Showing 1,721 - 1,740 results of 3,176 for search '"convertible"', query time: 0.08s Refine Results
  1. 1721

    Cambiamenti socio-demografici e trasmissione delle risorse materiali e immateriali: prospettive etnografiche dalle Alpi occidentali italiane by Valentina Porcellana, Giulia Fassio, Pier Paolo Viazzo, Roberta Clara Zanini

    Published 2016-12-01
    “…Economically they differ since mountain pastoralism continues to be one of the pillars of economy and culture in the upper Pellice Valley, whereas Macugnaga has converted to tourism. We argue that the current focus on intangible heritage should not obscure the role of tangible assets – such as land, buildings and rights to private and collective resources – which are often essential to ensure that traditional craftsmanship is rescued and preserved. …”
    Get full text
    Article
  2. 1722

    Double-Diffusive MHD Viscous Fluid Flow in a Porous Medium in the Presence of Cattaneo-Christov Theories by Bidemi Olumide Falodun, Adeola John Omowaye, Funmilayo Helen Oyelami, Homan Emadifar, Ahmed A. Hamoud, S. M. Atif

    Published 2022-01-01
    “…In order to simplify these equations, they are converted into ordinary differential equations (ODEs). …”
    Get full text
    Article
  3. 1723

    Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism by Yuancheng LI, Hao LUO, Xinyu WANG, Jiexuan YUAN

    Published 2024-03-01
    “…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
    Get full text
    Article
  4. 1724

    A comparison study on optical character recognition models in mathematical equations and in any language by Sofi.A. Francis, M. Sangeetha

    Published 2025-03-01
    “…Optical Character Recognition[OCR] is a technology that makes use of artificial intelligence and machine learning to extract readable text from documents, images, tags or any other type of sources. It allows one to convert characters and text objects into digital data that can be easily processed, analyzed, and modified. …”
    Get full text
    Article
  5. 1725

    Honeypot contract detection method for Ethereum based on source code structure and graph attention network by Youwei WANG, Yudong HOU, Lizhou FENG

    Published 2023-09-01
    “…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
    Get full text
    Article
  6. 1726

    DC algorithm for estimation of sparse Gaussian graphical models. by Tomokaze Shiratori, Yuichi Takano

    Published 2024-01-01
    “…To this end, we focus on sparse estimation of GGM with the cardinality constraint based on the ℓ0 norm. Specifically, we convert the cardinality constraint into an equivalent constraint based on the largest-K norm, and reformulate the resultant constrained optimization problem into an unconstrained penalty form with a DC (difference of convex functions) representation. …”
    Get full text
    Article
  7. 1727

    Applying Environmental Isotope Theory to Groundwater Recharge in the Jiaozuo Mining Area, China by Pinghua Huang, Xinyi Wang

    Published 2017-01-01
    “…The topography increases per 100 m, and the δ18O value reduces by 0.23‰ on average. The δ18O value is converted into formula to calculate the groundwater recharge elevation, which is approximately from 400 to 800 m. …”
    Get full text
    Article
  8. 1728

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…Moreover, images go through several processing stages before they are converted into cipher images, including noise, segmentation, and encryption. …”
    Get full text
    Article
  9. 1729

    De la cassette au fichier numérique : enjeux de l’archivage, du partage et de la restitution des archives orales enregistrées au Niger by Véronique Ginouvès, Ibrahim Moussa

    Published 2024-12-01
    “…While considering the restitution to the field of collections recorded on the Nigerian territory and preserved in France, the authors adopt a comprehensive and continuous approach to take into account a decisive paradigm shift: the understanding of analogue archives converted into digital format and their production in a colonial context with a view to postcolonial use. …”
    Get full text
    Article
  10. 1730

    Les multiples formes actuelles de la conversion d’élevages laitiers de montagne vers la production de viande by Hélène Rapey

    Published 2016-07-01
    “…Here we address this gap through surveys of newly converted farms in the Massif Central. Our results show that milk-to-meat conversions are currently occurring in all kinds of trajectories (extend, hold or wind-down). …”
    Get full text
    Article
  11. 1731

