Search alternatives:
transform » transport (Expand Search)
Showing 601 - 620 results of 6,775 for search 'different transform (method OR methods)', query time: 0.23s Refine Results
  1. 601

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  2. 602

    Dual-context enhanced knowledge representation learning method in hyper-relational knowledge graphs by Jiahang Li, Qilong Han, Dan Lu, Lijie Li

    Published 2025-07-01
    “…This operation addresses the issue that most methods neglect the learning of relation representations, with these methods typically updating using a parameter matrix without considering the crucial information within HKGs. …”
    Get full text
    Article
  3. 603

    Liver Semantic Segmentation Method Based on Multi-Channel Feature Extraction and Cross Fusion by Chenghao Zhang, Lingfei Wang, Chunyu Zhang, Yu Zhang, Peng Wang, Jin Li

    Published 2025-06-01
    “…However, due to the complex anatomical structure of the liver and significant inter-patient variability, the current methods exhibit notable limitations in feature extraction and fusion, which pose a major challenge to achieving accurate liver segmentation. …”
    Get full text
    Article
  4. 604

    A Small-Sample Scenario Optimization Scheduling Method Based on Multidimensional Data Expansion by Yaoxian Liu, Kaixin Zhang, Yue Sun, Jingwen Chen, Junshuo Chen

    Published 2025-06-01
    “…Therefore, this paper proposes a small-sample scenario optimization scheduling method based on multidimensional data expansion. Firstly, based on spatial correlation, the daily power curves of PV power plants with measured power are screened, and the meteorological similarity is calculated using multicore maximum mean difference (MK-MMD) to generate new energy output historical data of the target distributed PV system through the capacity conversion method; secondly, based on the existing daily load data of different types, the load historical data are generated using the stochastic and simultaneous sampling methods to construct the full historical dataset; subsequently, for the sample imbalance problem in the small-sample scenario, an oversampling method is used to enhance the data for the scarce samples, and the XGBoost PV output prediction model is established; finally, the optimal scheduling model is transformed into a Markovian decision-making process, which is solved by using the Deep Deterministic Policy Gradient (DDPG) algorithm. …”
    Get full text
    Article
  5. 605

    Application of the generalized point source method for solving boundary value problems of mathematical physics by Sergey Yu. Knyazev, Elena E. Shcherbakova

    Published 2017-06-01
    “…Materials and Methods . The proposed method is based on the transformation of the original mathematical physics equation to a simpler inhomogeneous equation with the known fundamental solution. …”
    Get full text
    Article
  6. 606

    Study on the stability of waste rock filling in goaf based on dynamic comprehensive analysis method by Gongyong Wu, Xingxin Nie, Linhai Zhao, Zongli Li

    Published 2024-12-01
    “…It specifically focused on an individual underground metal mine cavity by integrating numerical simulation analysis techniques with onsite displacement monitoring methods. By simulating stress-strain conditions during different stages of cavity formation and subsequent treatments while considering onsite displacement monitoring data, this study extensively analyzed how these treatments impact rock stress levels, strain conditions within rocks themselves, and the stability of the surface riverbed. …”
    Get full text
    Article
  7. 607

    Solving American Option Pricing Models by the Front Fixing Method: Numerical Analysis and Computing by R. Company, V. N. Egorova, L. Jódar

    Published 2014-01-01
    “…This paper presents an explicit finite-difference method for nonlinear partial differential equation appearing as a transformed Black-Scholes equation for American put option under logarithmic front fixing transformation. …”
    Get full text
    Article
  8. 608

    Studying the Effect of Stray Capacitance on the Measurement Accuracy of the CVT Based on the Boundary Element Method by Chuan Xiang, Xinwei Chen, Hongge Zhao, Zejun Ren, Guoqing Zhao

    Published 2021-01-01
    “…The capacitive voltage transformer (CVT) is a special measuring and protecting device, which is commonly applied in high-voltage power systems. …”
    Get full text
    Article
  9. 609

    A method for English paragraph grammar correction based on differential fusion of syntactic features. by Weiling Liu, Caijun Zhao, Yongyi Li, Chenglong Cai, Hong Liu, Ruilin Qiu, Ruoci Su, Bingbing Li

    Published 2025-01-01
    “…Firstly, the sentence vector representation is constructed by BERT, and then the syntactic structure is extracted by dependency parsing. Then carry out difference fusion analysis, measure the syntactic differences of adjacent sentences by cosine similarity, identify the significant differences caused by grammatical errors according to the preset threshold, lock the position and type of errors, and input the original sentence vector into the Seq2Seq model based on Transformer. …”
    Get full text
    Article
  10. 610

