Showing 141 - 160 results of 427 for search 'task verification', query time: 0.08s Refine Results
  1. 141

    STRESSED STATE OF ROCKY SUBSOIL IN THE VICINITY OF A CIRCULAR SECTION HYDRAULIC ENGINEERING TUNNEL TAKING INTO ACCOUNT THE ANISOTROPY OF THE GROUND MEDIUM by D. T. Bautdinov, M. M. Dzhamaludinov

    Published 2017-03-01
    “…The type and size of the finite element appropriate for the calculation were pre-identified based on solutions to the task of verification. For the verificatory task, the Kirsch problem was adopted. …”
    Get full text
    Article
  2. 142

    AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching by Ahmed Sabah Ahmed AL-Jumaili, Huda Kadhim Tayyeh, Abeer Alsadoon

    Published 2023-12-01
    “… In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. …”
    Get full text
    Article
  3. 143

    Probabilistic Approach to Assessing Photolithography Quality in the Production of Printed Circuit Boards by M. A. Korobkov, V. S. Barabanov

    Published 2025-03-01
    “…A methodology for experimental verification of the proposed probabilistic model by means of processing and statistical analysis of photomask and blank images was developed. …”
    Get full text
    Article
  4. 144

    The experience of approbation and empirical substantiation of the ecopsychological model of subjectivity development in educational practice by Irina V. Plaksina

    Published 2023-10-01
    “…The choice of the model is due to the need to solve the central task of educational practice stated by the Federal State Educational Standard at all levels - the development of students ability to be a subject of educational activity. …”
    Get full text
    Article
  5. 145

    Computational-experimental approach to drug-target interaction mapping: A case study on kinase inhibitors. by Anna Cichonska, Balaguru Ravikumar, Elina Parri, Sanna Timonen, Tapio Pahikkala, Antti Airola, Krister Wennerberg, Juho Rousu, Tero Aittokallio

    Published 2017-08-01
    “…Further, we subjected the model to a more challenging task of predicting target interactions for such a new candidate drug compound that lacks prior binding profile information. …”
    Get full text
    Article
  6. 146

    MSTCNet: Toward Generalization Improving for Multiframe Infrared Small Target Detection by Ruining Cui, Na Li, Junfu Liu, Huijie Zhao

    Published 2025-01-01
    “…By integrating wavelet transform within the neural network, along with spatial attention and contrastive learning, SPIF strengthens domain-invariant features crucial for the task. Finally, in the experimental part, we adopt the DG verification method, dividing the dataset into different source domains and target domains for experimental verification. …”
    Get full text
    Article
  7. 147

    STRESSED CONDITION OF THE WRAPPING WITHOUT-DRIVE HYDROTECHNICAL TUNNEL OF THE CIRCULAR FORM, PROPOSED IN ANISOTROPIC ROCK GROUND by D. T. Bautdinov, M. M. Djamaludinov, K. S. Zhukova

    Published 2019-05-01
    “…The sizes and type of the finite element suitable for calculation on the basis of the solution in the program complex of the verification task were previously determined. The Kirsch problem was accepted as the verification problem.Result. …”
    Get full text
    Article
  8. 148

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
    Get full text
    Article
  9. 149

    Preparing a homily as an important element of pastoral care by Henryk Sławiński

    Published 2024-06-01
    “…The homily, which the Second Vatican Council assigned a special role among various forms of preaching the Word of God, is an important task for those, who are entrusted with pastoral care. …”
    Get full text
    Article
  10. 150

    Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty by Jennifer M. C. Vendemia, Robert F. Buzan, Stephanie L. Simon-Dack

    Published 2005-01-01
    “…Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. …”
    Get full text
    Article
  11. 151

    Property-Based Testing for Cybersecurity: Towards Automated Validation of Security Protocols by Manuel J. C. S. Reis

    Published 2025-05-01
    “…The validation of security protocols remains a complex and critical task in the cybersecurity landscape, often relying on labor-intensive testing or formal verification techniques with limited scalability. …”
    Get full text
    Article
  12. 152

