Suggested Topics within your search.
Suggested Topics within your search.
- English language 2
- Moral and ethical aspects 2
- Public relations 2
- ART / Digital 1
- Advertising 1
- Agriculture 1
- Business English 1
- Business and Management 1
- Business writing 1
- Communication 1
- Computer animation 1
- Computer graphics 1
- Digital cinematography 1
- Digital techniques 1
- Economic aspects 1
- Electronic circuits 1
- Fault tolerance (Engineering) 1
- Führung 1
- Grammar 1
- Hospitality industry 1
- Image processing 1
- Information technology 1
- Journalistic ethics 1
- Leadership 1
- Maintainability (Engineering) 1
- Management 1
- Marketing 1
- Photography 1
- Professional ethics 1
- Public relations personnel 1
-
901
Some new existence results of positive solutions for anisotropic variable exponent operator
Published 2025-02-01“…These findings have significant implications for real-world applications, such as fluid dynamics, image processing, and material science, where variable growth conditions arise naturally. …”
Get full text
Article -
902
Inferential analysis of the stress-strength reliability for a new extended family of distributions
Published 2025-12-01“…Additionally, the effectiveness of our proposed methods is performed through the analysis of real-world data and comprehensive numerical simulations.…”
Get full text
Article -
903
Customizable Restoration in Multi-Degradation Scenarios: Joint Deraining and Low-Light Image Enhancement via Perceptual Decoupling
Published 2025-01-01“…In real-world nighttime photography, images often suffer from both low-light conditions and rain-induced degradations simultaneously. …”
Get full text
Article -
904
Multi-factor person entity relation extraction model based on distant supervision
Published 2018-07-01“…Aiming at the problem that the basic assumption of distant supervision was too strong and easy to produce noise data,a model of the person entity relation extraction which could automatically filter the training data generated by distant supervision was proposed.For training data generation,the data produced by distant supervision would be filtered by multiple instance learning and the method of TF-IDF-based relation keyword detecting,which tried to make the training data has the manual annotation quality.Furthermore,the model combined lexical and syntactic features to extract the effective relation feature vector from two angles of words and semantics for classifier.The experiment results on large scale real-world datasets show that the proposed model outperforms other relation extraction methods which based on distant supervision.…”
Get full text
Article -
905
FilterFA: a multiple string matching algorithm based on specification of character set
Published 2016-12-01“…Experiments on synthetic datasets and real-world datasets (such as ClamAV) show that the storage overhead of FilterFA is only about 3% of that of AC, while the size of the character set is 8, and the false recognition rate is less than 2%.…”
Get full text
Article -
906
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
Published 2015-08-01“…Also, when the home gateway, which knows the shared secret key, is out of order and the new gateway should be installed, the secure key establishment and building trust relationship are also very important because this scenario is likely to happen in real world. In addition, the thing is resource-constrained device, so it is difficult when secure key establishment and building trust relationship involve Public Key Infrastructure. …”
Get full text
Article -
907
Post-Colonial Macau: hope and despair in a World Centre of Tourism and Leisure
Published 2020-03-01“…The paper argues that while the “World Centre of Tourism and Leisure” is a political construct and key hegemonic project to keep citizens in a hyper-real world of simulacra and control, it is at the cost of everyday gossip, caution, self-censorship and demoralization.…”
Get full text
Article -
908
Le modèle de double régulation de l’activité : un modèle-guide pour la formation en ergonomie à l’Université
Published 2024-12-01“…The double regulation model, also known as the five-square model proposed by Leplat and Cuny in 1977, remains central to activity analysis in ergonomics as it constitutes an open framework and a matrix for understanding activity in real-world situations. This model, based on a systemic approach, defines the main categories of variables and relationships through which any activity can be characterized. …”
Get full text
Article -
909
Pattern Formation in a Cross-Diffusive Ratio-Dependent Predator-Prey Model
Published 2012-01-01“…Furthermore, we present novel numerical evidence of time evolution of patterns controlled by self- and cross-diffusion in the model and find that the model dynamics exhibits a cross-diffusion controlled formation growth to spots, stripes, and spiral wave pattern replication, which show that reaction-diffusion model is useful to reveal the spatial predation dynamics in the real world.…”
Get full text
Article -
910
Unbiased Isotonic Regression Tree for Discovering Hidden Heterogeneity in Monotonicity Constraints
Published 2025-01-01“…This integration is often implemented through specific types of constraints that reflect real-world conditions or theoretical insights. Within the family of regression trees, the isotonic regression tree is used to incorporate a monotonicity constraint between a predictor and a response variable. …”
Get full text
Article -
911
Oscillation Solutions for Nonlinear Second-Order Neutral Differential Equations
