Search alternatives:
position » positive (Expand Search)
Showing 501 - 520 results of 1,285 for search 'binary position', query time: 0.11s Refine Results
  1. 501

    Generalized Out-of-Plane Equilibrium Points in the Frame of Elliptic Restricted Three-Body Problem: Impact of Oblate Primary and Luminous-Triaxial Secondary by Aminu Abubakar Hussain, Aishetu Umar

    Published 2019-01-01
    “…It is seen that the pair of points (ξ0,0,±ζ0) which correspond to the positions of the 1st family of the out-of-plane equilibrium points, L6,7, are affected by the oblateness of the primary, radiation pressure and triaxiality of the secondary, semimajor axis, and eccentricity of the orbits of the principal bodies. …”
    Get full text
    Article
  2. 502

    Internet Use and Agricultural Household Food Insecurity in Indonesia by Dela Maria Ardianti, Djoni Hartono

    Published 2022-10-01
    “…The policy implication directed to the government can improve the quality of internet infrastructure and improve content as positive information for the user, especially in the agricultural sector.…”
    Get full text
    Article
  3. 503

    Considerations on Water Network Construction in Beijing by WANG Tao, LI Liqin, WU Xia, WANG Yan

    Published 2024-06-01
    “…According to the new requirements and new direction of national water network construction, combined with the practice of Beijing water network planning, the situation and demand of Beijing (as a national center city) water network were analyzed based on the new requirements of the strategic positioning of the four centers in Beijing. By taking the "nature-society" binary water cycle as the theoretical foundation, this paper proposed a significant network form of "five veins and five lines, three rings and ten networks, five districts and four reservoirs" in space, with five major water systems as the foundation, water diversion projects as the channels, transmission and distribution channels as the veins, and regulation and storage projects as the nodes. …”
    Get full text
    Article
  4. 504

    Text coverless information hiding method based on synonyms expansion and label delivery mechanism by Zhen ZHANG, Jiaming NI, Ye YAO, Lichun GONG, Yujuan WANG, Guohua WU

    Published 2021-09-01
    “…To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided into several keywords, then those keywords were embedded in different carrier texts respectively.Considering the interchangeability of synonyms in Chinese, using the word similarity calculation method based on HowNet,it was possible to filter synonyms which met the contextual semantics.For the purpose of increasing hiding capacity, various keywords or their synonyms were embedded in the same carrier text as much as possible.At the same moment, when recording the positional parameters of the secret information in each carrier text, those parameters were converted into a binary sequence in a fixed format, which was used to generate carrier text.Finally, the carrier texts and generated text were sent to the receiver.Comparison of the results with those of other studies confirm that the proposed method not only makes great improvement in hiding capacity and detection resistance, but also reduces the overhead of establishing and maintaining databases by using small text database.…”
    Get full text
    Article
  5. 505

    Text coverless information hiding method based on synonyms expansion and label delivery mechanism by Zhen ZHANG, Jiaming NI, Ye YAO, Lichun GONG, Yujuan WANG, Guohua WU

    Published 2021-09-01
    “…To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided into several keywords, then those keywords were embedded in different carrier texts respectively.Considering the interchangeability of synonyms in Chinese, using the word similarity calculation method based on HowNet,it was possible to filter synonyms which met the contextual semantics.For the purpose of increasing hiding capacity, various keywords or their synonyms were embedded in the same carrier text as much as possible.At the same moment, when recording the positional parameters of the secret information in each carrier text, those parameters were converted into a binary sequence in a fixed format, which was used to generate carrier text.Finally, the carrier texts and generated text were sent to the receiver.Comparison of the results with those of other studies confirm that the proposed method not only makes great improvement in hiding capacity and detection resistance, but also reduces the overhead of establishing and maintaining databases by using small text database.…”
    Get full text
    Article
  6. 506

    Humanistic and diplomatic implications of international scholarship schemes in Taiwan: an analysis by Warangkana Lin

    Published 2024-12-01
    “…This perspective transcends a simplistic binary view, offering a comprehensive understanding of international scholarship programmes and highlighting the intricate interplay between humanistic and diplomatic contributions.…”
    Get full text
    Article
  7. 507

    Information-extremе machine learning for object identification on the terrain by V. V. Moskalenko, A. H. Korobov

    Published 2016-06-01
    “…Kulbak's information measure, which is a function of false omission rate and positive predictive value of decision-making and it also allows machine learning on imbalanced dataset.…”
    Get full text
    Article
  8. 508
  9. 509

    Identifying Catastrophic Outlier Photometric Redshift Estimates in the COSMOS Field with Machine Learning Methods by Mitchell T. Dennis, Esther M. Hu, Lennox L. Cowie

    Published 2025-01-01
    “…Our neural networks can correctly classify 55.6% and 33.3% of the true positives with few to no false positives. These methods can be used to reduce the errors caused by the errors in redshift estimates, particularly at high redshift. …”
    Get full text
    Article
  10. 510

    Analysis of the Factors Determining the Probability of Registered or Informal Employment for Wage Earners in Turkey by Serdar Acun

