Search alternatives:
vector » sector (Expand Search)
Showing 4,341 - 4,360 results of 4,440 for search 'vector (processes OR process)', query time: 0.17s Refine Results
  1. 4341

    Gene therapy shines light on congenital stationary night blindness for future cures by Yi Zhang, Siqi Lin, Lingqi Yu, Xiang Lin, Shuai Qu, Qingyang Ye, Mengting Yu, Wenfeng Chen, Wenjie Wu

    Published 2025-04-01
    “…Abstract Congenital Stationary Night Blindness (CSNB) is a non-progressive hereditary eye disease that primarily affects the retinal signal processing, resulting in significantly reduced vision under low-light conditions. …”
    Get full text
    Article
  2. 4342

    Aspects of biosafety and biosecurity in poultry by O. M. Nesterenko

    Published 2024-05-01
    “…Control of biological vectors of introducing pathogens into the farm is carried out through physical protection barriers (arrangement of fences, fences, installation of protective nets and screens on windows, doors, and ventilation shafts). …”
    Get full text
    Article
  3. 4343

    Extremist Ideology Classification in Kazakh: A Multi-Class Approach Using Machine Learning and Psycholinguistic Analysis by Shynar Mussiraliyeva, Milana Bolatbek, Kymbat Baisylbayeva

    Published 2025-01-01
    “…This paper presents a new approach for analyzing extremist content in the Kazakh language on social media using advanced machine learning and natural language processing techniques. With the rapid growth of online data, especially on social networks, there is an urgent need for tools that can identify and classify extremist ideologies. …”
    Get full text
    Article
  4. 4344
  5. 4345

    A Revised Counter-Propagation Network Model Integrating Rough Set for Structural Damage Detection by Shao-Fei Jiang, Chun Fu, Chun-Ming Zhang, Zhao-Qi Wu

    Published 2013-11-01
    “…This paper proposes a revised counter-propagation network (CPN) model by integrating rough set in structural damage detection, applicable for processing redundant and uncertain information as well as assessing structural health states. …”
    Get full text
    Article
  6. 4346

    Sequential Discrimination of Mixed Quantum States by Jin-Hua Zhang, Fu-Lin Zhang, Yan Gao, Wei Qin, Shao-Ming Fei

    Published 2025-02-01
    “…Classical mixtures of quantum states often give rise to decoherence and are generally considered detrimental to quantum processing. However, in the framework of sequential measurement, such mixtures can be beneficial for state discrimination. …”
    Get full text
    Article
  7. 4347

    Vibration-Based Fault Diagnosis of Commutator Motor by Adam Glowacz, Witold Glowacz

    Published 2018-01-01
    “…Proposed techniques used vibration signals and signal processing methods. The authors analysed recognition efficiency for 3 states of the CM: healthy CM, CM with broken tooth on sprocket, CM with broken rotor coil. …”
    Get full text
    Article
  8. 4348

    A hybrid Hadoop-based sentiment analysis classifier for tweets associated with COVID-19 utilizing two machine learning algorithms: CNN, and fuzzy C4.5 by Fatima Es-sabery, Ibrahim Es-sabery, Junaid Qadir, Beatriz Sainz-de-Abajo, Begonya Garcia-Zapirain

    Published 2024-12-01
    “…The approach involves six steps: pre-processing to remove noisy data, vectorizing tweets with word embedding, extracting sentiment and contextual features using convolutional neural networks, fuzzifying outputs with a Gaussian fuzzifier to handle ambiguity, constructing a fuzzy tree and rule base using a fuzzy version of C4.5, and classifying tweets with fuzzy General Reasoning. …”
    Get full text
    Article
  9. 4349

    Classification and Time-Frequency Localization of Arbitrary LPWAN Signals With Radial Deformable DETR by Chun Ho Kong, Haibo Hu

    Published 2025-01-01
    “…Our method eliminates the need for hand-crafting CNN layers or signal processing pipelines for different LPWAN protocols provided that sufficient training samples are available. …”
    Get full text
    Article
  10. 4350

    Research on Analyzing the Emotional Polarity of Malicious Swipe Comments on E-commerce Platforms Based on NPL by Ren Chaoyi

    Published 2025-01-01
    “…In the era of rapid advancements in natural language processing (NLP) models, these technologies have immense potential to detect and address societal issues, enhancing the functioning of the digital society. …”
    Get full text
    Article
  11. 4351

    A novel dual embedding few-shot learning approach for classifying bone loss using orthopantomogram radiographic notes by Pradeep Kumar Yadalam, Amit Rajabhau Pawar, Prabhu Manickam Natarajan, Carlos M. Ardila

