Search alternatives:
vector » sector (Expand Search)
Showing 2,261 - 2,280 results of 4,440 for search 'vector process', query time: 0.13s Refine Results
  1. 2261

    On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) C... by Gianmarco Baldini

    Published 2025-02-01
    “…Such attacks aim to hamper the ML classification process by poisoning the data set. Mitigation techniques are designed to counter this threat using different approaches. …”
    Get full text
    Article
  2. 2262

    Optimized Breast Cancer Classification Using PCA-LASSO Feature Selection and Ensemble Learning Strategies With Optuna Optimization by Prabhat Kumar Sahu, Taiyaba Fatma

    Published 2025-01-01
    “…The classifiers employed include Random Forest, Support Vector Machine (SVM), Gradient Boosting, and Logistic Regression, which were further refined using GridSearchCV, RandomizedSearchCV, and Optuna, with 3-fold cross-validation implemented to ensure robust evaluation of model performance. …”
    Get full text
    Article
  3. 2263

    VE-GCN: A Geography-Aware Approach for Polyline Simplification in Cartographic Generalization by Siqiong Chen, Anna Hu, Yongyang Xu, Haitao Wang, Zhong Xie

    Published 2025-02-01
    “…Polyline simplification is a critical process in cartographic generalization, but the existing methods often fall short in considering the overall geographic morphology or local edge and vertex information of polylines. …”
    Get full text
    Article
  4. 2264

    Optical control of RKKY coupling and perpendicular magnetic anisotropy in a synthetic antiferromagnet by Meiyang Ma, Jing Wu, Bo Liu, Lei Wang, Zhuoyi Li, Xuezhong Ruan, Zehua Hu, Fengqiu Wang, Xianyang Lu, Tianyu Liu, Jun Du, Ke Xia, Yongbing Xu

    Published 2025-05-01
    “…While the pump excitation process is shown to have an influence on the modulations, thermal contributions are excluded. …”
    Get full text
    Article
  5. 2265

    A correlation-based binary particle swarm optimization method for feature selection in human activity recognition by Huaijun Wang, Ruomeng Ke, Junhuai Li, Yang An, Kan Wang, Lei Yu

    Published 2018-04-01
    “…Effective feature selection determines the efficiency and accuracy of a learning process, which is essential in human activity recognition. …”
    Get full text
    Article
  6. 2266

    Dynamic topology adaptability of adaptive multimodal transmission strategy based on environment perception in multi-hop routing of 5G vehicle network by Shengxia Tan, Xianshuang Zong, Feng Xiao

    Published 2025-04-01
    “…Then, graph sample and aggregation (GraphSAGE) is used to process the network topology and extract node and edge features of the data. …”
    Get full text
    Article
  7. 2267

    Research on the Trajectory and Relative Speed of a Single-Sided Chemical Mechanical Polishing Machine by Guoqing Ye, Zhenqiang Yao

    Published 2025-04-01
    “…This work provides a systematic derivation protocol for abrasive trajectory analysis, a visualization paradigm for velocity optimization, and quantitative guidelines for precision process control—advancing beyond current empirical approaches in surface finishing technology.…”
    Get full text
    Article
  8. 2268

    Post-release monitoring pathway for the deployment of gene drive-modified mosquitoes for malaria control in Africa by Dorington O. Ogoyi, Julia Njagi, Willy Tonui, Brinda Dass, Hector Quemada, Stephanie James

    Published 2024-11-01
    “…Subject to a rigorous risk assessment process for future GDMMs products, the concerns may then be prioritized for post-release monitoring.…”
    Get full text
    Article
  9. 2269

    Using Higher Diffraction Orders to Improve the Accuracy and Robustness of Overlay Measurements by Shaoyu Liu, Yan Tang, Xiaolong Cheng, Yuliang Long, Jinfeng Jiang, Yu He, Lixin Zhao

