Search alternatives:
feature » features (Expand Search)
Showing 8,601 - 8,620 results of 11,103 for search 'feature problems', query time: 0.19s Refine Results
  1. 8601

    Analyzing the Spread of Informal Employment in Russia: Reasons, Forms and Spheres of Concentration by M. I. Glinskaya

    Published 2018-07-01
    “…One important problem of economy at the current stage of society development is the increase in proportion of informally employed population in the total amount of labour. …”
    Get full text
    Article
  2. 8602

    M. M. Tareev’s kenotic ecclesiology: an attempt at a reconstruction by Artem Malyshev

    Published 2023-12-01
    “…In other words, this problem appears in his extensive legacy as a problem of the correlation of content and form. …”
    Get full text
    Article
  3. 8603

    An Improved Phase Space Reconstruction Method-Based Hybrid Model for Chaotic Traffic Flow Prediction by Yue Hou, Da Li, Di Zhang, Zhiyuan Deng

    Published 2022-01-01
    “…Secondly, to address the problem of insufficient learning ability of traditional convolutional combinatorial modeling for complex phase space laws of chaotic traffic flow, the high-dimensional phase space features are extracted using the layer-by-layer pretraining mechanism of convolutional deep belief networks (CDBNs), and the temporal features are extracted by combining with long short-term memory (LSTM). …”
    Get full text
    Article
  4. 8604

    Recurrent neural network consisting of FitzHugh–Nagumo systems: characteristics required for training by Semenova, Nadezhda Igorevna

    Published 2025-07-01
    “…During training, the problem of which neuron should be activated and with what strength of lagged feedback was solved. …”
    Get full text
    Article
  5. 8605

    Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU

    Published 2022-07-01
    “…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
    Get full text
    Article
  6. 8606

    CLASSIFICATION OF LEARNING MANAGEMENT SYSTEMS by Yu. B. Popova

    Published 2016-11-01
    “…This creates the problem of choosing the best system. This problem is partly due to the lack of comprehensive classification of such systems. …”
    Get full text
    Article
  7. 8607

    Vehicle Detection and Shape Refinement Based on LiDAR by YU An, HU Dongfang, WANG Xuepeng, ZHANG Jin, ZHOU Yan, XIE Guotao, QIN Xiaohui, HU Manjiang

    Published 2022-12-01
    “…In order to solve this problem, this paper proposes a vehicle shape optimization algorithm based on point cloud cluster features, the proposed algorithm outputs vehicle detection results with PointPillars target detection algorithm. …”
    Get full text
    Article
  8. 8608

    Optimal and suboptimal protocols for a mathematical model for tumor anti-angiogenesis in combination with chemotherapy by Urszula Ledzewicz, Helmut Maurer, Heinz Schättler

    Published 2011-03-01
    “…This gives credence toa modeling approach that starts with the analysis of simplifiedmodels and then adds increasingly more complex and medicallyrelevant features. Furthermore, for each of the problem formulationsconsidered here, there exist excellent simple piecewise constantcontrols with a small number of switchings that virtually replicatethe optimal values for the objective.…”
    Get full text
    Article
  9. 8609

    A Local–Global Graph KAN for Multi‐Class Prediction of PPI by Minghui Liu, Ying Qu

    Published 2025-05-01
    “…Therefore, using machine learning to treat multiple PPI predictions as binary classifications has become an alternative, but there is a problem of data imbalance. The proposed GLGKAN‐PPI method integrates features from both global graphs and local subgraphs to capture the complex structural information of PPI networks comprehensively. …”
    Get full text
    Article
  10. 8610

    Recognition Algorithm of AE Signal of Rock Fracture Based on Multiscale 1DCNN-BLSTM by Weihua Wang

    Published 2024-01-01
    “…In response to the interference characteristics of acoustic emission signal data, a multiscale one-dimensional convolutional neural network embedded with efficient channel attention (ECA) module was incorporated into the model, and multiscale convolutional kernels were used to extract features of different levels of precision. In the latter half of the model, the BLSTM network was incorporated to extract time series-related features, local spatial uncorrelated features, and weak periodic pattern features from the acoustic emission signal data. …”
    Get full text
    Article
  11. 8611

    К вопросу о сущности понятия «интеллектуальные услуги»

    Published 2020-01-01
    “…There is the author's interpretation of knowledge intensive services, which can solve the problem of ambiguity in understanding of the definition in this industry. …”
    Get full text
    Article
  12. 8612

    The struggle for abolition of use of customary law in volost courts of Russian Empire at turn of the XIX–XX centuries by O. V. Kalyuzhnaya

    Published 2021-02-01
    “…For the first time, the author shows the features of approaches to the studied problem, identified in the materials of the periodical press and provincial committees of the Special Comission on the needs of the agricultural industry. …”
    Get full text
    Article
  13. 8613

    3D Imaging of Buried Dielectric Targets with a Tomographic Microwave Approach Applied to GPR Synthetic Data by Alessandro Galli, Davide Comite, Ilaria Catapano, Gianluca Gennarelli, Francesco Soldovieri, Elena Pettinelli

    Published 2013-01-01
    “…The selected tomographic results illustrate the aptitude of the proposed approach to recover the fundamental features of the targets even with critical GPR settings.…”
    Get full text
    Article
  14. 8614

    The red eye by N. du Toit, L. van Zyl

    Published 2013-02-01
    “…The red eye is a clinical problem that is encountered regularly in most primary healthcare settings. …”
    Get full text
    Article
  15. 8615

    Research on new energy station network security assessment method based on improved LSTM network by LIU Shan, LI Rui, WANG Yao

    Published 2024-10-01
    “…Finally, important features were input into the long short-term memory network, and attention mechanisms were used to adaptively allocate data time and features, strengthening the emphasis on important time and features in network traffic, thereby improving the accuracy of the model for network security assessment. …”
    Get full text
    Article
  16. 8616

    Levels of Representation of the Computing Process and Workload on LAN by O. M. Demidenko

    Published 2017-06-01
    “…Classification of types of workload is presented. A solution to the problem of the rigid dependence of the research results on the features of the architecture of the applied equipment is proposed.…”
    Get full text
    Article
  17. 8617

    Structural synthesis of terminal control using acceleration energy by Andrey A. Kostoglotov, Sergey V. Lazarenko, Anton A. Kuznetsov, Vitaly A. Losev

    Published 2015-12-01
    “…Considerations of the system physical features in the form of its invariants allow advancing in the solution of the problem of terminal control structural synthesis. …”
    Get full text
    Article
  18. 8618

    Models and numerical methods of dynamic optimization of the financial portfolio of a non-institutional investor by D. A. Bystrova

    Published 2020-01-01
    “…An original numerical method for solving a discrete dynamic problem of large dimension is presented, based on a purposeful search of the basic solutions of the corresponding continuous problem and subsequent local optimization of its quasi-optimal solution.…”
    Get full text
    Article
  19. 8619

    Robustness of topological persistence in knowledge distillation for wearable sensor data by Eun Som Jeon, Hongjun Choi, Ankita Shukla, Yuan Wang, Matthew P. Buman, Hyunglae Lee, Pavan Turaga

    Published 2024-12-01
    “…To address this problem, knowledge distillation (KD) is utilized to generate a small model and accommodate topological features with persistence image (PI) representations from the raw time series data. …”
    Get full text
    Article
  20. 8620

    THE ESSENCE AND CAUSES OF THE ENTERPRISE DEVELOPMENT CRISIS by Е. В. Садченко

    Published 2017-02-01
    “…The article considers the features of management during a crisis, as the organizational development background. …”
    Get full text
    Article