Showing 321 - 340 results of 427 for search 'task verification', query time: 0.12s Refine Results
  1. 321

    CRITERIA FOR ASSESSMENT OF ANTICORRUPTION COMPLIANCE PROGRAMS AT SMALL AND MEDIUM ENTERPRISES by G. Crouse, L. A. Chaldaeva, A. A. Kilyachkov

    Published 2017-10-01
    “…Fighting corruption is one of the most important tasks facing all countries. Currently the RF state institutes have made significant efforts to remedy the situation including passing several anti-corruption legislative acts. …”
    Get full text
    Article
  2. 322

    Review and Analysis of the Literature: Artificial Intelligence-Based Digital Transformation of Automated Customer Onboarding by Vijay Thokal, Purushottam R. Patil

    Published 2024-01-01
    “…The automation of various tasks, such as data entry and document verification, streamlines the onboarding process, allowing clients to quickly access the products or services they seek. …”
    Get full text
    Article
  3. 323

    Primary School Students’ Analogical Reasoning in Solving Open-ended Word Problems by Egitayanti Aulia Rochman, Mohammad Faizal Amir

    Published 2023-10-01
    “…The participants in this study were 25 fifth-grade primary school students selected using the purposive sampling technique to represent each category of analogical reasoning based on analogical reasoning tasks. Research instruments comprised of tests in analogical reasoning tasks and interview guidelines. …”
    Get full text
    Article
  4. 324

    Application of YOLO and U-Net models for building material identification on segmented images by Ruslan Voronkov, Mykhailo Bezugliy

    Published 2025-06-01
    “…The aim of the study is to determine the effectiveness of these models in the tasks of recognising materials suitable for reuse and recycling. …”
    Get full text
    Article
  5. 325

    Digital twin method and application practice of spacecraft system driven by mechanism data [version 2; peer review: 1 approved, 2 approved with reservations] by Zhou Fanli, Huang Lei, Shang Shuai, Wang Wei, Zhou Haocheng

    Published 2025-04-01
    “…The research results are applied to the key on-orbit operation tasks, such as entering orbit, rendezvous and docking, position conversion, and astronaut exiting, enabling system-level digital operation for the sub-systems of spacecraft such as energy, power, control, and communication sub-systems.…”
    Get full text
    Article
  6. 326

    Simulating and Verifying a 2D/3D Laser Line Sensor Measurement Algorithm on CAD Models and Real Objects by Rok Belšak, Janez Gotlih, Timi Karner

    Published 2024-11-01
    “…The increasing adoption of 2D/3D laser line sensors in industrial and research applications necessitates accurate and efficient simulation tools for tasks such as surface inspection, dimensional verification, and quality control. …”
    Get full text
    Article
  7. 327

    Design of Robust Decentralized Control Systems for Distillation Columns by Stopakevych A.O., Stopakevych O.A.

    Published 2022-05-01
    “…The aim is attained by solving the following tasks: selection of representative models of columns; development of an effective transfer function identification algorithm; development of a decentralized controller design algorithm, which takes into account the cross-links impact; verification of the developed method for the selected models of columns. …”
    Get full text
    Article
  8. 328

    Blockchain-based cross-user data shared auditing by Angtai Li, Guohua Tian, Meixia Miao, Jianpeng Gong

    Published 2022-12-01
    “…In cloud storage, public auditing is a more popular data integrity verification technique since it allows users to delegate auditing tasks to a fully trusted third-party auditor (TPA). …”
    Get full text
    Article
  9. 329

    Application of GPR Underground Pipeline Detection Technology in Urban Complex Geological Environments by Xiaoqiang Liang, Da Hu, Yongsuo Li, Yunyi Zhang, Xian Yang

    Published 2022-01-01
    “…The results show that urban underground pipeline detection technology based on ground penetrating radar (GPR) can obtain a highly reliable number of pipelines and track predefined pipelines when detecting different numbers of verification pipelines. When detecting underground pipelines in different sections, the vertical and horizontal errors are no more than 0.199 m and 0.248 m, respectively, which means that the detection technology of urban underground pipelines based on GPR has high detection accuracy and can be performed on high-level detection tasks under various complex conditions. …”
    Get full text
    Article
  10. 330

    Integrated approach to the formation of information and digital competence in future primary school teachers by Olga G. Yaroshenko, Olena D. Samborska

    Published 2025-03-01
    “… This article presents an expanded analysis of the experimental verification of an integrated approach to modernizing information and digital training of future primary school teachers. …”
    Get full text
    Article
  11. 331

    Organizational and methodical approaches to disclosure of income distribution in integrated reporting by Legenchyk S.F., Polishchuk I.R.