Published 2025-01-01“…To demonstrate their practical implications, three illustrative examples are presented, showcasing the applicability and effectiveness of the results in solving real-world problems involving delay differential equations.…”
Get full text
Article -
912
New method for link prediction in directed networks based on triad patterns
Published 2019-10-01“…Almost all current studies on link prediction problem focus on undirected networks.Unfortunately,many complex networks in the real world are directed.Ignoring the direction of a link will overlook some important information or even make the prediction meaningless.Directly applying the methods for undirected networks to directed networks will reduce the accuracy of prediction.A new method for link prediction in directed networks based on triad patterns was proposed.The proposed metric compare the difference of triad structures between undirected and directed networks and use potential theory to filter the triad patterns.By statistics of triad closeness in various networks,new method calculate the similarity between nodes using the triad closeness index of a network as the weight for different triad patterns.Experiments on nine real networks show that accuracy of proposed method is 4.3% better than benchmark methods.…”
Get full text
Article -
913
Method to improve edge coverage in fuzzing
Published 2019-11-01“…Aiming at the problems of incomplete edge coverage,insufficient uses of edge coverage information and valid bytes information in AFL (American fuzz lop),a novel method was proposed.Firstly,a new seed selection algorithm was introduced,which could completely cover all edges discovered in one cycle.Secondly,the paths were scored according to the frequency of edges,to adjust the number of tests for each seed.Finally,more mutations were crafted on the valid bytes of AFL.Based on the method above,a new fuzzing tool named efuzz was implemented.Experiment results demonstrate that efuzz outperforms AFL and AFLFast in the edge coverage,with the increases of 5% and 9% respectively.In the LAVA-M dataset,efuzz found more vulnerabilities than AFL.Moreever,in real world applications efuzz has found three new security bugs with CVEs assigned.The method can effectively improve the edge coverage and vulnerability detection ability of fuzzer.…”
Get full text
Article -
914
Speech enhancement based on multi-task sparse representation for dual small microphone arrays
Published 2014-02-01“…Experimental results from synthetic and real-world data show that the proposed speech enhancement algorithm without VAD works well in all cases no matter speech signal is included in the first frame or not.…”
Get full text
Article -
915
Comparison of the results obtained by Iman transform with Laplace transform
Published 2024-12-01“…Many processes in the real world are characterised by principles which are defined in the form of expressions involving rates of change. …”
Get full text
Article -
916
Evolution of machine learning in financial risk management: A survey
Published 2025-01-01“…This paper contributes to the field in three key dimensions: First, we provide a clear taxonomy of risks and an introduction to relevant machine learning methods to establish a foundation and identify the targeted issues. Next, we explore real-world data applications, discussing the pros and cons of three methods, from the earliest to the most recent. …”
Get full text
Article -
917
Link prediction of heterogeneous complex networks based on an improved embedding learning algorithm.
Published 2025-01-01“…The study was conducted using multiple real-world and synthetic datasets to validate the proposed algorithm's performance. …”
Get full text
Article -
918
A Benders Decomposition Algorithm for the Passenger Train Service Planning
Published 2021-01-01“…Finally, our model and algorithm are tested on a real-world instance of the Beijing-Shanghai high-speed railway line. …”
Get full text
Article -
919
Bidirectional RNN-based private car trajectory reconstruction algorithm
Published 2020-12-01“…To address the problem that in the complex urban environment, due to the inevitable interruption of GNSS positioning signal and the accumulation of errors during vehicle driving, the collected vehicle trajectory data was likely to be inaccurate and incomplete.a bidirectional weighted trajectory reconstruction algorithm was proposed based on RNN neural network.The GNSS-OBD trajectory acquisition device was used to collect vehicle trajectory information, and multi-source data fusion was adopted to achieve bidirectional weighted trajectory reconstruction.Furthermore, the neural arithmetic logic unit (NALU) was leveraged with the purpose of enhancing the extrapolation ability of deep network and ensuring the accuracy of trajectory reconstruction.For the evaluation, real-world experiments were conducted to evaluate the performance of the proposed method in comparison with existing methods.The root mean square error (RMSE) indicator shows the algorithm accuracy and the reconstructed trajectory is visually displayed through Google Earth.Experimental results validate the effectiveness and reliability of the proposed algorithm.…”
Get full text
Article -
920
Evaluation of Production Line Modelling in Qualified Cardboard Production with Reliability Analysis
Published 2025-01-01“…Purpose: To develop a new model for calculating the long-term production expectation of production lines and to show how this model can be used in production planning and control.Methodology: The methodology leverages real-world data to assess mechanical unit performance and improvement efforts. …”
Get full text
Article