-
701
Heuristic Binary Search for Modulated Predictive Control
Published 2025-01-01“…Predictive Control optimization often relies on exhaustive enumeration of voltage vectors within the finite control set. Using Virtual Voltage Vector strategies tend to increase the number of predictions to enhance dynamic and steady state performance, leading to a higher computational burden. …”
Get full text
Article -
702
Digital Twin Driven Green Performance Evaluation Methodology of Intelligent Manufacturing: Hybrid Model Based on Fuzzy Rough-Sets AHP, Multistage Weight Synthesis, and PROMETHEE II
Published 2020-01-01“…Digital twin framework, which constructs the bidirectional mapping and real-time data interaction between physical entity and digital model, provides the green performance evaluation with a total factor virtual image of the whole life cycle to meet the monitoring and simulation requirements of the evaluation information source and demand. …”
Get full text
Article -
703
Development of a method for automated 5G and beyond network slices penetration testing
Published 2025-02-01“…The tasks to be solved are as follows: 1) to analyze existing penetration testing methods of 5G and beyond networks and research in this area; 2) to develop a new method for automated 5G and beyond network slices penetration testing; 3) to design and implement the methodology in the form of software for virtualize environments; 4) to develop a 5G test network architecture based on open-source solutions and methodology of experiments conducting; 5) to test and validate the solution effectiveness in detecting vulnerabilities and simulating realistic attack scenarios in the 5G test network environment. …”
Get full text
Article -
704
Les dossiers d’action publique, des registres criminels de 1791 à la dématérialisation
Published 2022-01-01“…The Ministry of Justice’s collections of public prosecution, from the first criminal registers established as early as the creation of the ministry in 1791 until the virtual disappearance of paper documents in 2016 under the influence of digitisation, are of a major heritage interest for the history of crime and more broadly for the political, economic and social history of contemporary France. …”
Get full text
Article -
705
Key Technologies in Intelligent O&M System Construction for Urban Rail Transit Communication
Published 2025-07-01“…The multi-source heterogeneous data fusion and analysis technologies are applied to communication system fault diagnosis and prediction. …”
Get full text
Article -
706
Predicting Coronavirus Pandemic in Real-Time Using Machine Learning and Big Data Streaming System
Published 2020-01-01“…Twitter is a virtual social network where people share their posts and opinions about the current situation, such as the coronavirus pandemic. …”
Get full text
Article -
707
Design and Dynamic Analysis of a Four-Degree-of-Freedom Chaotic Vibrating Screen
Published 2021-01-01“…The dynamic simulation of a virtual prototype of the chaotic vibrating screen was carried out in ADAMS software, and MATLAB was used to chaos recognition of the simulation results. …”
Get full text
Article -
708
PILICA Anti-Aircraft Rocket-Artillery System - a V-SHROAD System
Published 2020-03-01“…PILICA is equipped with an unique formation and training system, providing capabilities for training teams on real equipment, with the use of a virtual simulation management system employing the DIS protocol.…”
Get full text
Article -
709
“Radivil’s” Border between the Grand Duchy of Lithuania and Livonia from the Baltic Sea to the Western Dvina River according to the 1529, 1541 and 1542 Accounts
Published 2024-01-01“…The boundary line in the 1529 and 1542 descriptions is virtually identical in most sections, except for the sections from the source of the Dobe River to the confluence of the Suseja River with the Memele River and southwest of the Livonian castle of Bauska. …”
Get full text
Article -
710
Anthropodermic Bibliopegy, or, Using Human Skins in Books Binding: A historical study
Published 1999-11-01“…This Phenomenon has been appeared,virtually, during the 16th century, began in the 19th century and had disappearedat the beginning of the 20th century. …”
Get full text
Article -
711
On Explainability of Reinforcement Learning-Based Machine Learning Agents Trained with Proximal Policy Optimization That Utilizes Visual Sensor Data
Published 2025-01-01“…It excels in the explanation process in a virtual simulation system based on a video system with relatively low resolution. …”
Get full text
Article -
712
Bibliometric Analysis of Neurosurgery Education From 1962 to 2023
Published 2024-01-01“…Reference publication year spectroscopy (RPYS) was used to find source literature articles. Results: From 1962 to 2023, 1740 articles from 266 journals were included in this study. …”
Get full text
Article -
713
HERGAI: an artificial intelligence tool for structure-based prediction of hERG inhibitors
Published 2025-07-01“…It also demonstrated superior screening power compared to virtual screening schemes that used existing scoring functions. …”
Get full text
Article -
714
Analysis Components of the Digital Consumer Behavior in Romania
Published 2016-08-01“…In addition, to study more closely the online consumer behavior, and to interpret the detailed secondary data provided, an exploratory research was performed as a structured questionnaire with five closed questions on the distribution of individuals according to the gender category they belong (male or female); decision to purchase products / services in the virtual environment in the past year; the source of the goods / services purchased (Romanian or foreign sites); factors that have determined the consumers to buy products from foreign sites; categories of products purchased through online transactions from foreign merchants. …”
Get full text
Article -
715
Novel strains of Tomato Spotted Wilt Orthotospovirus (TSWV) are transmitted by western flower thrips in a context-specific manner.
Published 2025-01-01“…However, transmission biology of RB strains remains virtually unexplored. We investigated various transmission parameters viz. inoculation efficiency, putative sex-specific differences in inoculation, virus accumulation, and source sink relationships to dissect these interactions. …”
Get full text
Article -
716
Scheduling Optimization of Electric Rubber-Tired Vehicles in Underground Coal Mines Based on Constraint Programming
Published 2025-05-01“…A novel RFID–vision fusion positioning system, leveraging multi-source data to mitigate signal interference in underground environments, provides real-time, reliable spatiotemporal coordinates for the scheduling model. …”
Get full text
Article -
717
STAR Drums: A Dataset for Automatic Drum Transcription
Published 2025-07-01“…First, we separate the music recordings into a drum stem and a non‑drum stem by applying a music source separation algorithm, then automatically annotate the drum stem with an ADT algorithm. …”
Get full text
Article -
718
MSM-TDE: multi-scale semantics mining and tiny details enhancement network for retinal vessel segmentation
Published 2025-01-01Get full text
Article -
719
Hybrid Multi-Agent GraphRAG for E-Government: Towards a Trustworthy AI Assistant
Published 2025-06-01“…As public institutions increasingly adopt AI-driven virtual assistants to support transparency and citizen engagement, the need for explainable, accurate, and context-aware language systems becomes vital. …”
Get full text
Article -
720
Scale-Consistent and Temporally Ensembled Unsupervised Domain Adaptation for Object Detection
Published 2025-01-01“…Unsupervised Domain Adaptation for Object Detection (UDA-OD) aims to adapt a model trained on a labeled source domain to an unlabeled target domain, addressing challenges posed by domain shifts. …”
Get full text
Article