-
141
STRESSED STATE OF ROCKY SUBSOIL IN THE VICINITY OF A CIRCULAR SECTION HYDRAULIC ENGINEERING TUNNEL TAKING INTO ACCOUNT THE ANISOTROPY OF THE GROUND MEDIUM
Published 2017-03-01“…The type and size of the finite element appropriate for the calculation were pre-identified based on solutions to the task of verification. For the verificatory task, the Kirsch problem was adopted. …”
Get full text
Article -
142
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
Published 2023-12-01“… In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. …”
Get full text
Article -
143
Probabilistic Approach to Assessing Photolithography Quality in the Production of Printed Circuit Boards
Published 2025-03-01“…A methodology for experimental verification of the proposed probabilistic model by means of processing and statistical analysis of photomask and blank images was developed. …”
Get full text
Article -
144
The experience of approbation and empirical substantiation of the ecopsychological model of subjectivity development in educational practice
Published 2023-10-01“…The choice of the model is due to the need to solve the central task of educational practice stated by the Federal State Educational Standard at all levels - the development of students ability to be a subject of educational activity. …”
Get full text
Article -
145
Computational-experimental approach to drug-target interaction mapping: A case study on kinase inhibitors.
Published 2017-08-01“…Further, we subjected the model to a more challenging task of predicting target interactions for such a new candidate drug compound that lacks prior binding profile information. …”
Get full text
Article -
146
MSTCNet: Toward Generalization Improving for Multiframe Infrared Small Target Detection
Published 2025-01-01“…By integrating wavelet transform within the neural network, along with spatial attention and contrastive learning, SPIF strengthens domain-invariant features crucial for the task. Finally, in the experimental part, we adopt the DG verification method, dividing the dataset into different source domains and target domains for experimental verification. …”
Get full text
Article -
147
STRESSED CONDITION OF THE WRAPPING WITHOUT-DRIVE HYDROTECHNICAL TUNNEL OF THE CIRCULAR FORM, PROPOSED IN ANISOTROPIC ROCK GROUND
Published 2019-05-01“…The sizes and type of the finite element suitable for calculation on the basis of the solution in the program complex of the verification task were previously determined. The Kirsch problem was accepted as the verification problem.Result. …”
Get full text
Article -
148
A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity
Published 2022-01-01“…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
Get full text
Article -
149
Preparing a homily as an important element of pastoral care
Published 2024-06-01“…The homily, which the Second Vatican Council assigned a special role among various forms of preaching the Word of God, is an important task for those, who are entrusted with pastoral care. …”
Get full text
Article -
150
Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty
Published 2005-01-01“…Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. …”
Get full text
Article -
151
Property-Based Testing for Cybersecurity: Towards Automated Validation of Security Protocols
Published 2025-05-01“…The validation of security protocols remains a complex and critical task in the cybersecurity landscape, often relying on labor-intensive testing or formal verification techniques with limited scalability. …”
Get full text
Article -
152
Methodological Considerations and Effectiveness for Ecologically Valid Mental Fatigue Inducement in Sports: A Systematic Review
Published 2025-07-01“…Future research should refine and co-design the MF-inducing task with practitioners based on multifaceted MF evidence from laboratory and real-life settings, create immersive scenarios that can better replicate the inducement process in specific contexts, and improve measurement tools, which will provide comprehensive evaluation and verification of the MF inducement.…”
Get full text
Article -
153
Research on Magnetron Generator Energy Efficiency in Microwave Heating Devices
Published 2017-12-01“…The crucial task when summarizing magnetron power in microwave technological installations is tracking of load optimality for individual generators. …”
Get full text
Article -
154
Dual-verified secure localization method for unmanned intelligent vehicles
Published 2024-06-01“…They are susceptible to physical or remote security attacks, causing it to deviate from the delivery trajectory and fail the delivery task, or even be manipulated to disrupt normal operation of the factory. …”
Get full text
Article -
155
Object-Oriented Software for Fitness-For-Service Assessment of Cracked Cylinder Based on API RP 579
Published 2020-03-01“…This research aims to develop a fitness-for-service assessment software to facilitate the task. The software development process included identifying the software specifications, designing the software structure, manipulating the information from the standard for programming, the graphical user interface design, and finally verification of the software. …”
Get full text
Article -
156
Comparison of subjective and objective speaker recognition under voice disguise conditions
Published 2014-01-01“…In the subjective method the utterances were grouped in pairs and presented to the listeners whose task was to make a decision whether a given pair of speech samples was produced by one speaker or by two different speakers. …”
Get full text
Article -
157
Application of convolutional neural networks in the intelligence security system subsystem
Published 2020-08-01“…The main subsystems included in its composition are considered. The tasks of the intelligence subsystem for detecting and recognizing ground-based objects of observation in a complex phono-target environment are defined.The task of detecting an object of observation was solved on the basis of a previously proposed algorithm. …”
Get full text
Article -
158
Design of fieldbus chip based on IEC 1158 standard
Published 2022-04-01“…The chip is designed with Manchester codec circuit, Cyclic Redundancy Check(CRC) verification circuit, carrier detection circuit, polarity correction circuit and other functional circuits. …”
Get full text
Article -
159
Active-probing based distributed malware master detection system
Published 2013-08-01“…The system supports to scan many botnets owning different types of protocols as their command and control protocols. The functional verification in the testing environment proves the effectiveness of the approach and the evaluation to scanning efficiency in the real network environment shows the ability that the system can finish task of scanning a large scale of IP section in an acceptable time.…”
Get full text
Article -
160
Survey on Deep Learning-Based Marine Object Detection
Published 2021-01-01“…A widely accepted and standardized large-scale marine object verification dataset should be proposed.…”
Get full text
Article