Suggested Topics within your search.
Suggested Topics within your search.
-
6841
Self-regulation as a type of managerial activity.
Published 2017-06-01“…The comparison of self-regulation other types of regulation (such as state regulation and co-regulation) highlighted the essential features of this phenomenon and the place of self regulation in the system of public administration. …”
Get full text
Article -
6842
System of polarization autofluorescence diagnostics of biological layers with fuzzy logic of decision support
Published 2025-07-01“…The article considers a new approach to solving the problem of increasing the reliability of diagnostics of biological tissues based on a combination of azimuthally invariant polarization and fluorescence methods for diagnosing the structure of optically anisotropic tissue samples. …”
Get full text
Article -
6843
UX-MAPPER: An automated approach to analyze app store reviews with a focus on UX
Published 2025-01-01“…From the participants’ feedback, we defined a set of suggestions to extract more useful features, which can contribute to future studies involving user review analysis. …”
Get full text
Article -
6844
Learning a prior on regulatory potential from eQTL data.
Published 2009-01-01“…The extent to which the different features influence the regulatory potential is learned automatically, making Lirnet readily applicable to different datasets, organisms, and feature sets. …”
Get full text
Article -
6845
Child-Sum (N2E2N)Tree-LSTMs: An interactive Child-Sum Tree-LSTMs to extract biomedical event
Published 2024-12-01“…However, the original Child-Sum Tree-LSTMs ignores edge features during aggregating the sub-nodes hidden states. …”
Get full text
Article -
6846
Addressing cross-population domain shift in chest X-ray classification through supervised adversarial domain adaptation
Published 2025-04-01“…Adversarial training fine-tunes the feature extractor, making features from both domains indistinguishable, thereby creating domain-invariant features. …”
Get full text
Article -
6847
Pediatric burns and the leading factors of burn injury
Published 2022-04-01“…Objective: Burn trauma is an important health problem especially in children who are mostly the affected group as they are not fully capable of protecting themselves from injuries. …”
Get full text
Article -
6848
On expansions for nonlinear systems Error estimates and convergence issues
Published 2023-01-01“…In particular, intrinsic formulas allowing to decouple time-dependent features from geometry-dependent features of the solution have been extensively studied.First, we give a didactic review of classical expansions for formal linear differential equations, including the celebrated Magnus expansion (associated with coordinates of the first kind) and Sussmann’s infinite product expansion (associated with coordinates of the second kind). …”
Get full text
Article -
6849
Histopathological Image Analysis Using Deep Learning Framework
Published 2023-12-01“…Graph-segmented images retrieve relevant features. Using recursive feature removal, breast cancer photographs are categorized. …”
Get full text
Article -
6850
An Elderly-Oriented Form Design of Low-Speed New Energy Vehicles Based on Rough Set Theory and Support Vector Regression
Published 2024-08-01“…Second, the cars’ appearances are deconstructed by morphological analysis, and the key design features affecting elderly-oriented satisfaction are identified by a rough set attribute reduction algorithm. …”
Get full text
Article -
6851
Advancing Nighttime Object Detection through Image Enhancement and Domain Adaptation
Published 2024-09-01“…Due to the lack of annotations for nighttime low-light images, object detection in low-light images has always been a challenging problem. Achieving high-precision results at night is also an issue. …”
Get full text
Article -
6852
Responsiveness to the Context: Information–Task–Situation Decisional Strategies and Electrophysiological Correlates
Published 2025-03-01“…A total of 51 individuals performed a decision-making task that required participants to face real-life decision-making situations, during which an unexpected event prompted them to appraise the situation and rely on different sources of contextual features to make the best decision and manage the problem. …”
Get full text
Article -
6853
An attention-based loss function and synthetic minority oversampling technique for alleviating class imbalance in predicting diabetes
Published 2025-06-01“…(ii) A Swish activation function is deployed in the hidden layer of DB-Lite instead of Rectified Linear Unit (ReLU) to deal with the non-linear dependency of features with the final outcome. (iii) The synthetic minority oversampling technique (SMOTE) is used as a pre-processing technique to mitigate the class imbalance problem from the Pima dataset. …”
Get full text
Article -
6854
A UAV-Based Multi-Scenario RGB-Thermal Dataset and Fusion Model for Enhanced Forest Fire Detection
Published 2025-07-01“…A time-synchronized multi-scene, multi-angle aerial RGB-Thermal dataset (RGBT-3M) with “Smoke–Fire–Person” annotations and modal alignment via the M-RIFT method was constructed as a way to address the problem of data scarcity in wildfire scenarios. Finally, we propose a CP-YOLOv11-MF fusion detection model based on the advanced YOLOv11 framework, which can learn heterogeneous features complementary to each modality in a progressive manner. …”
Get full text
Article -
6855
Modern trends in chronic pain treatment with opioid analgetics
Published 2022-01-01“…It gives the information on the possibility and features of narcotic analgesics minimal dosages use for moderate pain control. …”
Get full text
Article -
6856
A Predictive Approach for Enhancing Accuracy in Remote Robotic Surgery Using Informer Model
Published 2025-05-01“…The method integrates the optimization problem into the Informer model by embedding constraints such as energy efficiency, smoothness, and robustness into its training process using a differentiable optimization layer. …”
Get full text
Article -
6857
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
6858
RP-DETR: end-to-end rice pests detection using a transformer
Published 2025-05-01“…In this regard, the paper introduces an effective rice pest detection framework utilizing the Transformer architecture, designed to capture long-range features. The paper enhances the original model by adding the self-developed RepPConv-block to reduce the problem of information redundancy in feature extraction in the model backbone and to a certain extent reduce the model parameters. …”
Get full text
Article -
6859
A dual-stream ordered topology-aware network for accurate fish counting in aquaculture environments
Published 2025-08-01“…These features are then aggregated via a dynamic restoration unit, effectively mitigating the long-tail problem caused by uneven fish distribution. …”
Get full text
Article -
6860
GTrans: Generic Knowledge Graph Embedding via Multi-State Entities and Dynamic Relation Spaces
Published 2018-01-01“…Eigenstate represents the features that an entity intrinsically owns, and mimesis expresses the features that are affected by associated relations. …”
Get full text
Article