    Published 2017-08-01
    “…The issue of the necessity of conducting the external audit of the data verification of the integrity reporting is highlighted. …”
    Get full text
    Article
  12. 332

    Automated extraction and summarization of wind disaster data using deep learning models, with extended applications to seismic events by Huy Pham, Monica Arul

    Published 2024-12-01
    “…This is followed by a verification of the BART-large MNLI model’s capability to extract impact sentences, utilizing the 2023 Hurricane Otis report. …”
    Get full text
    Article
  13. 333

    Analysis of the results adequacy of the fuselage finite-element modeling in the vicinity of a large cutout by A. V. Boldyrev, M. V. Pavelchuk

    Published 2023-08-01
    “…The issues of ensuring the reliability of the finite element models (FEM) of the fuselage in the hatch cutout zone are considered at the early aircraft design stages. The purpose and tasks of research are formulated. To assess the reliability of mathematical models, the objects with standards were selected. …”
    Get full text
    Article
  14. 334

    NLP neural network copyright protection based on black box watermark by Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU

    Published 2023-02-01
    “…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
    Get full text
    Article
  15. 335

    THEOREMS ON THE NUMBER OF ROOTS OF A CUBIC EQUATION AND THEIR LOCATION AS A MEANS OF DEVELOPING STUDENTS' VISUAL THINKING by Шойра Абдієва, Ріскелді Тургунбаєв

    Published 2023-09-01
    “…Educational material on the location of the roots of a cubic equation helps to develop the visual thinking of students, to formulate visual tasks for students. These visual tasks serve as a means of organizing the mathematical activity of students. …”
    Get full text
    Article
  16. 336

    Artificial Vision System for Autonomous Mobile Platform Used in Intelligent and Flexible Indoor Environment Inspection by Marius Cristian Luculescu, Luciana Cristea, Attila Laszlo Boer

    Published 2025-04-01
    “…Among these, processes related to the surveillance and assisted verification of indoor environments have garnered significant interest. …”
    Get full text
    Article
  17. 337

    Response analysis and control of plates induced by piezoelectric actuators using finite element method by Thien M. Tran, Trieu L. Vo, Son H. Nguyen

    Published 2025-01-01
    “…The proposed method is investigated in three cases studied to compare and prove the feasibility and verification. To do these tasks, the effects of coupling between the electric and mechanical properties of piezoelectric materials draw significant attention to the material’s potential applications such as actuators and sensors. …”
    Get full text
    Article
  18. 338

    Evaluating the Feasibility of Using Generative AI for Educational Research within the Context of Vietnam’s 2018 General Education Curriculum by Ngoan Quynh Thi Nguyen, Ngoc My Tran, Hang Thu Vu, Lan Thi Tran, Ha Viet Thi Nguyen, Thuy Thanh Bui, Trinh Thanh Nguyen

    Published 2025-06-01
    “…Despite variations in performance, all tools demonstrate potential in improving research processes, especially in tasks where absolute precision is not critical. However, accuracy remains a significant challenge across all platforms. …”
    Get full text
    Article
  19. 339

    Multi-objective programming method for ship weather routing based on fusion of A* and NSGA-II by Yuankui LI, Jiyuan SUO, Dongye YU, Xinyu ZHANG, Fang YANG, Xuefeng YANG

    Published 2025-06-01
    “…Simulation verification is then performed using the trans-Pacific route. …”
    Get full text
    Article
  20. 340

    Study of crack propagation in stress concentrator zones under thermal pulse loading in parts with casting defects by Olga Shypul, Vitalii Myntiuk, Denys Tkachenko, Oleksiy Pavlenko, Dmytro Brega, Yevgen Tsegelnyk

    Published 2025-03-01
    “…The aim of the work is to determine the influence of existing stress concentrators in parts obtained by the casting method on the possibility of their processing by the thermal pulse method. The main tasks of the study include establishing the regularities of crack development depending on the geometric concentrators of parts and imposing restrictions on the modes of thermal pulse processing. …”
    Get full text
    Article