Search alternatives:
semantics » semantic (Expand Search)
Showing 121 - 140 results of 187 for search 'semantics verification', query time: 0.07s Refine Results
  1. 121

    Dynamic Excitation of Surface Plasmon Polaritons with Vector Laguerre–Gaussian Beams by Aldo Peña-Ramírez, Tingting Zhai, Rafael Salas-Montiel, Víctor Ruiz-Cortés

    Published 2024-11-01
    “…Our study demonstrates the efficient coupling of SPPs with LG beams, characterized by their azimuthal and radial indices <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>m</mi><mo>,</mo><mi>p</mi><mo>)</mo></mrow></semantics></math></inline-formula>, as well as polarization distribution type. …”
    Get full text
    Article
  2. 122

    Few-shot cybersecurity event detection method by data augmentation with prompting question answering by TANG Mengmeng, GUO Yuanbo, ZHANG Han, BAI Qingchun, CHEN Qingli, ZHANG Bowen

    Published 2024-08-01
    “…Then, the generated high-confidence pseudo-annotated instances and raw data were used to fine-tune the model to enhance its semantic understanding of cybersecurity events. Experimental verification was conducted on two datasets in cybersecurity. …”
    Get full text
    Article
  3. 123

    Research on fusion model based on deep learning for text content security enhancement by Shaomin WANG, Zheng WANG, Hua REN

    Published 2020-05-01
    “…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
    Get full text
    Article
  4. 124

    Creation of Low-Loss Dual-Ring Optical Filter via Temporal Coupled Mode Theory and Direct Binary Search Inverse Design by Yuchen Hu, Tong Wang, Wen Zhou, Bo Hu

    Published 2025-07-01
    “…The proposed device has a narrow spectral linewidth of 0.3 nm within a compact footprint of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>24</mn><mrow><mo> </mo><mi mathvariant="sans-serif">μ</mi><mi mathvariant="normal">m</mi></mrow><mo>×</mo><mn>25.5</mn><mrow><mo> </mo><mi mathvariant="sans-serif">μ</mi><mi mathvariant="normal">m</mi></mrow></mrow></semantics></math></inline-formula>. …”
    Get full text
    Article
  5. 125

    Privacy-Preserving Poisoning-Resistant Blockchain-Based Federated Learning for Data Sharing in the Internet of Medical Things by Xudong Zhu, Hui Li

    Published 2025-05-01
    “…Specifically, we design an active protection framework that uses a lightweight <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>t</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula>-threshold secret sharing scheme to protect devices’ privacy and prevent coordination edge nodes from colluding. …”
    Get full text
    Article
  6. 126

    Blockchain-Powered LSTM-Attention Hybrid Model for Device Situation Awareness and On-Chain Anomaly Detection by Qiang Zhang, Caiqing Yue, Xingzhe Dong, Guoyu Du, Dongyu Wang

    Published 2025-07-01
    “…The model utilizes an encoder–attention–decoder architecture for processing multivariate time series data generated by industrial sensors and smart contracts for automated on-chain data verification and tampering alerts. Experiments on real-world datasets demonstrate that the LEAD achieves an <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>F</mi><mrow><mn>0.1</mn></mrow></msub></semantics></math></inline-formula> score of 0.96, outperforming baseline models (Recurrent Neural Network (RNN): 0.90; LSTM: 0.94; and Bi-directional LSTM (Bi-LSTM, 0.94)). …”
    Get full text
    Article
  7. 127

    Word-Formation Representation of Concept FRIENDSHIP in Modern Russian by A. Aru

    Published 2021-08-01
    “…The research focuses on the structure and semantics of words that form a word-formation nest with apex “friend” in Russian. …”
    Get full text
    Article
  8. 128

    Semantik Verba dalam Membentuk Gaya Bahasa pada Judul Berita Tempodotco by Hani Agustina, Mahyuni Mahyuni, Burhanuddin Burhanuddin

    Published 2022-11-01
    “…Keywords: Title, Verb, Semantics, Metaphor, Personification, Phrase …”
    Get full text
    Article
  9. 129

    Improvement of Terrain Entropy Calculation for Grid Digital Elevation Models Considering Spatial Structural Features by Fangbin Zhou, Tianyi Yao, Junwei Bian, Yun Xiao

    Published 2025-02-01
    “…This comprehensive grouping strategy was integrated into distance calculations, becoming a new probability operator that accurately reflects terrain spatial characteristics. Experimental verification confirms that the method proposed aligns with the fundamental concept of entropy, yielding a regression equation of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>y</mi><mo>=</mo><mn>0.011</mn><mrow><mrow><mi mathvariant="normal">ln</mi></mrow><mo>⁡</mo><mrow><mi>x</mi></mrow></mrow><mo>+</mo><mn>0.463</mn></mrow></semantics></math></inline-formula> with a coefficient of determination of 94.73%, a reliability of 44.015, and a measurement ability of 0.757. …”
    Get full text
    Article
  10. 130

