Showing 901 - 920 results of 2,913 for search '"The Real World"', query time: 0.16s Refine Results
  1. 901

    Some new existence results of positive solutions for anisotropic variable exponent operator by Rafik Guefaifia, Salah Boulaaras, Rashid Jan

    Published 2025-02-01
    “…These findings have significant implications for real-world applications, such as fluid dynamics, image processing, and material science, where variable growth conditions arise naturally. …”
    Get full text
    Article
  2. 902

    Inferential analysis of the stress-strength reliability for a new extended family of distributions by Mohammed S. Kotb, Mohammed Z. Raqab

    Published 2025-12-01
    “…Additionally, the effectiveness of our proposed methods is performed through the analysis of real-world data and comprehensive numerical simulations.…”
    Get full text
    Article
  3. 903

    Customizable Restoration in Multi-Degradation Scenarios: Joint Deraining and Low-Light Image Enhancement via Perceptual Decoupling by Zhiyong He

    Published 2025-01-01
    “…In real-world nighttime photography, images often suffer from both low-light conditions and rain-induced degradations simultaneously. …”
    Get full text
    Article
  4. 904

    Multi-factor person entity relation extraction model based on distant supervision by Yangchen HUANG, Yan JIA, Liang GAN, Jing XU, Jiuming HUANG, Zhonghe HE

    Published 2018-07-01
    “…Aiming at the problem that the basic assumption of distant supervision was too strong and easy to produce noise data,a model of the person entity relation extraction which could automatically filter the training data generated by distant supervision was proposed.For training data generation,the data produced by distant supervision would be filtered by multiple instance learning and the method of TF-IDF-based relation keyword detecting,which tried to make the training data has the manual annotation quality.Furthermore,the model combined lexical and syntactic features to extract the effective relation feature vector from two angles of words and semantics for classifier.The experiment results on large scale real-world datasets show that the proposed model outperforms other relation extraction methods which based on distant supervision.…”
    Get full text
    Article
  5. 905

    FilterFA: a multiple string matching algorithm based on specification of character set by Ping ZHANG, Hui-min HE, Chun-yan ZHANG, Cong CAO, Yan-bing LIU, Jian-long TAN

    Published 2016-12-01
    “…Experiments on synthetic datasets and real-world datasets (such as ClamAV) show that the storage overhead of FilterFA is only about 3% of that of AC, while the size of the character set is 8, and the false recognition rate is less than 2%.…”
    Get full text
    Article
  6. 906

    Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2015-08-01
    “…Also, when the home gateway, which knows the shared secret key, is out of order and the new gateway should be installed, the secure key establishment and building trust relationship are also very important because this scenario is likely to happen in real world. In addition, the thing is resource-constrained device, so it is difficult when secure key establishment and building trust relationship involve Public Key Infrastructure. …”
    Get full text
    Article
  7. 907

    Post-Colonial Macau: hope and despair in a World Centre of Tourism and Leisure by Michael O’Regan

    Published 2020-03-01
    “…The paper argues that while the “World Centre of Tourism and Leisure” is a political construct and key hegemonic project to keep citizens in a hyper-real world of simulacra and control, it is at the cost of everyday gossip, caution, self-censorship and demoralization.…”
    Get full text
    Article
  8. 908

    Le modèle de double régulation de l’activité : un modèle-guide pour la formation en ergonomie à l’Université by Muriel Prévot-Carpentier, Cathy Toupin

    Published 2024-12-01
    “…The double regulation model, also known as the five-square model proposed by Leplat and Cuny in 1977, remains central to activity analysis in ergonomics as it constitutes an open framework and a matrix for understanding activity in real-world situations. This model, based on a systemic approach, defines the main categories of variables and relationships through which any activity can be characterized. …”
    Get full text
    Article
  9. 909

    Pattern Formation in a Cross-Diffusive Ratio-Dependent Predator-Prey Model by Xinze Lian, Yanhong Yue, Hailing Wang

    Published 2012-01-01
    “…Furthermore, we present novel numerical evidence of time evolution of patterns controlled by self- and cross-diffusion in the model and find that the model dynamics exhibits a cross-diffusion controlled formation growth to spots, stripes, and spiral wave pattern replication, which show that reaction-diffusion model is useful to reveal the spatial predation dynamics in the real world.…”
    Get full text
    Article
  10. 910

    Unbiased Isotonic Regression Tree for Discovering Hidden Heterogeneity in Monotonicity Constraints by Doowon Choi

    Published 2025-01-01
    “…This integration is often implemented through specific types of constraints that reflect real-world conditions or theoretical insights. Within the family of regression trees, the isotonic regression tree is used to incorporate a monotonicity constraint between a predictor and a response variable. …”
    Get full text
    Article
  11. 911

    Oscillation Solutions for Nonlinear Second-Order Neutral Differential Equations by Omar Bazighifan, Nawa Alshammari, Faten Aldosari, Loredana Florentina Iambor

    Published 2025-01-01
    “…To demonstrate their practical implications, three illustrative examples are presented, showcasing the applicability and effectiveness of the results in solving real-world problems involving delay differential equations.…”
    Get full text
    Article
  12. 912