    Published 2025-03-01
    “…The resulting two-layer marker structure is simple and compatible with existing measurement systems, showing tremendous potential for application at advanced process nodes.…”
    Get full text
    Article
  10. 2270

    The Impact of Cognitive Distortions on Decision Making in Agile Project Management Frameworks: Current Positions and Perspectives in the Academic Community by D. A. Khamitov

    Published 2024-08-01
    “…The author also identifies a possible further vector for the development of research in this direction. …”
    Get full text
    Article
  11. 2271

    Detection of Mucous Retention Cysts Using Deep Learning Methods on Panoramic Radiographs by Seda Arslan Tuncer, Çağla Danacı, Sümeyye Coşgun Baybars

    Published 2024-12-01
    “…In the classification process, deep feature representations or feature maps of the images were created using eight different deep learning models of EfficientNet from B0 to B7. …”
    Get full text
    Article
  12. 2272

    Electrical impedance-based tissue classification for bladder tumor differentiation by Carina Veil, Franziska Krauß, Bastian Amend, Falko Fend, Oliver Sawodny

    Published 2025-01-01
    “…Based on the distance of the feature vector of a unknown measurement to a healthy reference, a Gaussian process classifier is trained. …”
    Get full text
    Article
  13. 2273

    Infinite plate loaded with normal force moving along a complex path by A. V. Galaburdin

    Published 2020-12-01
    “…The behavior of displacements and stresses near the moving force is investigated; and the process of the elastic wave energy propagation is also studied. …”
    Get full text
    Article
  14. 2274

    THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE by Vladyslav Horulko

    Published 2024-05-01
    “…Ensuring an adequate level of cyber security is difficult to imagine without clearly planned joint actions and measures developed by responsible entities, which must be synchronized and implemented according to a single strategic plan and development vector of the national cyber security system of a declarative nature. …”
    Get full text
    Article
  15. 2275

    A Pythagorean fuzzy MCDM model for evaluating career happiness in sports by selecting a suitable sport by JiaYan Zhu, Zeng Jiao

    Published 2025-07-01
    “…Abstract This study explores an innovative application of the analytical hierarchy process (AHP) within the multi-criteria decision-making (MCDM) technique. …”
    Get full text
    Article
  16. 2276

    Color and Grey-Level Co-Occurrence Matrix Analysis for Predicting Sensory and Biochemical Traits in Sweet Potato and Potato by Judith Ssali Nantongo, Edwin Serunkuma, Gabriela Burgos, Mariam Nakitto, Joseph Kitalikyawe, Thiago Mendes, Fabrice Davrieux, Reuben Ssali

    Published 2024-01-01
    “…A quick analytical method for the sensory traits could expedite the selection process in breeding programs. In this paper, the relationship between sensory panel and instrumental color plus texture features was evaluated. …”
    Get full text
    Article
  17. 2277

    Impact wear behavior of austenitic steel bucket teeth based on machine learning by Zhihui Cai, Jianfeng Yan, Yandong Qiao, Rongjie Li, Yanchun Shi, Junping Zhang, Zhixiong Zhang

    Published 2025-05-01
    “…A particle swarm optimization support vector machine was employed to accurately predict wear depth. …”
    Get full text
    Article
  18. 2278
  19. 2279

    Failure Management Overview in Optical Networks by Sergio Cruzes

    Published 2024-01-01
    “…Emphasizing automation, it discusses how ML algorithms can streamline failure management processes, reducing manual intervention and service disruptions. …”
    Get full text
    Article
  20. 2280

    An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion by Altyeb Taha, Ahmed Hamza Osman, Yakubu Suleiman Baguda

    Published 2025-01-01
    “…Furthermore, the rankings reflect the relative importance or acceptance of each class across multiple classifiers, providing deeper insights into the ensemble’s decision-making process. The proposed framework was validated on two publicly accessible datasets, CICAndMal2020 and DREBIN, with a 5-fold cross-validation technique. …”
    Get full text
    Article