Search alternatives:
method » methods (Expand Search)
Showing 1 - 20 results of 5,892 for search 'semantic method', query time: 0.12s Refine Results
  1. 1

    Semantic Security Methods for Software-Defined Networks by Ekaterina Ju. Antoshina, Dmitry Ju. Chalyy

    Published 2017-12-01
    “…The paper shows how this problem can be solved by using a semantic security model. We propose a method that allows us to construct semantics that captures necessary security properties the network must follow. …”
    Get full text
    Article
  2. 2

    The Semantic Reference Data Modelling Method: Creating Understandable, Reusable and Sustainable Semantic Data Models by George Bruseker, Nicola Carboni, Matthew Fielding, Denitsa Nenova, Thomas Hänsli

    Published 2025-03-01
    “…To address these challenges, this contribution presents the Semantic Reference Data Model (SRDM) modelling method, a protocol that offers a practical approach to (i) simplifying ontological complexity, (ii) standardising semantic patterns and (iii) facilitating the creation of new knowledge graphs. …”
    Get full text
    Article
  3. 3

    Information Content Methods for Semantic Similarity: An Experimental Assessment by Antonio de Nicola, Anna Formica, Ida Mele, Francesco Taglino

    Published 2025-01-01
    “…Although previous studies suggest that extensional methods outperform intensional ones, our findings reveal that both categories of methods can achieve strong performance in semantic similarity tasks. …”
    Get full text
    Article
  4. 4

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  5. 5
  6. 6

    Vector semantic computing method study for short sentence by Fu CHEN, Chuang LIN, Chao XUE, Yue-mei XU, Kun MENG, Yi-han NI

    Published 2016-02-01
    “…A vector semantic computing method study for short sentence based on artificial neural network was proposed. …”
    Get full text
    Article
  7. 7

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  8. 8
  9. 9

    An innovative semantically guided SAR imaging and target enhancement method by Guoru Zhou, Zhe Zhang, Bingchen Zhang, Yirong Wu

    Published 2024-12-01
    “…Abstract Conventional sparse synthetic aperture radar (SAR) imaging methods apply regularisation to constrain scene priors. …”
    Get full text
    Article
  10. 10

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  11. 11

    INVESTIGATION OF THE SUBJECT-SPATIAL ENVIRONMENT OF THE SCHOOL BY THE METHOD OF SEMANTIC DIFFERENTIAL by I. A. Vinogradova, E. V. Ivanova, O. V. Nesterova

    Published 2018-07-01
    “…Data processing was carried out using the mid-group analysis, cross-group relations, and cluster and regression analysis using the method of step selection. Student’s t-test, Cronbach’s Alpha and Pearson’s Correlation were applied to test reliability and validity of the method of semantic differential and the received results.Results and scientific novelty. …”
    Get full text
    Article
  12. 12

    METHOD OF BUILDING THE SEMANTIC NETWORK OF DISTRIBUTED SEARCH IN E-LEARNING by Nina Kuchuk, Roman Artiukh, Artem Nechausov

    Published 2017-11-01
    “…The method of synthesizing a decision tree and a stratified semantic network is suggested; this method enables considering them as closely interrelated ones in the context of distributed search in e-learning. …”
    Get full text
    Article
  13. 13

    Research on Semantic Driven Urban Pipeline Dataspace Construction Method by B. Li, L. Huo, Y. Yang, P. Bao, M. Zhang, Y. Li

    Published 2024-10-01
    “…To address this problem, this paper proposes a semantics-driven urban pipeline dataspace construction method, which aims to realize the efficient organization of pipeline data. …”
    Get full text
    Article
  14. 14

    A Comparison of Segmentation Methods for Semantic OctoMap Generation by Marcin Czajka, Maciej Krupka, Daria Kubacka, Michał Remigiusz Janiszewski, Dominik Belter

    Published 2025-06-01
    “…Instead of computationally demanding 3D segmentation of point clouds, we propose efficient segmentation on RGB images and projection of the corresponding LIDAR measurements on the semantic OctoMap. This study presents a comparative evaluation of different semantic segmentation methods and examines the impact of input image resolution on the accuracy of 3D semantic environment reconstruction, inference time, and computational resource usage. …”
    Get full text
    Article
  15. 15

    Spatial Semantic Expression of Terrain Viewshed: A Data Mining Method by Cheng Zhang, Yiwen Wang, Haozhe Cheng, Wanfeng Dou

    Published 2025-03-01
    “…Compared with traditional methods, the proposed method significantly improves the resolution of spatial semantic relationship expression and has practical application value in fields such as archaeology, tourism planning, and urban design.…”
    Get full text
    Article
  16. 16
  17. 17

    THE COMPLEX ANALYSIS METHOD OF SEMANTIC ASSOCIATIONS IN STUDYING THE STUDENTS’ CREATIVE ETHOS by P. A. Starikov

    Published 2015-03-01
    “…The paper demonstrates the sociological research findings concerning the students’ ideas of creativity based on the questionnaires and testing of the students of the natural science, humanities and technical profiles at Siberian Federal University over the period of 2007-2011.The author suggests a new method of semantic association analysis in order to identify the latent groups of notions related to the concept of creativity. …”
    Get full text
    Article
  18. 18

    A Knowledge and Semantic Fusion Method for Automatic Geometry Problem Understanding by Ying Wang, Wei Zhou, Yongsheng Rao, Hao Guan

    Published 2025-04-01
    “…This paper proposes a knowledge and semantic fusion method to achieve high-quality, interpretable, and scalable GPU. …”
    Get full text
    Article
  19. 19

    The pig pose recognition method based on pig body semantic segmentation by Nuonan Huang, Deli Zhu, Liang He, Yi Li

    Published 2025-12-01
    “…To address these challenges, this paper proposes a novel pig pose recognition method based on the semantic segmentation of pig body parts. …”
    Get full text
    Article
  20. 20

    CASSC: Context‐aware method for depth guided semantic scene completion by Jinghao Cao, Ming Li, Sheng Liu, Yang Li, Sidan Du

    Published 2024-12-01
    “…This paper presents CASSC, a novel adaptive context‐aware method based on Transformer networks, aimed at realizing camera‐based semantic scene completion algorithms. …”
    Get full text
    Article