Showing 521 - 540 results of 1,182 for search '"pipeline"', query time: 0.07s Refine Results
  1. 521

    Paris dans les récits de voyage d’écrivains arabes : repérage, analyse sémantique et cartographie de toponymes by Motasem Alrahabi, Carmen Brando, Muhamed AlKhalil, Joseph Dichy

    Published 2021-05-01
    “…This research sits at the crossroads of Natural Language Processing, Literary Studies, and Digital Humanities. Our pipeline identifies place named entities, analyzes their semantic context (with regard to opinions, sentiments and emotions), and locates the place names on geographic maps. …”
    Get full text
    Article
  2. 522

    Clinical analysis of risk factors for diarrhea associated with enteral nutrition in post-craniocerebral surgery patients by Lei Zhang, Lulu Zhang, Xiaojie Zhu, Leiming Xu, Lin Zhu, Hai Zhou, Shengkai Yang

    Published 2025-02-01
    “…Variables such as sex, age, liquid preservation, infusion duration, pipeline assessment, heating during infusion, infusion rate, post-infusion rounds, and oral care were compared between diarrhea and non-diarrhea groups. …”
    Get full text
    Article
  3. 523

    Improving crude oil storage tank heating and blending using multiple hot jet sprays: An experimental and numerical study by M. Shahnazari Sani, D.D. Ganji, A. Ramiar, Kh Hoseinzadeh

    Published 2025-01-01
    “…A significant factor in the storage and blending of crude oil in reservoirs and its transfer and transmission to the pipeline in cold regions is sufficient heating and blending in the reservoir to reach the desired temperature and quality. …”
    Get full text
    Article
  4. 524

    A comparative machine learning study of schizophrenia biomarkers derived from functional connectivity by Victoria Shevchenko, R. Austin Benn, Robert Scholz, Wei Wei, Carla Pallavicini, Ulysse Klatzmann, Francesco Alberti, Theodore D. Satterthwaite, Demian Wassermann, Pierre-Louis Bazin, Daniel S. Margulies

    Published 2025-01-01
    “…These findings along with the feature selection pipeline proposed here will facilitate future inquiries into the prediction of schizophrenia subtypes and transdiagnostic phenomena.…”
    Get full text
    Article
  5. 525

    Research of Carrier's Cloud Management System Based on Open Architecture by Runfeng Qin, Yongbing Fan, Hong Tang, Huamin Jin

    Published 2013-10-01
    “…In recent years,several carriers provided their own IaaS cloud computing services and products.As the unified operational tools for the underlying physical resources,CMS(cloud-computing management system)gradually becomes the bottleneck due to its closed architecture when the carriers desire flexible resource-scheduling and service-provision.In order to better adapt to the future cloud business,the carriers need to build the end-to-end open IaaS CMS combined their own cloud computing business requirements.While promoting and designing the open-minded CMS architecture,the carriers could use some open source CMS like OpenStack for reference,and finally achieve the real open-minded CMS with the extensible ability,compatibility,differentiated service capacity and scale deployment capabilities.Based on the better intelligent pipeline method,the carriers will be committed to detailing the cloud computing service,optimizing the architecture and more scaling the deployment.…”
    Get full text
    Article
  6. 526

    In-band network telemetry system based on high-performance packet processing architecture VPP by Tian PAN, Xingchen LIN, Jiao ZHANG, Tao HUANG, Yunjie LIU

    Published 2021-03-01
    “…An in-band network telemetry-based system was built based on VPP, a high-performance virtual network forwarding architecture/device, via reorganizing the data plane pipeline processing modules.Moreover, a network-wide telemetry mechanism was further developed via embedding source routing into the probe packet header for specifying the route of probe packets.Finally, a virtual network topology was built with performance evaluation conducted.The evaluation shows that the telemetry system can monitor the network in a high precision of every 0.13 ms, detecting link congestion in real time with minor performance overhead.Given virtual network devices have been widely deployed in data centers, the proposed scheme is expected to improve the reliability of multi-tenancy and network function virtualization in data centers via high-precision, network-wide virtual link telemetry coverage.…”
    Get full text
    Article
  7. 527

    Automated Detection of Short Optical Transients of Astrophysical Origin in Real Time by Marcin Sokołowski, Katarzyna Małek, Lech W. Piotrowski, Grzegorz Wrochna

    Published 2010-01-01
    “…In this the real-time pipeline designed for identification of optical flashes with the “Pi of the Sky” project will be presented in detail together with solutions used by other experiments.…”
    Get full text
    Article
  8. 528

    Emotional Expressions and Advocacy Coalitions by Allegra H. Fullerton, Kayla M. Gabehart, Christopher M. Weible

    Published 2024-04-01
    “…An application is illustrated in a natural gas pipeline siting conflict in the US using data from news media coverage. …”
    Get full text
    Article
  9. 529

    MODELING THE RISKS OF DEVELOPING AND IMPLEMENTING THE INFRASTRUCTURE PROJECT BASED ON NETWORK PLANNING METHODS by A. I. Denisova

