-
121
Dynamic Excitation of Surface Plasmon Polaritons with Vector Laguerre–Gaussian Beams
Published 2024-11-01“…Our study demonstrates the efficient coupling of SPPs with LG beams, characterized by their azimuthal and radial indices <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>m</mi><mo>,</mo><mi>p</mi><mo>)</mo></mrow></semantics></math></inline-formula>, as well as polarization distribution type. …”
Get full text
Article -
122
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01“…Then, the generated high-confidence pseudo-annotated instances and raw data were used to fine-tune the model to enhance its semantic understanding of cybersecurity events. Experimental verification was conducted on two datasets in cybersecurity. …”
Get full text
Article -
123
Research on fusion model based on deep learning for text content security enhancement
Published 2020-05-01“…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
Get full text
Article -
124
Creation of Low-Loss Dual-Ring Optical Filter via Temporal Coupled Mode Theory and Direct Binary Search Inverse Design
Published 2025-07-01“…The proposed device has a narrow spectral linewidth of 0.3 nm within a compact footprint of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>24</mn><mrow><mo> </mo><mi mathvariant="sans-serif">μ</mi><mi mathvariant="normal">m</mi></mrow><mo>×</mo><mn>25.5</mn><mrow><mo> </mo><mi mathvariant="sans-serif">μ</mi><mi mathvariant="normal">m</mi></mrow></mrow></semantics></math></inline-formula>. …”
Get full text
Article -
125
Privacy-Preserving Poisoning-Resistant Blockchain-Based Federated Learning for Data Sharing in the Internet of Medical Things
Published 2025-05-01“…Specifically, we design an active protection framework that uses a lightweight <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>t</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula>-threshold secret sharing scheme to protect devices’ privacy and prevent coordination edge nodes from colluding. …”
Get full text
Article -
126
Blockchain-Powered LSTM-Attention Hybrid Model for Device Situation Awareness and On-Chain Anomaly Detection
Published 2025-07-01“…The model utilizes an encoder–attention–decoder architecture for processing multivariate time series data generated by industrial sensors and smart contracts for automated on-chain data verification and tampering alerts. Experiments on real-world datasets demonstrate that the LEAD achieves an <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>F</mi><mrow><mn>0.1</mn></mrow></msub></semantics></math></inline-formula> score of 0.96, outperforming baseline models (Recurrent Neural Network (RNN): 0.90; LSTM: 0.94; and Bi-directional LSTM (Bi-LSTM, 0.94)). …”
Get full text
Article -
127
Word-Formation Representation of Concept FRIENDSHIP in Modern Russian
Published 2021-08-01“…The research focuses on the structure and semantics of words that form a word-formation nest with apex “friend” in Russian. …”
Get full text
Article -
128
Semantik Verba dalam Membentuk Gaya Bahasa pada Judul Berita Tempodotco
Published 2022-11-01“…Keywords: Title, Verb, Semantics, Metaphor, Personification, Phrase …”
Get full text
Article -
129
Improvement of Terrain Entropy Calculation for Grid Digital Elevation Models Considering Spatial Structural Features
Published 2025-02-01“…This comprehensive grouping strategy was integrated into distance calculations, becoming a new probability operator that accurately reflects terrain spatial characteristics. Experimental verification confirms that the method proposed aligns with the fundamental concept of entropy, yielding a regression equation of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>y</mi><mo>=</mo><mn>0.011</mn><mrow><mrow><mi mathvariant="normal">ln</mi></mrow><mo></mo><mrow><mi>x</mi></mrow></mrow><mo>+</mo><mn>0.463</mn></mrow></semantics></math></inline-formula> with a coefficient of determination of 94.73%, a reliability of 44.015, and a measurement ability of 0.757. …”
Get full text
Article -
130
An abnormal traffic detection method for chain information management system network based on convolutional neural network
Published 2025-04-01“…Through extensive experimental verification, CBAM-AE-CRF can comprehensively understand the semantics of network traffic, accurately identify anomalies in network traffic of chain information management system, provide strong support for network traffic management.…”
Get full text
Article -
131
Bilinear Learning with Dual-Chain Feature Attention for Multimodal Rumor Detection
Published 2025-05-01“…Accurate rumor detection to minimize manual verification efforts remains a critical research challenge. …”
Get full text
Article -
132
Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios
Published 2021-01-01“…After experimental verification, this method can effectively detect the integrity of the data transmission process and improve the application of data value, and the final effect is increased by 30.5%.…”
Get full text
Article -
133
MAHE: a multiscale and hybrid expert-based model for image-text enhanced named entity recognition on social media
Published 2025-05-01“…This approach often struggles to accurately align text with semantic understanding of images in complex network environments. …”
Get full text
Article -
134
Disease prediction models and operational readiness.
Published 2014-01-01“…All models were classified as either having undergone Some Verification or Validation method, or No Verification or Validation. …”
Get full text
Article -
135
TIBW: Task-Independent Backdoor Watermarking with Fine-Tuning Resilience for Pre-Trained Language Models
Published 2025-01-01“…We also design a comprehensive watermark verification process that evaluates task behavior consistency, quantified by the Watermark Embedding Success Rate (WESR). …”
Get full text
Article -
136
Novel kernel function for computing the similarity of text
Published 2012-12-01“…To enhance the performance of detecting similar documents,a novel kernel function named S_Wang kernel was constructed.Based on the actual situation of computing text similarity,the S_Wang kernel was newly bu lt with consideration of the Euclidean distance and angle between vectors that represented the text documents to be compared.It was proved that the function could be constructed as a kernel function according to Mercer theorem.Experimental verification of the performance of the kernels in the text document similarity calculation was provided.The results show that the S_Wang kernel is significantly better than the precision and F1 performance of other kernels like Cauchy kernel,Latent Semantic Kernel (LSK) and CLA kernel.S_Wang kernel is suitable for text similarity computation.…”
Get full text
Article -
137
Policy-adaptive capability inheritance algorithm consistent with POSIX standard
Published 2006-01-01“…In order to support POSIX capability mechanism,many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies,and had such defects as semantic conflicts and no defined security-objectives.So they couldn’t flexibly support for implementing diversified privilege policies for different requirements.Based on the analysis of some existing algorithms,a new capability inheritance algorithm was proposed,which introduced the policy-relevant capability control variable and the trusted application attribution.The implementation of the algorithm in ANSHENG secure operating system demonstrates that this algorithm provides such properties as policy-adaptability and usability,the formal analysis and verification of this algorithm proves that it supports a secure operating system to meet basic security theorems of the privilege policies enforced in it.…”
Get full text
Article -
138
Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking
Published 2017-07-01“…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
Get full text
Article -
139
Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty
Published 2005-01-01“…Three studies were conducted to assess reaction time (RT) in relation to deception, response congruity, and preparedness to deceive. Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. …”
Get full text
Article -
140
LLM Hallucination: The Curse That Cannot Be Broken
Published 2025-08-01“…After examining several techniques, each chosen for their different implementation, to detect and mitigate hallucinations, including enhanced training, tagged-context prompts, contrastive learning, and semantic entropy analysis, the work concludes that none are efficient to mitigate hallucinations when they occur. …”
Get full text
Article