    Published 2025-07-01
    “…The proposed DualFit model architecture consists of two main branches: a Text Processing Branch for converting textual data into dense vectors and a Feature Processing Branch for analyzing numerical and categorical data. …”
    Get full text
    Article
  12. 4352

    Identification of key nodes and vulnerability analysis in airport networks with attention mechanism by Guangjian Ren, Zongqian Zhang, Yanhua Li

    Published 2025-07-01
    “…In this method, the core indicators such as degree, betweenness, closeness, eigenvector, and throughput centrality are adopted, and the input layer is constructed by normalization processing. The query, key and value vectors are calculated by a linear transformation, and then the attention score and weight coefficient are obtained, and finally, the comprehensive importance of the airport is evaluated. …”
    Get full text
    Article
  13. 4353

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article
  14. 4354
  15. 4355

    Off-Shore wind potential estimation along the coast of Chile by using scatterometer and Reanalysis data by C. Mattar, N. Villar-Poblete

    Published 2014-06-01
    “…The images obtained from the data processing were grouped into three different wind power zones named (A) located up north, (B) in the center and (C) down south-center. …”
    Get full text
    Article
  16. 4356

    Discovering Representations of Democracy in Big Data: Purposive Semantic Sample Selection for Qualitative and Mixed-Methods Research by Hubert Plisiecki, Agnieszka Kwiatkowska

    Published 2024-11-01
    “…To address this, we propose purposive semantic sampling – a Natural Language Processing approach using document-level embeddings created by a weighted average of word vectors with term frequency-inverse document frequency (tf-idf). …”
    Get full text
    Article
  17. 4357

    Hyperspectral target detection based on graph sampling and aggregation network. by Tie Li, Hongfeng Jin, Zhiqiu Li

    Published 2025-01-01
    “…This proposed model is capable of autonomously learning the effective feature representations of nodes within the graph, thereby facilitating the extraction and processing of graph data. It achieves this by extracting feature vectors through principal component analysis to construct adjacency matrices and performing convolution operations on hyperspectral images via sparse matrix multiplication, which enables the propagation and aggregation of node features within the graph structure. …”
    Get full text
    Article
  18. 4358