    Published 2020-02-01
    “…The described procedure is checked on an illustrative example of the infrastructure project, which consists in laying a section of the pipeline along the seabed. The software implementation of discrete optimization algorithms for the project plan and simulation tests has been implemented in the framework of an automated scenario modeling system using Python.…”
    Get full text
    Article
  10. 530

    A Primer for Disease Gene Prioritization Using Next-Generation Sequencing Data by Shuoguo Wang, Jinchuan Xing

    Published 2013-12-01
    “…Here, we outline the analysis pipeline and describe some of the most commonly used principles and tools for analyzing NGS data for disease gene identification.…”
    Get full text
    Article
  11. 531

    Generation and Evaluation of Multiple-choice Reading Comprehension Questions for Swedish by Dmytro Kalpakchi, Johan Boye

    Published 2024-12-01
    “…Unlike previous approaches, we construct models to generate the whole MCQ in one go, rather than using a pipeline architecture. Furthermore, we propose a two-stage method for evaluating the quality of the generated MCQs, first evaluating on carefully designed single-sentence texts, and then on texts from the SFI national exams. …”
    Get full text
    Article
  12. 532

    Artificial Neural Network for Vibration Frequency Measurement Using Kinect V2 by Jiantao Liu, Xiaoxiang Yang

    Published 2019-01-01
    “…The proposed method can provide good frequency prediction within acceptable accuracy compared to an industrial vibrometer, with the advantages of contactless process and easy pipeline implementation.…”
    Get full text
    Article
  13. 533

    Research of the Driving Characteristic of Differential-drive Adaptive Pipe Robot by Wang Chenzhong, Wang Ting, Liu Jun, Zhang Zhaolong, Hu Shaogang

    Published 2017-01-01
    “…The results indicate that the pipeline robot can through bends without interference,and show a good driving characteristics.…”
    Get full text
    Article
  14. 534

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  15. 535

    Simulating Chemistry with Fermionic Optical Superlattices by Fotios Gkritsis, Daniel Dux, Jin Zhang, Naman Jain, Christian Gogolin, Philipp M. Preiss

    Published 2025-01-01
    “…We describe a complete compilation pipeline from the molecular Hamiltonian to the sequence of lattice operations, thus providing a concrete link between quantum simulation and chemistry. …”
    Get full text
    Article
  16. 536

    Research on Fluid Transient and Operation Scheduling Safety of Water Supply System by YUAN Zhe, ZHOU Zixuan

    Published 2021-01-01
    “…In order to prevent the water hammer caused by the change of water demand and accidental pump stop in the actual operation of the water supply system,based on the actual water supply project and method of characteristics,this paper establishes the hydraulic transition process model of the pump water supply system,and studies the fluid transient review and the optimization of operation scheduling safety.The actual project shows that without water hammer protection measures,the excessive negative pressure will occur in the pipeline in case of accidental pump stop.By taking the water hammer protection measures on the surge tower at lower positions,the negative pressure is effectively avoided and the safe operation of water supply system is guaranteed.By reducing the water supply pressure at the access point of the water plant,while ensuring the system safety,the water supply of the pump set is increased,the energy saving benefits are improved,and the economic operation of water supply projects is realized.…”
    Get full text
    Article
  17. 537

    Method for Calculation of Steam-Compression Heat Transformers by S. V. Zditovetckaya, V. I. Volodin

    Published 2012-10-01
    “…The paper considers a method for joint numerical analysis of cycle parameters and heatex-change equipment of steam-compression heat transformer contour that takes into account a non-stationary operational mode and irreversible losses in devices and pipeline contour. The method has been realized in the form of the software package and can be used while making design or selection of a heat transformer with due account of a coolant and actual equipment being included in its structure.The paper presents investigation results revealing influence of pressure loss in an evaporator and a condenser from the side of the coolant caused by a friction and local resistance on power efficiency of the heat transformer which is operating in the mode of refrigerating and heating installation and a thermal pump. …”
    Get full text
    Article
  18. 538

    Merging Agents and Cloud Services in Industrial Applications by Francisco P. Maturana, Juan L. Asenjo, Neethu S. Philip, Shweta Chatrola

    Published 2014-01-01
    “…This reporting capability has been architected using networked agents, worker roles, and scripts for building a scalable data pipeline and analytics system.…”
    Get full text
    Article
  19. 539

    Multi‐Site Transfer Function Approach for Real‐Time Modeling of the Ground Electric Field Induced by Laterally‐Nonuniform Ionospheric Source by Mikhail Kruglyakov, Elena Marshalko, Alexey Kuvshinov, Maxim Smirnov, Ari Viljanen

    Published 2023-10-01
    “…Besides, we compared GEF‐based geomagnetically induced current (GIC) with that measured at the Mäntsälä natural gas pipeline recording point and again observed remarkable agreement between modeled and measured GIC.…”
    Get full text
    Article
  20. 540

    A Comparative Study of Some Automatic Arabic Text Diacritization Systems by Ali Mijlad, Yacine El Younoussi

    Published 2022-01-01
    “…One uses a variant of the hidden Markov model. The other one is a pipeline, which includes a Long Short-Term Memory deep learning model, a rule-based correction component, and a statistical-based component. …”
    Get full text
    Article