    A knowledge-embedded lossless image compressing method for high-throughput corrosion experiment by Peng Shi, Bin Li, Phyu Hnin Thike, Lianhong Ding

    Published 2018-01-01
    “…The key steps include similarity comparison, edge detection, coordinate transformation, and dictionary encoding. The method has been successfully applied into high-throughput corrosion experiment facility, a typical intelligent cyber-physical system. …”
    Get full text
    Article
  11. 611

    Finite Integration Method with Chebyshev Expansion for Shallow Water Equations over Variable Topography by Ampol Duangpan, Ratinan Boonklurb, Lalita Apisornpanich, Phiraphat Sutthimat

    Published 2025-08-01
    “…The method transforms partial differential equations into integral equations, approximates spatial terms via Chebyshev polynomials, and uses forward differences for time discretization. …”
    Get full text
    Article
  12. 612

    PECTIN THERAPY IS A METHOD OF PREVENTION OF REPRODUCTIVE LOSSES ASSOCIATED WITH INTRAPLACENTARY ACCUMULATION OF RADIONUCLIDES by А. Живецька- Денисова, І. Воробйова, Н. Скрипченко, Л. Лозова, О. Шамаєва, Н. Рудакова, С. Стрижак

    Published 2024-12-01
    “…Statistical data analysis was performed using Microsoft Excel (2016) and Fisher angular transformation. The difference between comparative values was considered significant at p < 0.05 (probability index greater than 95%). …”
    Get full text
    Article
  13. 613
  14. 614

    The Linear Stability of a Power-Law Liquid Film Flowing Down an Inclined Deformable Plane by Karim Ladjelate, Nadia Mehidi Bouam, Amar Djema, Abdelkader Belhenniche, Roman Chertovskih

    Published 2025-05-01
    “…To solve the linearized eigenvalue problem, the Riccati transformation method, which offers advantages over traditional techniques by avoiding the parasitic growth seen in the shooting method and eliminating the need for large-scale matrix eigenvalue computations, was used. …”
    Get full text
    Article
  15. 615

    AN EMPIRICAL ANALYSIS OF TRADITIONAL RECOGNITION METHODS USING EXAMPLES OF IDENTIFYING WORDS SPOKEN BY NATIVE SPEAKERS by Elchin Ismailov

    Published 2025-02-01
    “…To implement the task, classical DTW and DDTW methods, as well as methods based on the Fourier transform, discrete and continuous wavelet transforms are used. …”
    Get full text
    Article
  16. 616

    Synthesis and characterization of zeolite obtained from Toraja natural montmorillonite by Taba Paulina, Fauziah St., Natzir Hasnah, Soekamto Nunuk H., Sarungallo Rosalia S., Nahru Nur W., Astuti Yuli, Amin Ida I.

    Published 2025-01-01
    “…This work aims to synthesize zeolites using the hydrothermal method with aluminosilicate sources from Toraja natural minerals. …”
    Get full text
    Article
  17. 617

    An artificial intelligence and machine learning-driven CFD simulation for optimizing thermal performance of blood-integrated ternary nano-fluid by Mohib Hussain, Du Lin, Hassan Waqas, Qasem M. Al-Mdallal

    Published 2025-12-01
    “…Non-linear, coupled partial differential equations are transformed into ordinary differential equations with similarity scaling to characterize heat transfer and fluid flow, which are then numerically solved using the modified finite difference method (the Keller-Box method). …”
    Get full text
    Article
  18. 618

    A Comparative Study on Multiwavelet Construction Methods and Customized Multiwavelet Library for Mechanical Fault Detection by Jing Yuan, Chenjun Wei, Bo Zou, Jun Zhu, Ying Wei, Yanyang Zi, Yu Zhou

    Published 2015-01-01
    “…Customized multiwavelet methods and practices have continued to improve over the recent years, focused on two-scale similarity transform (TST), lifting transform (LT), and lifting scheme (LS). …”
    Get full text
    Article
  19. 619
  20. 620

    A Study on Instantaneous Time-Frequency Methods for Damage Detection of Nonlinear Moment-Resisting Frames by Ehsan Darvishan, Gholamreza Ghodrati Amiri, Pedram Ghaderi

    Published 2014-01-01
    “…First, several instantaneous time-frequency methods including Hilbert-Huang transform, direct quadrature, Teager energy operator, and higher-order energy operator are investigated as signal processing tools and the most appropriate method is selected using an outlier analysis. …”
    Get full text
    Article