-
341
Enhancing Word Embeddings for Improved Semantic Alignment
Published 2024-12-01Subjects: “…natural language processing…”
Get full text
Article -
342
Real Implementation and Testing of Short-Term Building Load Forecasting: A Comparison of SVR and NARX
Published 2025-04-01Subjects: Get full text
Article -
343
Classifying Power Quality Issues in Railway Electrification Systems Using a Nonsubsampled Contourlet Transform Approach
Published 2025-08-01Subjects: “…multi‐class support vector machines…”
Get full text
Article -
344
A Method for Detecting Small Slow Targets on Sea Surface Based on FC-MCNN
Published 2024-01-01Subjects: Get full text
Article -
345
Electroencephalography Signal Analysis: Classification Techniques and Applications
Published 2025-05-01Subjects: Get full text
Article -
346
Impact of a typical scanner delay processing parameter on local microstructure in metallic laser-based powder bed fusion
Published 2025-04-01“…Future PBF-LB/M studies should focus more on understanding time-resolved laser beam processing effects to better reduce inconsistencies and improve part quality.…”
Get full text
Article -
347
-
348
Seepage area of the cold seep exhibits strong homogeneous selection on prokaryotic community assembly and supports high depth variability of both archaeal and bacterial communities
Published 2025-07-01“…In this study, we comprehensively investigated the microbial depth variability and its underlying assembly process in the seepage and non-seepage areas of Haima Cold Seep. …”
Get full text
Article -
349
A Robust Sidelobe Cancellation Algorithm Based on Beamforming Vector Norm Constraint
Published 2024-01-01“…However, traditional SLC suffers from the issue of partially canceling the desired signal at high signal-to-noise ratio (SNR), primarily due to unconstrained beamforming processing. Extensive research has been conducted to address this problem; however, existing algorithms have limitations such as dependence on knowledge of signal array vectors or number of interferers and involve high computational complexity. …”
Get full text
Article -
350
TreeVector: scalable, interactive, phylogenetic trees for the web.
Published 2010-01-01“…TreeVector is designed as a framework to integrate with these processes and produce user-customized phylogenies automatically. …”
Get full text
Article -
351
Key Vectors of Regional Economic Policy: Expectations and Reality
Published 2020-12-01Get full text
Article -
352
Unsupervised Deep Clustering on Spatiotemporal Objects Extracted from 4D Point Clouds for Automatic Identification of Topographic Processes in Natural Environments
Published 2025-07-01“…Topographic processes, such as sediment erosion, accumulation, and transport are crucial for understanding the evolution of natural landscapes. …”
Get full text
Article -
353
Modern Vectors of Russian Diplomacy in the Post-Soviet Space
Published 2021-11-01Get full text
Article -
354
Secure distributed signcryption scheme based on vector space
Published 2009-01-01“…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
Get full text
Article -
355
Secure distributed signcryption scheme based on vector space
Published 2009-01-01“…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
Get full text
Article -
356
Development vectors of foreign library science at present stage
Published 2011-06-01Get full text
Article -
357
Modeling and Verification of A Novel Vector Hysteron Model
Published 2020-10-01“…In order to simulate the effect of anisotropy on the magnetization process more effectively, this paper changes the method of using the equipotential surface to simulate the magnetization process in the VHM model, and discusses a new scheme. …”
Get full text
Article -
358
Accelerating Streaming Subgraph Matching via Vector Databases
Published 2025-01-01“…Building on this foundation, we perform k-nearest neighbor search on high-dimensional vectors by using a vector database for indexing. Inverted file and product quantization techniques within the vector database were employed to accelerate the process. …”
Get full text
Article -
359
Adaptive Matched Filter Based on Power Vector Method
Published 2017-02-01“…An adaptive transversal filter capable of suppressing broadband jams and receiving broadband signal simultaneously is considered. Signal processing algorithm using power vector basis is proposed. …”
Get full text
Article -
360
Privacy Preserving Inner Product of Vectors in Cloud Computing
Published 2014-05-01“…In this paper, we consider the scenario where three parties are involved in the computing process of cloud computing. We propose a new privacy preserving scheme for inner product of two vectors in the cloud and give the correctness analysis and performance analysis for the scheme. …”
Get full text
Article