Search alternatives:
vector » sector (Expand Search)
Showing 2,701 - 2,720 results of 4,440 for search 'vector (processes OR process)', query time: 0.24s Refine Results
  1. 2701

    Post-release monitoring pathway for the deployment of gene drive-modified mosquitoes for malaria control in Africa by Dorington O. Ogoyi, Julia Njagi, Willy Tonui, Brinda Dass, Hector Quemada, Stephanie James

    Published 2024-11-01
    “…Subject to a rigorous risk assessment process for future GDMMs products, the concerns may then be prioritized for post-release monitoring.…”
    Get full text
    Article
  2. 2702

    The Impact of Cognitive Distortions on Decision Making in Agile Project Management Frameworks: Current Positions and Perspectives in the Academic Community by D. A. Khamitov

    Published 2024-08-01
    “…The author also identifies a possible further vector for the development of research in this direction. …”
    Get full text
    Article
  3. 2703

    Detection of Mucous Retention Cysts Using Deep Learning Methods on Panoramic Radiographs by Seda Arslan Tuncer, Çağla Danacı, Sümeyye Coşgun Baybars

    Published 2024-12-01
    “…In the classification process, deep feature representations or feature maps of the images were created using eight different deep learning models of EfficientNet from B0 to B7. …”
    Get full text
    Article
  4. 2704

    Electrical impedance-based tissue classification for bladder tumor differentiation by Carina Veil, Franziska Krauß, Bastian Amend, Falko Fend, Oliver Sawodny

    Published 2025-01-01
    “…Based on the distance of the feature vector of a unknown measurement to a healthy reference, a Gaussian process classifier is trained. …”
    Get full text
    Article
  5. 2705

    Infinite plate loaded with normal force moving along a complex path by A. V. Galaburdin

    Published 2020-12-01
    “…The behavior of displacements and stresses near the moving force is investigated; and the process of the elastic wave energy propagation is also studied. …”
    Get full text
    Article
  6. 2706

    THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE by Vladyslav Horulko

    Published 2024-05-01
    “…Ensuring an adequate level of cyber security is difficult to imagine without clearly planned joint actions and measures developed by responsible entities, which must be synchronized and implemented according to a single strategic plan and development vector of the national cyber security system of a declarative nature. …”
    Get full text
    Article
  7. 2707

    A Pythagorean fuzzy MCDM model for evaluating career happiness in sports by selecting a suitable sport by JiaYan Zhu, Zeng Jiao

    Published 2025-07-01
    “…Abstract This study explores an innovative application of the analytical hierarchy process (AHP) within the multi-criteria decision-making (MCDM) technique. …”
    Get full text
    Article
  8. 2708

    Color and Grey-Level Co-Occurrence Matrix Analysis for Predicting Sensory and Biochemical Traits in Sweet Potato and Potato by Judith Ssali Nantongo, Edwin Serunkuma, Gabriela Burgos, Mariam Nakitto, Joseph Kitalikyawe, Thiago Mendes, Fabrice Davrieux, Reuben Ssali

    Published 2024-01-01
    “…A quick analytical method for the sensory traits could expedite the selection process in breeding programs. In this paper, the relationship between sensory panel and instrumental color plus texture features was evaluated. …”
    Get full text
    Article
  9. 2709

    An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion by Altyeb Taha, Ahmed Hamza Osman, Yakubu Suleiman Baguda

    Published 2025-01-01
    “…Furthermore, the rankings reflect the relative importance or acceptance of each class across multiple classifiers, providing deeper insights into the ensemble’s decision-making process. The proposed framework was validated on two publicly accessible datasets, CICAndMal2020 and DREBIN, with a 5-fold cross-validation technique. …”
    Get full text
    Article
  10. 2710

    Plasmodium P-Type Cyclin CYC3 Modulates Endomitotic Growth during Oocyst Development in Mosquitoes. by Magali Roques, Richard J Wall, Alexander P Douglass, Abhinay Ramaprasad, David J P Ferguson, Mbinda L Kaindama, Lorenzo Brusini, Nimitray Joshi, Zineb Rchiad, Declan Brady, David S Guttery, Sally P Wheatley, Hiroyuki Yamano, Anthony A Holder, Arnab Pain, Bill Wickstead, Rita Tewari

    Published 2015-11-01
    “…During its life cycle it undergoes two types of mitosis: endomitosis in asexual stages and an extremely rapid mitotic process during male gametogenesis. Both schizogony (producing merozoites) in host liver and red blood cells, and sporogony (producing sporozoites) in the mosquito vector, are endomitotic with repeated nuclear replication, without chromosome condensation, before cell division. …”
    Get full text
    Article
  11. 2711

    Decoding a Cognitive Performance State From Behavioral Data in the Presence of Auditory Stimuli by Saman Khazaei, Rose T. Faghih

