Suggested Topics within your search.
Suggested Topics within your search.
-
8601
Analyzing the Spread of Informal Employment in Russia: Reasons, Forms and Spheres of Concentration
Published 2018-07-01“…One important problem of economy at the current stage of society development is the increase in proportion of informally employed population in the total amount of labour. …”
Get full text
Article -
8602
M. M. Tareev’s kenotic ecclesiology: an attempt at a reconstruction
Published 2023-12-01“…In other words, this problem appears in his extensive legacy as a problem of the correlation of content and form. …”
Get full text
Article -
8603
An Improved Phase Space Reconstruction Method-Based Hybrid Model for Chaotic Traffic Flow Prediction
Published 2022-01-01“…Secondly, to address the problem of insufficient learning ability of traditional convolutional combinatorial modeling for complex phase space laws of chaotic traffic flow, the high-dimensional phase space features are extracted using the layer-by-layer pretraining mechanism of convolutional deep belief networks (CDBNs), and the temporal features are extracted by combining with long short-term memory (LSTM). …”
Get full text
Article -
8604
Recurrent neural network consisting of FitzHugh–Nagumo systems: characteristics required for training
Published 2025-07-01“…During training, the problem of which neuron should be activated and with what strength of lagged feedback was solved. …”
Get full text
Article -
8605
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01“…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
Get full text
Article -
8606
CLASSIFICATION OF LEARNING MANAGEMENT SYSTEMS
Published 2016-11-01“…This creates the problem of choosing the best system. This problem is partly due to the lack of comprehensive classification of such systems. …”
Get full text
Article -
8607
Vehicle Detection and Shape Refinement Based on LiDAR
Published 2022-12-01“…In order to solve this problem, this paper proposes a vehicle shape optimization algorithm based on point cloud cluster features, the proposed algorithm outputs vehicle detection results with PointPillars target detection algorithm. …”
Get full text
Article -
8608
Optimal and suboptimal protocols for a mathematical model for tumor anti-angiogenesis in combination with chemotherapy
Published 2011-03-01“…This gives credence toa modeling approach that starts with the analysis of simplifiedmodels and then adds increasingly more complex and medicallyrelevant features. Furthermore, for each of the problem formulationsconsidered here, there exist excellent simple piecewise constantcontrols with a small number of switchings that virtually replicatethe optimal values for the objective.…”
Get full text
Article -
8609
A Local–Global Graph KAN for Multi‐Class Prediction of PPI
Published 2025-05-01“…Therefore, using machine learning to treat multiple PPI predictions as binary classifications has become an alternative, but there is a problem of data imbalance. The proposed GLGKAN‐PPI method integrates features from both global graphs and local subgraphs to capture the complex structural information of PPI networks comprehensively. …”
Get full text
Article -
8610
Recognition Algorithm of AE Signal of Rock Fracture Based on Multiscale 1DCNN-BLSTM
Published 2024-01-01“…In response to the interference characteristics of acoustic emission signal data, a multiscale one-dimensional convolutional neural network embedded with efficient channel attention (ECA) module was incorporated into the model, and multiscale convolutional kernels were used to extract features of different levels of precision. In the latter half of the model, the BLSTM network was incorporated to extract time series-related features, local spatial uncorrelated features, and weak periodic pattern features from the acoustic emission signal data. …”
Get full text
Article -
8611
К вопросу о сущности понятия «интеллектуальные услуги»
Published 2020-01-01“…There is the author's interpretation of knowledge intensive services, which can solve the problem of ambiguity in understanding of the definition in this industry. …”
Get full text
Article -
8612
The struggle for abolition of use of customary law in volost courts of Russian Empire at turn of the XIX–XX centuries
Published 2021-02-01“…For the first time, the author shows the features of approaches to the studied problem, identified in the materials of the periodical press and provincial committees of the Special Comission on the needs of the agricultural industry. …”
Get full text
Article -
8613
3D Imaging of Buried Dielectric Targets with a Tomographic Microwave Approach Applied to GPR Synthetic Data
Published 2013-01-01“…The selected tomographic results illustrate the aptitude of the proposed approach to recover the fundamental features of the targets even with critical GPR settings.…”
Get full text
Article -
8614
The red eye
Published 2013-02-01“…The red eye is a clinical problem that is encountered regularly in most primary healthcare settings. …”
Get full text
Article -
8615
Research on new energy station network security assessment method based on improved LSTM network
Published 2024-10-01“…Finally, important features were input into the long short-term memory network, and attention mechanisms were used to adaptively allocate data time and features, strengthening the emphasis on important time and features in network traffic, thereby improving the accuracy of the model for network security assessment. …”
Get full text
Article -
8616
Levels of Representation of the Computing Process and Workload on LAN
Published 2017-06-01“…Classification of types of workload is presented. A solution to the problem of the rigid dependence of the research results on the features of the architecture of the applied equipment is proposed.…”
Get full text
Article -
8617
Structural synthesis of terminal control using acceleration energy
Published 2015-12-01“…Considerations of the system physical features in the form of its invariants allow advancing in the solution of the problem of terminal control structural synthesis. …”
Get full text
Article -
8618
Models and numerical methods of dynamic optimization of the financial portfolio of a non-institutional investor
Published 2020-01-01“…An original numerical method for solving a discrete dynamic problem of large dimension is presented, based on a purposeful search of the basic solutions of the corresponding continuous problem and subsequent local optimization of its quasi-optimal solution.…”
Get full text
Article -
8619
Robustness of topological persistence in knowledge distillation for wearable sensor data
Published 2024-12-01“…To address this problem, knowledge distillation (KD) is utilized to generate a small model and accommodate topological features with persistence image (PI) representations from the raw time series data. …”
Get full text
Article -
8620
THE ESSENCE AND CAUSES OF THE ENTERPRISE DEVELOPMENT CRISIS
Published 2017-02-01“…The article considers the features of management during a crisis, as the organizational development background. …”
Get full text
Article