    New method for link prediction in directed networks based on triad patterns by Sheng CHANG, Hong MA, Shuxin LIU

    Published 2019-10-01
    “…Almost all current studies on link prediction problem focus on undirected networks.Unfortunately,many complex networks in the real world are directed.Ignoring the direction of a link will overlook some important information or even make the prediction meaningless.Directly applying the methods for undirected networks to directed networks will reduce the accuracy of prediction.A new method for link prediction in directed networks based on triad patterns was proposed.The proposed metric compare the difference of triad structures between undirected and directed networks and use potential theory to filter the triad patterns.By statistics of triad closeness in various networks,new method calculate the similarity between nodes using the triad closeness index of a network as the weight for different triad patterns.Experiments on nine real networks show that accuracy of proposed method is 4.3% better than benchmark methods.…”
    Get full text
    Article
  13. 913

    Method to improve edge coverage in fuzzing by Chunfu JIA, Shengbo YAN, Zhi WANG, Chenlu WU, Hang LI

    Published 2019-11-01
    “…Aiming at the problems of incomplete edge coverage,insufficient uses of edge coverage information and valid bytes information in AFL (American fuzz lop),a novel method was proposed.Firstly,a new seed selection algorithm was introduced,which could completely cover all edges discovered in one cycle.Secondly,the paths were scored according to the frequency of edges,to adjust the number of tests for each seed.Finally,more mutations were crafted on the valid bytes of AFL.Based on the method above,a new fuzzing tool named efuzz was implemented.Experiment results demonstrate that efuzz outperforms AFL and AFLFast in the edge coverage,with the increases of 5% and 9% respectively.In the LAVA-M dataset,efuzz found more vulnerabilities than AFL.Moreever,in real world applications efuzz has found three new security bugs with CVEs assigned.The method can effectively improve the edge coverage and vulnerability detection ability of fuzzer.…”
    Get full text
    Article
  14. 914

    Speech enhancement based on multi-task sparse representation for dual small microphone arrays by Li-chun YANG, Min-chao YE, Yun-tao QIAN

    Published 2014-02-01
    “…Experimental results from synthetic and real-world data show that the proposed speech enhancement algorithm without VAD works well in all cases no matter speech signal is included in the first frame or not.…”
    Get full text
    Article
  15. 915

    Comparison of the results obtained by Iman transform with Laplace transform by NIHAL OZDOGAN

    Published 2024-12-01
    “…Many processes in the real world are characterised by principles which are defined in the form of expressions involving rates of change. …”
    Get full text
    Article
  16. 916

    Evolution of machine learning in financial risk management: A survey by Lu Kuan-I

    Published 2025-01-01
    “…This paper contributes to the field in three key dimensions: First, we provide a clear taxonomy of risks and an introduction to relevant machine learning methods to establish a foundation and identify the targeted issues. Next, we explore real-world data applications, discussing the pros and cons of three methods, from the earliest to the most recent. …”
    Get full text
    Article
  17. 917

    Link prediction of heterogeneous complex networks based on an improved embedding learning algorithm. by Lang Chai, Rui Huang

    Published 2025-01-01
    “…The study was conducted using multiple real-world and synthetic datasets to validate the proposed algorithm's performance. …”
    Get full text
    Article
  18. 918

    A Benders Decomposition Algorithm for the Passenger Train Service Planning by Song Pu

    Published 2021-01-01
    “…Finally, our model and algorithm are tested on a real-world instance of the Beijing-Shanghai high-speed railway line. …”
    Get full text
    Article
  19. 919

    Bidirectional RNN-based private car trajectory reconstruction algorithm by Zhu XIAO, Xin QIAN, Hongbo JIANG, Chenglin CAI, Fanzi ZENG

    Published 2020-12-01
    “…To address the problem that in the complex urban environment, due to the inevitable interruption of GNSS positioning signal and the accumulation of errors during vehicle driving, the collected vehicle trajectory data was likely to be inaccurate and incomplete.a bidirectional weighted trajectory reconstruction algorithm was proposed based on RNN neural network.The GNSS-OBD trajectory acquisition device was used to collect vehicle trajectory information, and multi-source data fusion was adopted to achieve bidirectional weighted trajectory reconstruction.Furthermore, the neural arithmetic logic unit (NALU) was leveraged with the purpose of enhancing the extrapolation ability of deep network and ensuring the accuracy of trajectory reconstruction.For the evaluation, real-world experiments were conducted to evaluate the performance of the proposed method in comparison with existing methods.The root mean square error (RMSE) indicator shows the algorithm accuracy and the reconstructed trajectory is visually displayed through Google Earth.Experimental results validate the effectiveness and reliability of the proposed algorithm.…”
    Get full text
    Article
  20. 920

    Evaluation of Production Line Modelling in Qualified Cardboard Production with Reliability Analysis by Aykut Güleryüz, Mehmet Yılmaz, Hüseyin Ünözkan

    Published 2025-01-01
    “…Purpose: To develop a new model for calculating the long-term production expectation of production lines and to show how this model can be used in production planning and control.Methodology: The methodology leverages real-world data to assess mechanical unit performance and improvement efforts. …”
    Get full text
    Article