    An abnormal traffic detection method for chain information management system network based on convolutional neural network by Chao Liu, Chunxiang Liu, Changrong Liu

    Published 2025-04-01
    “…Through extensive experimental verification, CBAM-AE-CRF can comprehensively understand the semantics of network traffic, accurately identify anomalies in network traffic of chain information management system, provide strong support for network traffic management.…”
    Get full text
    Article
  11. 131

    Bilinear Learning with Dual-Chain Feature Attention for Multimodal Rumor Detection by Zheheng Guo, Haonan Liu, Lijiao Zuo, Junhao Wen

    Published 2025-05-01
    “…Accurate rumor detection to minimize manual verification efforts remains a critical research challenge. …”
    Get full text
    Article
  12. 132

    Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios by Yingzi Wang, Ce Yu, Jue Hou, Yongjia Zhang, Xiangyi Fang, Shuyue Wu

    Published 2021-01-01
    “…After experimental verification, this method can effectively detect the integrity of the data transmission process and improve the application of data value, and the final effect is increased by 30.5%.…”
    Get full text
    Article
  13. 133

    MAHE: a multiscale and hybrid expert-based model for image-text enhanced named entity recognition on social media by Song Yang, Baolin Mo, Dayang Liu, Liangkuan Zhu

    Published 2025-05-01
    “…This approach often struggles to accurately align text with semantic understanding of images in complex network environments. …”
    Get full text
    Article
  14. 134

    Disease prediction models and operational readiness. by Courtney D Corley, Laura L Pullum, David M Hartley, Corey Benedum, Christine Noonan, Peter M Rabinowitz, Mary J Lancaster

    Published 2014-01-01
    “…All models were classified as either having undergone Some Verification or Validation method, or No Verification or Validation. …”
    Get full text
    Article
  15. 135

    TIBW: Task-Independent Backdoor Watermarking with Fine-Tuning Resilience for Pre-Trained Language Models by Weichuan Mo, Kongyang Chen, Yatie Xiao

    Published 2025-01-01
    “…We also design a comprehensive watermark verification process that evaluates task behavior consistency, quantified by the Watermark Embedding Success Rate (WESR). …”
    Get full text
    Article
  16. 136

    Novel kernel function for computing the similarity of text by Xiu-hong WANG, Shi-guang JU

    Published 2012-12-01
    “…To enhance the performance of detecting similar documents,a novel kernel function named S_Wang kernel was constructed.Based on the actual situation of computing text similarity,the S_Wang kernel was newly bu lt with consideration of the Euclidean distance and angle between vectors that represented the text documents to be compared.It was proved that the function could be constructed as a kernel function according to Mercer theorem.Experimental verification of the performance of the kernels in the text document similarity calculation was provided.The results show that the S_Wang kernel is significantly better than the precision and F1 performance of other kernels like Cauchy kernel,Latent Semantic Kernel (LSK) and CLA kernel.S_Wang kernel is suitable for text similarity computation.…”
    Get full text
    Article
  17. 137

    Policy-adaptive capability inheritance algorithm consistent with POSIX standard by SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, SHEN Jian-jun1

    Published 2006-01-01
    “…In order to support POSIX capability mechanism,many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies,and had such defects as semantic conflicts and no defined security-objectives.So they couldn’t flexibly support for implementing diversified privilege policies for different requirements.Based on the analysis of some existing algorithms,a new capability inheritance algorithm was proposed,which introduced the policy-relevant capability control variable and the trusted application attribution.The implementation of the algorithm in ANSHENG secure operating system demonstrates that this algorithm provides such properties as policy-adaptability and usability,the formal analysis and verification of this algorithm proves that it supports a secure operating system to meet basic security theorems of the privilege policies enforced in it.…”
    Get full text
    Article
  18. 138

    Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking by Le-tian SHA, Fu XIAO, Wei CHEN, Jing SUN, Ru-chuan WANG

    Published 2017-07-01
    “…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
    Get full text
    Article
  19. 139

    Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty by Jennifer M. C. Vendemia, Robert F. Buzan, Stephanie L. Simon-Dack

    Published 2005-01-01
    “…Three studies were conducted to assess reaction time (RT) in relation to deception, response congruity, and preparedness to deceive. Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. …”
    Get full text
    Article
  20. 140

    LLM Hallucination: The Curse That Cannot Be Broken by Hussein Al-Mahmood

    Published 2025-08-01
    “…After examining several techniques, each chosen for their different implementation, to detect and mitigate hallucinations, including enhanced training, tagged-context prompts, contrastive learning, and semantic entropy analysis, the work concludes that none are efficient to mitigate hallucinations when they occur. …”
    Get full text
    Article