Suggested Topics within your search.
Suggested Topics within your search.
- Enterprise application integration (Computer systems) 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Management information systems 1
- Mass media 1
- Mass media and technology 1
- Philosophy 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- Study and teaching 1
- Technological innovations 1
-
161
DSMF-Net: Dual Semantic Metric Learning Fusion Network for Few-Shot Aerial Image Semantic Segmentation
Published 2025-01-01“…Semantic segmentation of aerial images is crucial yet resource-intensive. …”
Get full text
Article -
162
Beyond Green’s Functions: Inverse Helmholtz and “Om” <inline-formula><math display="inline"><semantics><mrow><mi mathvariant="normal">ॐ</mi></mrow></semantics></math></inline-formula>-Potential Methods for Macroscopic Electromagnetism in Isotropy-Broken Media
Published 2025-06-01“…In this manuscript, we lay out a path to the solution of macroscopic Maxwell’s equations for distributed sources, bypassing GFM by introducing an inverse approach and a method based on “Om” <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="normal">ॐ</mi></mrow></semantics></math></inline-formula>-potential, which we describe here. …”
Get full text
Article -
163
-
164
Methods Used in Forensic Linguistic Analysis
Published 2016-03-01Subjects: “…method of linguistic expertise…”
Get full text
Article -
165
Research on RAG-Based Cognitive Large Language Model Training Method for Power Standard Knowledge
Published 2025-06-01“…This paper proposes a knowledge graph retrieval-enhanced training method for large language models (LLMs). By leveraging a pre-trained language model (PLM), highly similar subgraphs are retrieved from the electrical standards knowledge graph. …”
Get full text
Article -
166
A high-precision segmentation method based on UNet for disc cutter holder of shield machine
Published 2025-07-01Get full text
Article -
167
APPLICATION OF DATA ANALYSIS METHODS FOR AUTOMATION OF ONTOLOGY FORMATION
Published 2018-06-01“…The aim of this work is to develop methods for automated text analysis and the retrieval of relevant data from full-text documents, as well as applying semantic text analysis methods for using linguistic ontologies as formalised models of subject area representation. …”
Get full text
Article -
168
A Review of Intrusion Detection for Railway Perimeter Using Deep Learning-Based Methods
Published 2024-01-01“…With the development of computer vision, researchers have been actively exploring methods for detecting foreign object intrusion via image recognition technology. …”
Get full text
Article -
169
THE NEURAL NETWORK METHOD CLASSIFICATION OF LITERARY TEXT FROM THE VIEWPOINT OF ITS GENRE IDENTIFICATION
Published 2022-10-01Get full text
Article -
170
Methods for Domain Specification of Verification-Oriented Process Ontology
Published 2019-12-01“…The constructive method uses semantic markup and pattern matching techniques to link sublect fields with classes of the abstract process ontology. …”
Get full text
Article -
171
Non-specialized means of causative semantics expression in the Slavic and Germanic languages (based on the lexical semantic group of defense and protection)
Published 2021-10-01“…It works towards resolving a controversial causativity theory issue about the scope and boundaries of causative verbs class, as well as helps to reveal some internal laws of the causative category development (gradual nature of the causative category). The following methods were used: contextual, transformational, comparative methods; dictionary definitions analysis, component and distributive analysis. …”
Get full text
Article -
172
A Method of Smoke Area Segmentation for Infrared Images Based on Deep Learning
Published 2019-01-01Get full text
Article -
173
An autonomous navigation method for field phenotyping robot based on ground-air collaboration
Published 2025-12-01“…The proposed method employs a UAV equipped with a Real-Time Kinematic (RTK) module for the construction of high-precision Field maps. …”
Get full text
Article -
174
Principles and Methods for Describing Social Vocabulary in the Ideographic Dictionary
Published 2017-10-01“…On the example of the analysis of the nomination banderovets ( Banderaers ), the logic of the formation of new meanings of words not previously fixed by dictionaries and the creation of dictionary articles for the ideographic dictionary is justified. Application of methods of semantic, classificatory, linguistic-statistical, contextual, definitional analysis is demonstrated and also the method of ideographic reconstruction of nominative sets is partially presented.…”
Get full text
Article -
175
Enhancing Word Embeddings for Improved Semantic Alignment
Published 2024-12-01“…This study introduces a method for the improvement of word vectors, addressing the limitations of traditional approaches like Word2Vec or GloVe through introducing into embeddings richer semantic properties. …”
Get full text
Article -
176
TRANSLATION STRATEGIES IN ENGLISH-UKRAINIAN RENDERING OF DUAL-NUMBER QUANTIFI
Published 2024-06-01Subjects: Get full text
Article -
177
Road scene map for autonomous driving and modeling method
Published 2025-08-01“…Building on cartographic principles, we propose the concept of a road scene map along with its modeling method that incorporates dynamic/static traffic elements with geometric/semantic features. …”
Get full text
Article -
178
Programmable semantic parsing approach for mimic arbitration
Published 2020-04-01“…Aiming at the application of mimic arbitration,a programmable semantic parsing approach for mimic arbitration was proposed.Based on the idea of matching lookup table,this method could achieve custom protocol parsing through domain pointer configuration,and solve the problem of programmable protocol parsing for different protocols.By adopting pipeline control method,the congestion free in the procedure of protocol parsing was guaranteed and the performance of protocol parsing was improved.By introducing Hash operation,the complexity of semantic reordering design of sub-packages was simplified.The performance analysis results show that this approach has the characteristics of high flexibility protocol parsing,high processing capacity and low resource utilization.…”
Get full text
Article -
179
GBSS:researches on group-based semantic search
Published 2006-01-01“…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
Get full text
Article -
180
GBSS:researches on group-based semantic search
Published 2006-01-01“…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
Get full text
Article