigger-Based Fragile Watermarking for Integrity Verification of Remote Sensing Object Detection Models
Published 2025-07-01“…The original model ensures that the trigger remains recognizable, while the tampered model encourages sensitivity to parameter changes. During integrity verification, the model is queried with all the fragile watermark samples. …”
Get full text
Article -
58
Semantic Outbreak Power Based Evolution of Web Event in Large-Scale Ubiquitous Contexts
Published 2015-07-01“…Finally, we give some instances validation of semantic outbreak power of web event and the correctness verification of the event type distinguish of Web event.…”
Get full text
Article -
59
Sentence Embeddings and Semantic Entity Extraction for Identification of Topics of Short Fact-Checked Claims
Published 2024-10-01“…The assignment of semantic entities is also crucial for the automatic verification of facts using the underlying knowledge graphs. …”
Get full text
Article -
60
Multi-Focus Image Fusion Based on Dual-Channel Rybak Neural Network and Consistency Verification in NSCT Domain
Published 2025-06-01“…Experimental results show that our method consistently outperforms several state-of-the-art image fusion techniques, including both traditional algorithms and deep learning-based approaches, in terms of visual quality and objective performance metrics (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>A</mi><mi>B</mi><mo>/</mo><mi>F</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>C</mi><mi>B</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mi>E</mi></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>F</mi><mi>M</mi><mi>I</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>M</mi><mi>I</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>M</mi><mi>S</mi><mi>E</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>N</mi><mi>C</mi><mi>I</mi><mi>E</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>N</mi><mi>M</mi><mi>I</mi></mrow></msub></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mi>P</mi></msub></mrow></semantics></math></inline-formula>, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>Q</mi><mrow><mi>P</mi><mi>S</mi><mi>N</mi><mi>R</mi></mrow></msub></mrow></semantics></math></inline-formula>). …”
Get full text
Article