    Methodological Considerations and Effectiveness for Ecologically Valid Mental Fatigue Inducement in Sports: A Systematic Review by Chao Bian, Suzanna Russell, Ana Mali, Elke Lathouwers, Kevin De Pauw, Jelle Habay, Špela Bogataj, Bart Roelands

    Published 2025-07-01
    “…Future research should refine and co-design the MF-inducing task with practitioners based on multifaceted MF evidence from laboratory and real-life settings, create immersive scenarios that can better replicate the inducement process in specific contexts, and improve measurement tools, which will provide comprehensive evaluation and verification of the MF inducement.…”
    Get full text
    Article
  13. 153

    Research on Magnetron Generator Energy Efficiency in Microwave Heating Devices by V. A. Ivanov, K. V. Rogozhin, D. S. Sidorenko

    Published 2017-12-01
    “…The crucial task when summarizing magnetron power in microwave technological installations is tracking of load optimality for individual generators. …”
    Get full text
    Article
  14. 154

    Dual-verified secure localization method for unmanned intelligent vehicles by GU Xiaodan, XIA Guozheng, SONG Bingchen, YANG Ming, LUO Junzhou

    Published 2024-06-01
    “…They are susceptible to physical or remote security attacks, causing it to deviate from the delivery trajectory and fail the delivery task, or even be manipulated to disrupt normal operation of the factory. …”
    Get full text
    Article
  15. 155

    Object-Oriented Software for Fitness-For-Service Assessment of Cracked Cylinder Based on API RP 579 by Jirapong Kasivitamnuay, Pairod Singhatanadgid

    Published 2020-03-01
    “…This research aims to develop a fitness-for-service assessment software to facilitate the task. The software development process included identifying the software specifications, designing the software structure, manipulating the information from the standard for programming, the graphical user interface design, and finally verification of the software. …”
    Get full text
    Article
  16. 156

    Comparison of subjective and objective speaker recognition under voice disguise conditions by Wojciech Majewski

    Published 2014-01-01
    “…In the subjective method the utterances were grouped in pairs and presented to the listeners whose task was to make a decision whether a given pair of speech samples was produced by one speaker or by two different speakers. …”
    Get full text
    Article
  17. 157

    Application of convolutional neural networks in the intelligence security system subsystem by V. S. Demeshko, A. I. Фёдоров

    Published 2020-08-01
    “…The main subsystems included in its composition are considered. The tasks of the intelligence subsystem for detecting and recognizing ground-based objects of observation in a complex phono-target environment are defined.The task of detecting an object of observation was solved on the basis of a previously proposed algorithm. …”
    Get full text
    Article
  18. 158

    Design of fieldbus chip based on IEC 1158 standard by Zhang Liguo, Liu Qiang, Yan Wei, Li Fukun, Wu Pengfei, Wang Bo

    Published 2022-04-01
    “…The chip is designed with Manchester codec circuit, Cyclic Redundancy Check(CRC) verification circuit, carrier detection circuit, polarity correction circuit and other functional circuits. …”
    Get full text
    Article
  19. 159

    Active-probing based distributed malware master detection system by Cheng-xiang SI, Bo SUN, Wen-han YANG, Hui-lin ZHANG, Xiao-nan XUE

    Published 2013-08-01
    “…The system supports to scan many botnets owning different types of protocols as their command and control protocols. The functional verification in the testing environment proves the effectiveness of the approach and the evaluation to scanning efficiency in the real network environment shows the ability that the system can finish task of scanning a large scale of IP section in an acceptable time.…”
    Get full text
    Article
  20. 160

    Survey on Deep Learning-Based Marine Object Detection by Ruolan Zhang, Shaoxi Li, Guanfeng Ji, Xiuping Zhao, Jing Li, Mingyang Pan

    Published 2021-01-01
    “…A widely accepted and standardized large-scale marine object verification dataset should be proposed.…”
    Get full text
    Article