    Published 2024-01-01
    “…Deriving an informative observation vector as well as the adaptive model and decoder would be essential in decoding the hidden performance. …”
    Get full text
    Article
  12. 2712

    Enhanced Subspace Iteration Technique for Probabilistic Modal Analysis of Statically Indeterminate Structures by Hongfei Cao, Xi Peng, Bin Xu, Fengjiang Qin, Qiuwei Yang

    Published 2024-11-01
    “…The essence of this proposed method revolves around efficiently constructing reduced basis vectors during the subspace iteration process, utilizing flexibility disassembly perturbation and the Krylov subspace. …”
    Get full text
    Article
  13. 2713

    Method on intrusion detection for industrial internet based on light gradient boosting machine by Xiangdong HU, Lingling TANG

    Published 2023-04-01
    “…Intrusion detection is a critical security protection technology in the industrial internet, and it plays a vital role in ensuring the security of the system.In order to meet the requirements of high accuracy and high real-time intrusion detection in industrial internet, an industrial internet intrusion detection method based on light gradient boosting machine optimization was proposed.To address the problem of low detection accuracy caused by difficult-to-classify samples in industrial internet business data, the original loss function of the light gradient boosting machine as a focal loss function was improved.This function can dynamically adjust the loss value and weight of different types of data samples during the training process, reducing the weight of easy-to-classify samples to improve detection accuracy for difficult-to-classify samples.Then a fruit fly optimization algorithm was used to select the optimal parameter combination of the model for the problem that the light gradient boosting machine has many parameters and has great influence on the detection accuracy, detection time and fitting degree of the model.Finally, the optimal parameter combination of the model was obtained and verified on the gas pipeline dataset provided by Mississippi State University, then the effectiveness of the proposed mode was further verified on the water dataset.The experimental results show that the proposed method achieves higher detection accuracy and lower detection time than the comparison model.The detection accuracy of the proposed method on the gas pipeline dataset is at least 3.14% higher than that of the comparison model.The detection time is 0.35s and 19.53s lower than that of the random forest and support vector machine in the comparison model, and 0.06s and 0.02s higher than that of the decision tree and extreme gradient boosting machine, respectively.The proposed method also achieved good detection results on the water dataset.Therefore, the proposed method can effectively identify attack data samples in industrial internet business data and improve the practicality and efficiency of intrusion detection in the industrial internet.…”
    Get full text
    Article
  14. 2714

    Machine Learning-Based Classification of Turkish Music for Mood-Driven Selection by Nazime Tokgöz, Ali Değirmenci, Ömer Karal

    Published 2024-06-01
    “…The objective is to facilitate the process of choosing Turkish music according to one’s mood. …”
    Get full text
    Article
  15. 2715

    Comprehensive Benefit Evaluation for Prefabricated Buildings Based on NSGA-II and Simulated Annealing Optimization Projection Pursuit Method by Fang Wang, Binbin Dai, Shiyu Song

    Published 2024-01-01
    “…The market promotion process of prefabricated construction has been slow, and it is significant to clarify the comprehensive benefits to enhance the willingness of construction units to support and the market share of prefabricated buildings. …”
    Get full text
    Article
  16. 2716
  17. 2717

    Simplified MS2 phage-like particle production including a novel maturation protein internal fusion affinity tag by Enos C. Kline, Rose Duong, Qin Wang, Barry R. Lutz

    Published 2025-12-01
    “…A consequential implementation of PLPs in diagnostics is as process controls in nucleic acid amplification tests, where control RNAs are packaged within the protein capsid and protected from degradation by RNases in the sample matrix. …”
    Get full text
    Article
  18. 2718

    Seismic Vulnerability Assessment of Reinforced Concrete Educational Buildings Using Machine Learning Algorithm by Tapan Kumar, Mohammad Al Amin Siddique, Raquib Ahsan

    Published 2024-01-01
    “…The conventional three-step evaluation process for determining the seismic vulnerability of existing buildings is time-consuming and expensive, especially when dealing with a large building stock or a city. …”
    Get full text
    Article
  19. 2719

    Selecting a Programming Scheme for Memristor Elements by E. A. Bukvarev, K. S. Fomina, S. A. Shchanikov

    Published 2022-12-01
    “…The programming procedure can be carried out using either SET or RESET, depending on a different direction of movement according to the volt-ampere characteristic of the memory and its transfer to a particular state. The programming process is controlled in the LTspice circuit modeling program.Results. …”
    Get full text
    Article
  20. 2720

    Modern State and civil society: promising directions and forms of interaction in the field of public administration by O. M. Muzychuk, K. L. Buhaichuk

    Published 2023-10-01
    “…The authors propose their own interpretation of public administration as the functioning of a public entity system established by the State, whose activities are aimed at ensuring sustainable development of the State in the process of providing administrative services, implementing laws and by-laws, and interacting with civil society in the national and international dimensions. …”
    Get full text
    Article