    Published 2021-07-01
    “…The TURKSTAT 2018 Household Labor Force Survey micro data setis used for this purpose. A binary logistic regression model is applied as the method of analysis. …”
    Get full text
    Article
  11. 511

    Populist Strategies in the Political Advertising Discourse of the French National Front by Rana N. Khoudary

    Published 2021-12-01
    “…At the core of their discourse lie binary conceptualisations constructing an in-group (the FN, the people) and an out-group (political individuals and entities, immigrants) in a scheme of opposition, typically attributing positive qualities to the former and negative values to the latter. …”
    Get full text
    Article
  12. 512

    Rapid method to identify expression vectors and tansgenic plants based on pBI121 plasmid by WANG Hua-xin, CAO Jia-shu, XIANG Xun, YU Xiao-lin, YE Wan-zhi

    Published 2008-03-01
    “…To screen rapidly positive clones, recombinant plant expression vectors constructed based on the binary vector pBI121, containing sense, antisense or RNA interference (RNAi) cassette respectively, were amplified by PCR with a universal primer pair designed according to the flank sequence of multiple clone site in pBI121, and PCR products with predicted sizes were further verified by digestion with the restriction enzyme BamHI. …”
    Get full text
    Article
  13. 513

    A Study on the Impact of Social Trust on Farmers’ Agricultural Waste Resource Utilization Behavior in the Context of Environmental Regulation Policy by Jianhua Wang, Ling Ma

    Published 2025-04-01
    “…The results show that social trust has a significant positive impact on farmers’ agricultural waste resource utilization behavior. …”
    Get full text
    Article
  14. 514

    Comparative analysis of data-driven models on detection and classification of electrical faults in transmission systems: Explainability, applicability and industrial implications by Chibueze D. Ukwuoma, Dongsheng Cai, Chiagoziem C. Ukwuoma, Chinedu I. Otuka, Qi Huang

    Published 2025-08-01
    “…Hence, a Quadratic Discriminant Analysis by Projection (QDA-P) model which effectively captures non-linear relationships between electrical fault features is proposed, enhancing classification accuracy, less computationally complex and explainable for both binary and multi-class scenarios. Using a publicly available simulated dataset generated through MATLAB Simulink to represent various fault types, the QDA-P model achieved binary classification scores of 0.988, 0.980, 0.982, 0.995, and 0.987 while recording a multi-class classification score of 0.982, 0.979, 0.982, 0.982, and 0.980 for accuracy, precision, specificity, recall, and F1-score, respectively. …”
    Get full text
    Article
  15. 515
  16. 516

    GNSS Anti-Multipath Technology of UAV for Geological Hazard Monitoring by FENG Jianhui, YANG Xiuzheng, MA Wenliang, SHEN Feng

    Published 2024-10-01
    “…A GNSS-based UAV anti-multipath technology for geological hazard monitoring is proposed to ensure the positioning capability of UAVs in complex environments. …”
    Get full text
    Article
  17. 517

    Evolutionary Search for Polynomial Lyapunov Functions: A Genetic Programming Method for Exponential Stability Certification by Roman Pykhnivskyi, Anton Ryzhov, Andrii Sobchuk, Yurii Kravchenko

    Published 2025-04-01
    “…In our formulation, these polynomial functions are represented as binary trees. The Lyapunov conditions for exponential stability are interpreted as a minimax optimization problem, using a carefully designed fitness metric to ensure positivity and dissipation within a chosen domain. …”
    Get full text
    Article
  18. 518

    Comparative analysis of convolutional neural networks and transformer architectures for breast cancer histopathological image classification by Bo Yuan, Yudie Hu, Yan Liang, Yutong Zhu, Lingyu Zhang, Shimin Cai, Rui Peng, Xianbin Wang, Zheng Yang, Jinhui Hu

    Published 2025-06-01
    “…Additionally, using foundation model encoders directly without fine-tuning resulted in generally poor performance on the classification task.ConclusionOur findings suggest that deep learning models are highly effective in classifying breast cancer pathology images, particularly in binary tasks where multiple models reach near-perfect performance. …”
    Get full text
    Article
  19. 519

    Examining the relationship between online distribution channels and tourist satisfaction and loyalty by Paula Antón Maraña, Julio César Puche Regaliza, Pablo Arranz Val, Santiago Aparicio Castillo

    Published 2023-07-01
    “…Although the Internet and e-commerce have contributed positively to the tourism sector, there is not much empirical research on the transformation of distribution channels or that considers the use of the Internet in travel planning as an antecedent of tourist satisfaction and loyalty. …”
    Get full text
    Article
  20. 520

    The Impact of International Migration on the Labor Market – A Case Study from Hungary by Judit Oláh, György Halasi, Zoltán Szakály, József Popp, Péter Balogh

    Published 2017-08-01
    “…Based on these questionnaires, two independent samples t-test, and one-way ANOVA, factor analysis and binary logistic regression procedures were performed. …”
    Get full text
    Article