-
81
Frequency-bin entanglement-based Quantum Key Distribution
Published 2025-04-01Get full text
Article -
82
Keywords spotting in Russian handwritten documents based on strokes segmentation
Published 2024-12-01Get full text
Article -
83
Research on Multi-source Place Name Data Integration and Update Methods
Published 2025-07-01“…Place names are important basic geographic information resources for surveying and mapping. They play a significant role in maintaining national security, national defense construction, economic development, and other aspects. …”
Get full text
Article -
84
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01Get full text
Article -
85
Effectiveness of Context-Aware Character Input Method for Mobile Phone Based on Artificial Neural Network
Published 2012-01-01Get full text
Article -
86
Study on the fusion of improved YOLOv8 and depth camera for bunch tomato stem picking point recognition and localization
Published 2024-11-01“…Moreover, the fruit stalks being too short or slender poses an obstacle, rendering it impossible for the depth camera to accurately obtain depth information during depth value acquisition. To address these challenges, this paper proposes an enhanced YOLOv8 model integrated with a depth camera for string tomato fruit stalk picking point identification and localization research. …”
Get full text
Article -
87
Investigation on Potential-Induced Degradation in a 50 MWp Crystalline Silicon Photovoltaic Power Plant
Published 2018-01-01Get full text
Article -
88
ALDExA: Automated LLM-Assisted Detection of CVE Exploitation Attempts in Host-Captured Data
Published 2025-01-01“…For this purpose, we introduce ALDExA, a framework that fetches CVE information and corresponding exploit codes to identify an exploit string supported by a Large Language Model (LLM). …”
Get full text
Article -
89
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm
Published 2023-02-01“…This paper is dedicated on an authentication problem in design smart door lock authentication using string matching technique based on password string. …”
Get full text
Article -
90
The constraint on modified black holes with extreme mass ratio inspirals
Published 2025-04-01“…Abstract The low-energy effective action of String Theory introduces corrections to the dilaton-graviton sector, resulting in deformed black holes beyond general relativity. …”
Get full text
Article -
91
METHODS FOR SEARCHING AND COMPARING OBJECTS WHEN APPLYING THE SUBJECT-SUBJECT APPROACH TO MANAGEMENT REVIEW
Published 2024-10-01“…Methods of comparison and search in the database and knowledge base of similar objects – algorithms for fuzzy string comparison and methods for finding substrings in a string, as well as management theory, system analysis, decision theory, knowledge engineering. …”
Article -
92
Almost <i>k</i>-Step Opacity Enforcement in Stochastic Discrete-Event Systems via Differential Privacy
Published 2025-04-01“…Motivated by the differential privacy mechanism for information protection, this research proposes the secret string adjacency relation as a novel concept, assessing the similarity between potentially compromised strings and system-generated alternatives, thereby shielding the system’s confidential data from external observation. …”
Get full text
Article -
93
-
94
The Content Analysis of Social Media Shares in Turkish Related to COVID-19
Published 2021-09-01“…As a result, the most shared topics have been concluded to be on yasak [lockdown], tedbir [precaution], karantina [quarantine], and vaka [case], with communication being frequently passed using this semantic string and information exchanges being faster within the network. …”
Get full text
Article -
95
An explainable EEG epilepsy detection model using friend pattern
Published 2025-05-01“…The generated features have been selected using a cumulative and iterative feature selector, and the selected features have been classified using a t algorithm-based k-nearest neighbors (tkNN) classifier. By using channel information and Directed Lobish’s (DLob) look-up table based on the brain cap used, DLob symbols have been generated, and these symbols create the DLob string for artifact classification. …”
Get full text
Article -
96
FORMATION OF MODERN MATHEMATICAL APPROACH TO SOLVING PROBLEMS OF PHYSICS
Published 2022-04-01“…First, we considered particle physics in terms of the latest experimental data and then moved on to the mathematical apparatus of string theory. Materials and methods. The N = 2 Yang-Mills theory is the heterotic string analog determined in ten-dimensional space: four usual space-time coordinates and six extra dimensions, known as Calabi-Yau manifold in weighted projective space. …”
Get full text
Article -
97
Finding Random Integer Ideal Flow Network Signature Algorithms
Published 2025-05-01Get full text
Article -
98
Stochastic and Nonlinear Dynamic Response of Drillstrings in Deepwater Riserless Casing Drilling Operation
Published 2025-04-01“…It can be concluded from the numerical results that during the CwD riserless drilling process, the effective stress on the cross section of drillstring is mainly determined by the tensile stress and the contribution of bending stress is comparably small, and the dangerous cross section of the drillstring is located at the connection point of landing string and casing string. The proposed dynamic model offers theoretical insights that can inform drillstring design and vibration mitigation strategies in CwD operations.…”
Get full text
Article -
99
Meson thermalization with a hot medium in the open Schwinger model
Published 2025-04-01“…Further, we study the quantum mutual information between the two halves of the flux string connecting a meson’s constituent particles and analyze its relation to relevant dynamical observables.…”
Get full text
Article -
100
Corners and islands in the S-matrix bootstrap of the open superstring
Published 2024-09-01“…Starting with the most general maximally supersymmetric Yang-Mills EFT, we input information about the lowest-lying massive states, which we assume contribute via tree-level exchanges to the 4-point amplitude. …”
Get full text
Article