Search alternatives:
string » strong (Expand Search)
Showing 81 - 100 results of 297 for search 'string information', query time: 0.10s Refine Results
  1. 81
  2. 82
  3. 83

    Research on Multi-source Place Name Data Integration and Update Methods by S. Lin, X. Du, X. Guan, M. Xu, X. Liang, J. Chen, C. Wu, X. Zhou

    Published 2025-07-01
    “…Place names are important basic geographic information resources for surveying and mapping. They play a significant role in maintaining national security, national defense construction, economic development, and other aspects. …”
    Get full text
    Article
  4. 84
  5. 85
  6. 86

    Study on the fusion of improved YOLOv8 and depth camera for bunch tomato stem picking point recognition and localization by Guozhu Song, Jian Wang, Rongting Ma, Yan Shi, Yaqi Wang

    Published 2024-11-01
    “…Moreover, the fruit stalks being too short or slender poses an obstacle, rendering it impossible for the depth camera to accurately obtain depth information during depth value acquisition. To address these challenges, this paper proposes an enhanced YOLOv8 model integrated with a depth camera for string tomato fruit stalk picking point identification and localization research. …”
    Get full text
    Article
  7. 87
  8. 88

    ALDExA: Automated LLM-Assisted Detection of CVE Exploitation Attempts in Host-Captured Data by Niclas Ilg, Maximilian Pfitzenmaier, Dominik Germek, Paul Duplys, Michael Menth

    Published 2025-01-01
    “…For this purpose, we introduce ALDExA, a framework that fetches CVE information and corresponding exploit codes to identify an exploit string supported by a Large Language Model (LLM). …”
    Get full text
    Article
  9. 89

    Design Secured Smart Door Lock Based on Jaro Winkler Algorithm by Sura Mahmood Abdullah

    Published 2023-02-01
    “…This paper is dedicated on an authentication problem in design smart door lock authentication using string matching technique based on password string. …”
    Get full text
    Article
  10. 90

    The constraint on modified black holes with extreme mass ratio inspirals by Chao Zhang, Guoyang Fu, Yungui Gong

    Published 2025-04-01
    “…Abstract The low-energy effective action of String Theory introduces corrections to the dilaton-graviton sector, resulting in deformed black holes beyond general relativity. …”
    Get full text
    Article
  11. 91

    METHODS FOR SEARCHING AND COMPARING OBJECTS WHEN APPLYING THE SUBJECT-SUBJECT APPROACH TO MANAGEMENT REVIEW by N.Yu. Zaitseva, T.V. Moiseeva

    Published 2024-10-01
    “…Methods of comparison and search in the database and knowledge base of similar objects – algorithms for fuzzy string comparison and methods for finding substrings in a string, as well as management theory, system analysis, decision theory, knowledge engineering. …”
    Article
  12. 92

    Almost <i>k</i>-Step Opacity Enforcement in Stochastic Discrete-Event Systems via Differential Privacy by Rong Zhao, Murat Uzam, Zhiwu Li

    Published 2025-04-01
    “…Motivated by the differential privacy mechanism for information protection, this research proposes the secret string adjacency relation as a novel concept, assessing the similarity between potentially compromised strings and system-generated alternatives, thereby shielding the system’s confidential data from external observation. …”
    Get full text
    Article
  13. 93
  14. 94

    The Content Analysis of Social Media Shares in Turkish Related to COVID-19 by M. Fevzi Esen

    Published 2021-09-01
    “…As a result, the most shared topics have been concluded to be on yasak [lockdown], tedbir [precaution], karantina [quarantine], and vaka [case], with communication being frequently passed using this semantic string and information exchanges being faster within the network. …”
    Get full text
    Article
  15. 95

    An explainable EEG epilepsy detection model using friend pattern by Turker Tuncer, Sengul Dogan

    Published 2025-05-01
    “…The generated features have been selected using a cumulative and iterative feature selector, and the selected features have been classified using a t algorithm-based k-nearest neighbors (tkNN) classifier. By using channel information and Directed Lobish’s (DLob) look-up table based on the brain cap used, DLob symbols have been generated, and these symbols create the DLob string for artifact classification. …”
    Get full text
    Article
  16. 96

    FORMATION OF MODERN MATHEMATICAL APPROACH TO SOLVING PROBLEMS OF PHYSICS by Тетяна Обіход

    Published 2022-04-01
    “…First, we considered particle physics in terms of the latest experimental data and then moved on to the mathematical apparatus of string theory. Materials and methods. The N = 2 Yang-Mills theory is the heterotic string analog determined in ten-dimensional space: four usual space-time coordinates and six extra dimensions, known as Calabi-Yau manifold in weighted projective space. …”
    Get full text
    Article
  17. 97
  18. 98

    Stochastic and Nonlinear Dynamic Response of Drillstrings in Deepwater Riserless Casing Drilling Operation by He Li, Guodong Cheng, Shiming Zhou, Wenyang Shi, Jieli Wang

    Published 2025-04-01
    “…It can be concluded from the numerical results that during the CwD riserless drilling process, the effective stress on the cross section of drillstring is mainly determined by the tensile stress and the contribution of bending stress is comparably small, and the dangerous cross section of the drillstring is located at the connection point of landing string and casing string. The proposed dynamic model offers theoretical insights that can inform drillstring design and vibration mitigation strategies in CwD operations.…”
    Get full text
    Article
  19. 99

    Meson thermalization with a hot medium in the open Schwinger model by Takis Angelides, Yibin Guo, Karl Jansen, Stefan Kühn, Giuseppe Magnifico

    Published 2025-04-01
    “…Further, we study the quantum mutual information between the two halves of the flux string connecting a meson’s constituent particles and analyze its relation to relevant dynamical observables.…”
    Get full text
    Article
  20. 100

    Corners and islands in the S-matrix bootstrap of the open superstring by Justin Berman, Henriette Elvang

    Published 2024-09-01
    “…Starting with the most general maximally supersymmetric Yang-Mills EFT, we input information about the lowest-lying massive states, which we assume contribute via tree-level exchanges to the 4-point amplitude. …”
    Get full text
    Article