Suggested Topics within your search.
Suggested Topics within your search.
-
5381
Performance Analysis of an Optimized ANN Model to Predict the Stability of Smart Grid
Published 2022-01-01“…Different machine learning (ML) and deep learning (DL) models can be used to tackle the problem of stability prediction for the energy grid. …”
Get full text
Article -
5382
Research on pose estimation algorithm of non-cooperative target tracked vehicles based on PnP model
Published 2025-03-01“…To address the pose estimation problem of non-cooperative tracked vehicles, this study proposes a non-iterative Perspective-n-Point (PnP) method. …”
Get full text
Article -
5383
Research on the Uyghur morphological segmentation model with an attention mechanism
Published 2022-12-01“…As a typical agglutinative language, Uyghur usually uses statistical-based methods in canonical segmentation, which relies on the artificial extraction of features. In surface segmentation, the artificial feature extraction process is avoided by using the neural network. …”
Get full text
Article -
5384
Drug Users and Cannabis
Published 2020-06-01“…Drug abuse is a major social problem faced by all countries. From the past to the present, although there are many different drugs, some have a more important place than others. …”
Get full text
Article -
5385
The Biographizme as a Factor of the Genre Creation (In the Material of the Lesia Ukrainka’s Works)
Published 2014-11-01“…The main attention in the research is concentrated in the analyses of work “The Winter Night in a the Foreign Country”, in which the author by the … person (Muse) mediation and the lyrical I is decide the existence problem. As a result the scientific work is ascertain, that lyrical person (what has named herself Lesia Ukrainka) can’t describe her feelings in this mode. …”
Get full text
Article -
5386
THE HISTORY OF THE STUDY OF NATURE AND ANIMAL POPULATION IN THE PRE-CAUCASUS IN THE XIX - THE BEGINNING OF THE XX CENTURIES
Published 2021-09-01“…The article highlights the problem of studying the animal population and the nature of Ciscaucasia in the 19th - early 20th centuries. …”
Get full text
Article -
5387
Improving the Solution of Least Squares Support Vector Machines with Application to a Blast Furnace System
Published 2012-01-01“…The MINRES method-based LS-SVM can effectively perform feature reduction and model selection simultaneously, so it is a practical tool for the silicon trend prediction task.…”
Get full text
Article -
5388
Pedagogical Dominant of Renaissance Reflective Discourse: Michel Montaigne’s Concept of Developmental Teaching and Education
Published 2023-01-01“…A feature of the chosen research problem is the consideration of the text corpus of the historical personality of the 16th century from the point of view of reflexive discourse representation. …”
Get full text
Article -
5389
A hybrid Bi-LSTM and RBM approach for advanced underwater object detection.
Published 2024-01-01“…The model benefits from effective feature learning, aided by RBMs that enable the extraction of hierarchical and abstract representations. …”
Get full text
Article -
5390
Business-Model of the Organization in Economy of Knowledge
Published 2018-12-01“…University activity as a business organization has always had certain distinguishing features. These features imply, first of all, that future specialist during the whole period of training acts both as a key resource and a customer and, finally as a value offer. …”
Get full text
Article -
5391
Settlement early warning method for high speed railway subgrades based on TD Transformer
Published 2025-06-01“…Firstly, we utilize temporal-spatial enhanced attention (TSEA) for feature extraction from high-speed railway settlement data, effectively resolving the problem of vague features post-extraction. …”
Get full text
Article -
5392
Decentralized Control of a Group of Homogeneous Vehicles in Obstructed Environment
Published 2016-01-01“…During control and path planning the obstacles are transformed into repellers by the synthesized controls. The main feature distinguishing the developed approach from the potential fields method is that the vehicle moves in the fields of forces depending not only on the mutual positions of a robot and an obstacle but also on the additional variables allowing solving the problem of robot’s path planning using a distributed control system (Pshikhopov and Ali, 2011). …”
Get full text
Article -
5393
Automatic Detection of Motorcycle on the Road using Digital Image Processing
Published 2019-12-01“…One of them is traffic accidents on motorcyclist not wearing helmets. To overcome this problem, several researchers have developed detection system of motorcyclist not wear helmet. …”
Get full text
Article -
5394
Hegel’s Theory of Time
Published 2024-12-01“…While sharing some features in common with presentist accounts of time, Hegel’s theory of time fundamentally offers an alternative to standard A-Theories, B-Theories, and C-Theories of time. …”
Get full text
Article -
5395
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
5396
Preliminary Design of Debris Removal Missions by Means of Simplified Models for Low-Thrust, Many-Revolution Transfers
Published 2012-01-01“…This paper presents a novel approach for the preliminary design of Low-Thrust, many-revolution transfers. The main feature of the novel approach is a considerable reduction in the control parameters and a consequent gain in computational speed. …”
Get full text
Article -
5397
There Search of LS-SVM Based on LMD Morphology Filter
Published 2022-02-01“…Lagrange parameters were weighted by feature weighting method, and their weighted average value was taken as the threshold of pruning method to reduce the sparsity. …”
Get full text
Article -
5398
REGULATORY FUNDAMENTALS FOR IMPLEMENTATION OF INFORMATION TECHNOLOGY PROJECTS IN INDUSTRY
Published 2016-10-01Get full text
Article -
5399
The dualistic legal nature of the contract for the performance of development work
Published 2024-03-01“…The article outlines the main features of the contract for the implementation of R&D, different points of view on the definition of the legal nature of this type of contract. …”
Get full text
Article -
5400
The Parameters Estimation for a PM2.5 Transport Model with the Adjoint Method
Published 2016-01-01“…To reduce the ill-posedness of the inverse problem, an independent point scheme (IPS) is implemented during the estimation process. …”
Get full text
Article