Showing 6,501 - 6,520 results of 11,103 for search 'features problems', query time: 0.14s Refine Results
  1. 6501

    Attention-CARU With Texture-Temporal Network for Video Depth Estimation by Sio-Kei Im, Ka-Hou Chan

    Published 2025-01-01
    “…RNN-based encoder-decoder architectures are the most commonly used methods for depth feature prediction, but recurrent operators have limitations of large-scale perspective from global information and also face the long-term dependency problem, which often leads to inaccurate prediction of object depth in complex scenes. …”
    Get full text
    Article
  2. 6502

    Selection of Unmanned Aerial Vehicles by Using Multicriteria Decision-Making for Defence by Mustafa Hamurcu, Tamer Eren

    Published 2020-01-01
    “…These vehicles have been winning more features together with developing technology in todays world. …”
    Get full text
    Article
  3. 6503

    Expert Component as Element of Content Strategy of Industrial Enterprise by V. A. Malaichuk

    Published 2022-06-01
    “…Internet marketing in the industrial market has a number of features and differs from that in the consumer market. …”
    Get full text
    Article
  4. 6504

    Traditions of F.M. Dostoevsky in Story of G. Böll “Burning” by L. A. Melnikova

    Published 2022-01-01
    “…The features of G. Böll’s comprehension of the problem of “humiliated and insulted” heroes in the story “The Burning Ones” are analyzed in the context of the literary influence on this work of the novel by F.M. …”
    Get full text
    Article
  5. 6505

    The α2-Adrenoceptor Agonist Dexmedetomidine in Current Sedation Practice by I. A. Kozlov

    Published 2013-04-01
    “…The problem of sedation in intensive care units has obvious scientific-and-practical relevance. …”
    Get full text
    Article
  6. 6506

    Improvement in low-homology template-based modeling by employing a model evaluation method with focus on topology. by Wentao Dai, Tingrui Song, Xuan Wang, Xiaoyang Jin, Lizong Deng, Aiping Wu, Taijiao Jiang

    Published 2014-01-01
    “…Our novel method focuses on evaluating the topology by using two novel groups of features. These novel features included secondary structure element (SSE) contact information and 3-dimensional topology information. …”
    Get full text
    Article
  7. 6507

    THE ROLE OF EDUCATIONAL PROJECTS IN THE FORMATION OF SCIENTIFIC WORK SKILLS by O. V. Zadorozhnaya

    Published 2016-12-01
    “…Scientific novelty consists in the development of a technology to create and perform mathematical training projects. The features of the mathematical analysis and the possibility of formation of skills of scientific work using project activities are demonstrated.Practical significance. …”
    Get full text
    Article
  8. 6508

    Formation of legal awareness of professional competence as a component of pharmaceutical workers in the European Union (Czech experience) by I. M. Alyeksyeyeva, M. S. Ponomarenko, O. G. Aleksyeyev, A .S. Solovyov, Yu. M. Grygoruk

    Published 2016-08-01
    “…To study the experience of countries that have already passed this way, to analyze the advantages and features that distinguish modern European education policy. …”
    Get full text
    Article
  9. 6509

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  10. 6510

    Smooth pursuit and visual occlusion: active inference and oculomotor control in schizophrenia. by Rick A Adams, Laurent U Perrinet, Karl Friston

    Published 2012-01-01
    “…Our model appeals to a single principle--the minimisation of variational free energy--to provide Bayes optimal solutions to the smooth pursuit problem. However, it tries to accommodate the cardinal features of smooth pursuit of partially occluded targets that have been observed empirically in normal subjects and schizophrenia. …”
    Get full text
    Article
  11. 6511

    Based on PCA and SSA-LightGBM oil-immersed transformer fault diagnosis method. by Jizhong Wang, Jianfei Chi, Yeqiang Ding, Haiyan Yao, Qiang Guo

    Published 2025-01-01
    “…The feature matrix is then standardized to obtain joint features. …”
    Get full text
    Article
  12. 6512

    Methodical approach to consideration of the financial system of Ukraine and its restructuring in crisis conditions by S.M. Frolov, F.B. Shukairi, Ye.S. Kozmenko

    Published 2020-06-01
    “…The growing influence of the financial system (hereinafter referred to as FS) on all economic processes is one of the critical features of contemporary development, both globally and nationally. …”
    Get full text
    Article
  13. 6513

    Settlement early warning method for high speed railway subgrades based on TD Transformer by Wen Kebing, Liang Qinghuai

    Published 2025-06-01
    “…Firstly, we utilize temporal-spatial enhanced attention (TSEA) for feature extraction from high-speed railway settlement data, effectively resolving the problem of vague features post-extraction. …”
    Get full text
    Article
  14. 6514

    Jumping knowledge graph attention network for resource allocation in wireless cellular system by Qiushi Sun, Zhou Fang, Yin Li, Ovanes Petrosian

    Published 2025-05-01
    “…Abstract Next-generation wireless networks are characterized by two essential features: ubiquitous connectivity and high-speed data transmission. …”
    Get full text
    Article
  15. 6515

    TGF-Net: Transformer and gist CNN fusion network for multi-modal remote sensing image classification. by Huiqing Wang, Huajun Wang, Linfen Wu

    Published 2025-01-01
    “…This enables the extraction of distinct as well as common features. Meanwhile, the transformer-based spectral feature extraction module (TSFEM) was designed by combining the different characteristics of remote sensing images and considering the problem of orderliness of the sequence between hyperspectral image (HSI) channels. …”
    Get full text
    Article
  16. 6516

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  17. 6517

    Improving long‐tail classification via decoupling and regularisation by Shuzheng Gao, Chaozheng Wang, Cuiyun Gao, Wenjian Luo, Peiyi Han, Qing Liao, Guandong Xu

    Published 2025-02-01
    “…However, one crucial aspect overlooked by previous research studies is the imbalanced feature space problem caused by the imbalanced angle distribution. …”
    Get full text
    Article
  18. 6518

    Automatic determination of semantic similarity of student answers with the standard one using modern models by Nadezhda S. Lagutina, Ksenia V. Lagutina, Vladislav N. Kopnin

    Published 2024-06-01
    “…However, the most interesting achievement was the use of vectors of stylometric features of the text, which showed 80% F-measure for the custom corpus and the same quality of problem solving as neural network models for another corpus.…”
    Get full text
    Article
  19. 6519

    VOLODYMYR VINNICHENKO’S NOVEL “THE NEW COMMANDMENT”: POETICS AND FORMS OF EXISTENTIAL SELF-REFLECTION by Galyna M. Syvachenko. Shevchenko, Antonina V. Anistratenko

    Published 2023-05-01
    “…The set of goals determines the need to use hermeneutical (analysis of artistic text), comparative-typological (comparison of philosophical novel various functions), historical-literary (solution of a number of literary problems in the context of various national literatures) research methods. …”
    Get full text
    Article
  20. 6520

    Presentation of Financial Assets in Russian Macroeconomic Statistics by V. N. Salin, M. V. Vakhrameeva, O. Yu. Sitnikova

    Published 2021-10-01
    “…The quality of primary accounting data on financial sector operations has improved significantly recently, but there are still problems with obtaining data in terms of the full coverage of the statistical aggregate under study, as well as the timing of obtaining reporting data. …”
    Get full text
    Article