    First M87 Event Horizon Telescope Results. V. Physical Origin of the Asymmetric Ring by The Event Horizon Telescope Collaboration, Kazunori Akiyama, Antxon Alberdi, Walter Alef, Keiichi Asada, Rebecca Azulay, Anne-Kathrin Baczko, David Ball, Mislav Baloković, John Barrett, Dan Bintley, Lindy Blackburn, Wilfred Boland, Katherine L. Bouman, Geoffrey C. Bower, Michael Bremer, Christiaan D. Brinkerink, Roger Brissenden, Silke Britzen, Avery E. Broderick, Dominique Broguiere, Thomas Bronzwaer, Do-Young Byun, John E. Carlstrom, Andrew Chael, Chi-kwan Chan, Shami Chatterjee, Koushik Chatterjee, Ming-Tang Chen, Yongjun Chen, Ilje Cho, Pierre Christian, John E. Conway, James M. Cordes, Geoffrey B. Crew, Yuzhu Cui, Jordy Davelaar, Mariafelicia De Laurentis, Roger Deane, Jessica Dempsey, Gregory Desvignes, Jason Dexter, Sheperd S. Doeleman, Ralph P. Eatough, Heino Falcke, Vincent L. Fish, Ed Fomalont, Raquel Fraga-Encinas, Per Friberg, Christian M. Fromm, José L. Gómez, Peter Galison, Charles F. Gammie, Roberto García, Olivier Gentaz, Boris Georgiev, Ciriaco Goddi, Roman Gold, Minfeng Gu, Mark Gurwell, Kazuhiro Hada, Michael H. Hecht, Ronald Hesper, Luis C. Ho, Paul Ho, Mareki Honma, Chih-Wei L. Huang, Lei Huang, David H. Hughes, Shiro Ikeda, Makoto Inoue, Sara Issaoun, David J. James, Buell T. Jannuzi, Michael Janssen, Britton Jeter, Wu Jiang, Michael D. Johnson, Svetlana Jorstad, Taehyun Jung, Mansour Karami, Ramesh Karuppusamy, Tomohisa Kawashima, Garrett K. Keating, Mark Kettenis, Jae-Young Kim, Junhan Kim, Jongsoo Kim, Motoki Kino, Jun Yi Koay, Patrick M. Koch, Shoko Koyama, Michael Kramer, Carsten Kramer, Thomas P. Krichbaum, Cheng-Yu Kuo, Tod R. Lauer, Sang-Sung Lee, Yan-Rong Li, Zhiyuan Li, Michael Lindqvist, Kuo Liu, Elisabetta Liuzzo, Wen-Ping Lo, Andrei P. Lobanov, Laurent Loinard, Colin Lonsdale, Ru-Sen Lu, Nicholas R. MacDonald, Jirong Mao, Sera Markoff, Daniel P. Marrone, Alan P. Marscher, Iván Martí-Vidal, Satoki Matsushita, Lynn D. Matthews, Lia Medeiros, Karl M. Menten, Yosuke Mizuno, Izumi Mizuno, James M. Moran, Kotaro Moriyama, Monika Moscibrodzka, Cornelia Mul̈ler, Hiroshi Nagai, Neil M. Nagar, Masanori Nakamura, Ramesh Narayan, Gopal Narayanan, Iniyan Natarajan, Roberto Neri, Chunchong Ni, Aristeidis Noutsos, Hiroki Okino, Héctor Olivares, Tomoaki Oyama, Feryal Özel, Daniel C. M. Palumbo, Nimesh Patel, Ue-Li Pen, Dominic W. Pesce, Vincent Piétu, Richard Plambeck, Aleksandar PopStefanija, Oliver Porth, Ben Prather, Jorge A. Preciado-López, Dimitrios Psaltis, Hung-Yi Pu, Venkatessh Ramakrishnan, Ramprasad Rao, Mark G. Rawlings, Alexander W. Raymond, Luciano Rezzolla, Bart Ripperda, Freek Roelofs, Alan Rogers, Eduardo Ros, Mel Rose, Arash Roshanineshat, Helge Rottmann, Alan L. Roy, Chet Ruszczyk, Benjamin R. Ryan, Kazi L. J. Rygl, Salvador Sánchez, David Sánchez-Arguelles, Mahito Sasada, Tuomas Savolainen, F. Peter Schloerb, Karl-Friedrich Schuster, Lijing Shao, Zhiqiang Shen, Des Small, Bong Won Sohn, Jason SooHoo, Fumie Tazaki, Paul Tiede, Remo P. J. Tilanus, Michael Titus, Kenji Toma, Pablo Torne, Tyler Trent, Sascha Trippe, Shuichiro Tsuda, Ilse van Bemmel, Huib Jan van Langevelde, Daniel R. van Rossum, Jan Wagner, John Wardle, Jonathan Weintroub, Norbert Wex, Robert Wharton, Maciek Wielgus, George N. Wong, Qingwen Wu, André Young, Ken Young, Ziri Younsi, Feng Yuan, Ye-Fei Yuan, J. Anton Zensus, Guangyao Zhao, Shan-Shan Zhao, Ziyan Zhu, Jadyn Anczarski, Frederick K. Baganoff, Andreas Eckart, Joseph R. Farah, Daryl Haggard, Zheng Meyer-Zhao, Daniel Michalik, Andrew Nadolski, Joseph Neilsen, Hiroaki Nishioka, Michael A. Nowak, Nicolas Pradel, Rurik A. Primiani, Kamal Souccar, Laura Vertatschitsch, Paul Yamaguchi, Shuo Zhang

    Published 2019-01-01
    “…At the same time, in those models that produce a sufficiently powerful jet, the latter is powered by extraction of black hole spin energy through mechanisms akin to the Blandford-Znajek process. We briefly consider alternatives to a black hole for the central compact object. …”
    Get full text
    Article
  19. 4359

    Distributed Heterogeneous Spiking Neural Network Simulator Using Sunway Accelerators by Xuelei Li, Zhichao Wang, Yi Pan, Jintao Meng, Shengzhong Feng, Yanjie Wei

    Published 2024-12-01
    “…Besides, SWsnn relies on parallel Compute Processing Elements (CPEs) rather than serial Manage Processing Element (MPE) to control the communicating buffers, using Register-Level Communication (RLC) and Direct Memory Access (DMA). …”
    Get full text
    Article
  20. 4360

    An Embedding-Based Semantic Analysis Approach: A Preliminary Study on Redundancy Detection in Psychological Concepts Operationalized by Scales by Zhen Huang, Yitian Long, Kaiping Peng, Song Tong

    Published 2025-01-01
    “…This study introduces an Embedding-based Semantic Analysis Approach (ESAA) for detecting redundancy in psychological concepts, which are operationalized through their respective scales, using natural language processing techniques. The ESAA utilizes OpenAI’s text-embedding-3-large model to generate high-dimensional semantic vectors (i.e., embeddings) of scale items and applies hierarchical clustering to group semantically similar items, revealing potential redundancy. …”
    Get full text
    Article