    The Protective Potential Role of ACE2 against COVID-19 by Fereshteh Golab, Gelareh Vahabzadeh, Leila SadeghRoudbari, Arefeh Shirazi, Robabeh Shabani, Sara Tanbakooei, Lida Kooshesh

    Published 2023-01-01
    “…Due to the coronavirus disease 2019 (COVID-19), researchers all over the world have tried to find an appropriate therapeutic approach for the disease. The angiotensin-converting enzyme 2 (ACE2) has been shown as a necessary receptor to cell fusion, which is involved in infection due to severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). …”
    Get full text
    Article
  12. 1732

    Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU

    Published 2022-07-01
    “…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
    Get full text
    Article
  13. 1733

    An Approach to Model Based Testing of Multiagent Systems by Shafiq Ur Rehman, Aamer Nadeem

    Published 2015-01-01
    “…The protocol diagram is converted into a protocol graph, on which different coverage criteria are applied to generate test paths that cover interactions between the agents. …”
    Get full text
    Article
  14. 1734

    Seismic Proofing Capability of the Accumulated Semiactive Hydraulic Damper as an Active Interaction Control Device with Predictive Control by Ming-Hsiang Shih, Wen-Pei Sung

    Published 2016-01-01
    “…To improve the seismic proofing capability of Accumulated Semiactive Hydraulic Damper, it is converted to an Active Interaction Control device and synchronous control and predictive control methods are proposed. …”
    Get full text
    Article
  15. 1735

    Crystallization test: A prognostic biomarker in oral potentially malignant disorders and oral cancer by Kinjal Joshi, Jigna Shah

    Published 2024-12-01
    “…Conclusion: OPMDs lesion convert from white to mixed red and white lesion and OSCC appear as non-healing ulcer or ulcero-proliferative growth increase in number of transverse bars. …”
    Get full text
    Article
  16. 1736

    LMI-Based Robust Stabilization of a Class of Input-Constrained Uncertain Nonlinear Systems with Application to a Helicopter Model by Hassène Gritli

    Published 2020-01-01
    “…Thanks to the Schur complement lemma and the matrix inversion lemma, we convert these BMIs into LMIs allowing the simultaneous computation of the two gains of the affine controller. …”
    Get full text
    Article
  17. 1737

    REVIEW OF MONITORING TECHNOLOGIES USED IN HYBRID PHOTOVOLTAIC SYSTEMS by TEODOR POP, RADU-DUMITRU PENTIUC, VISARION-CATALIN IFRIM, CIPRIAN BEJENAR, PAVEL ATANASOAE

    Published 2024-01-01
    “…Most of the available solar energy is captured using photovoltaic systems and converted into electricity. Today's modern systems refer to combinations of photovoltaic and thermal panels (PV/T) to obtain electricity and domestic hot water, and systems consisting of photovoltaic panels with wind turbines which provides only electricity. …”
    Get full text
    Article
  18. 1738

    Trams: Bridging the Past and Future—Example Guidelines for Tram Redesign Illustrated by a Case Study from Korea by Fabio Dacarro, Guido Musante

    Published 2025-01-01
    “…These guidelines provide a structured framework for converting existing trams into mobile venues such as restaurants, classrooms, and work and conference spaces. …”
    Get full text
    Article
  19. 1739

    Determination of the Tail Unit Parameters of Ultralight Manned and Unmanned Helicopters at the Preliminary Design Stage by Vitaly Dudnik

    Published 2025-01-01
    “…Most of these helicopters have been converted into unmanned versions. Typically, such UAV models retain the rotor system, power plant, transmission, and empennage of the manned versions. …”
    Get full text
    Article
  20. 1740

    Application of first-order logic to identify organizers and perpetrators of illegal actions in teams of a limited circle of people by A. М. Sobol, E. I. Kozlova, Yu. A. Chernyavsky

    Published 2021-09-01
    “…The article also considers a method based on the resolution when implementing the reverse inference, taking into account the expression obtained in the direct inference. This expression is converted into a conjunctive normal formula using the laws of Boolean algebra and is proved by the elimination of events using the conjunction operation.…”
    Get full text
    Article