Search alternatives:
method » methods (Expand Search)
Showing 161 - 180 results of 5,892 for search 'semantic method', query time: 0.12s Refine Results
  1. 161

    DSMF-Net: Dual Semantic Metric Learning Fusion Network for Few-Shot Aerial Image Semantic Segmentation by Xiyu Qi, Yidan Zhang, Lei Wang, Yifan Wu, Yi Xin, Zhan Chen, Yunping Ge

    Published 2025-01-01
    “…Semantic segmentation of aerial images is crucial yet resource-intensive. …”
    Get full text
    Article
  2. 162

    Beyond Green’s Functions: Inverse Helmholtz and “Om” <inline-formula><math display="inline"><semantics><mrow><mi mathvariant="normal">ॐ</mi></mrow></semantics></math></inline-formula>-Potential Methods for Macroscopic Electromagnetism in Isotropy-Broken Media by Maxim Durach

    Published 2025-06-01
    “…In this manuscript, we lay out a path to the solution of macroscopic Maxwell’s equations for distributed sources, bypassing GFM by introducing an inverse approach and a method based on “Om” <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="normal">ॐ</mi></mrow></semantics></math></inline-formula>-potential, which we describe here. …”
    Get full text
    Article
  3. 163
  4. 164

    Methods Used in Forensic Linguistic Analysis by O. V. Kukushkina

    Published 2016-03-01
    Subjects: “…method of linguistic expertise…”
    Get full text
    Article
  5. 165

    Research on RAG-Based Cognitive Large Language Model Training Method for Power Standard Knowledge by Sai Zhang, Xiaoxuan Fan, Bochuan Song, Xiao Liang, Qiang Zhang, Zhihao Wang, Bo Zhang

    Published 2025-06-01
    “…This paper proposes a knowledge graph retrieval-enhanced training method for large language models (LLMs). By leveraging a pre-trained language model (PLM), highly similar subgraphs are retrieved from the electrical standards knowledge graph. …”
    Get full text
    Article
  6. 166
  7. 167

    APPLICATION OF DATA ANALYSIS METHODS FOR AUTOMATION OF ONTOLOGY FORMATION by O. N. Yurkova

    Published 2018-06-01
    “…The aim of this work is to develop methods for automated text analysis and the retrieval of relevant data from full-text documents, as well as applying semantic text analysis methods for using linguistic ontologies as formalised models of subject area representation. …”
    Get full text
    Article
  8. 168

    A Review of Intrusion Detection for Railway Perimeter Using Deep Learning-Based Methods by Jin Wang, Hongyang Zhai, Yang Yang, Niuqi Xu, Hao Li, Di Fu

    Published 2024-01-01
    “…With the development of computer vision, researchers have been actively exploring methods for detecting foreign object intrusion via image recognition technology. …”
    Get full text
    Article
  9. 169
  10. 170

    Methods for Domain Specification of Verification-Oriented Process Ontology by Natalia O. Garanina, Igor S. Anureev, Olesya I. Borovikova, Vladimir E. Zyubin

    Published 2019-12-01
    “…The constructive method uses semantic markup and pattern matching techniques to link sublect fields with classes of the abstract process ontology. …”
    Get full text
    Article
  11. 171

    Non-specialized means of causative semantics expression in the Slavic and Germanic languages (based on the lexical semantic group of defense and protection) by A.H. Litvinovich

    Published 2021-10-01
    “…It works towards resolving a controversial causativity theory issue about the scope and boundaries of causative verbs class, as well as helps to reveal some internal laws of the causative category development (gradual nature of the causative category). The following methods were used: contextual, transformational, comparative methods; dictionary definitions analysis, component and distributive analysis. …”
    Get full text
    Article
  12. 172
  13. 173

    An autonomous navigation method for field phenotyping robot based on ground-air collaboration by Zikang Zhang, Zhengda Li, Meng Yang, Jiale Cui, Yang Shao, Youchun Ding, Wanneng Yang, Wen Qiao, Peng Song

    Published 2025-12-01
    “…The proposed method employs a UAV equipped with a Real-Time Kinematic (RTK) module for the construction of high-precision Field maps. …”
    Get full text
    Article
  14. 174

    Principles and Methods for Describing Social Vocabulary in the Ideographic Dictionary by A. V. Shchetinina, A. N. Blinova

    Published 2017-10-01
    “…On the example of the analysis of the nomination banderovets ( Banderaers ), the logic of the formation of new meanings of words not previously fixed by dictionaries and the creation of dictionary articles for the ideographic dictionary is justified. Application of methods of semantic, classificatory, linguistic-statistical, contextual, definitional analysis is demonstrated and also the method of ideographic reconstruction of nominative sets is partially presented.…”
    Get full text
    Article
  15. 175

    Enhancing Word Embeddings for Improved Semantic Alignment by Julian Szymański, Maksymilian Operlejn, Paweł Weichbroth

    Published 2024-12-01
    “…This study introduces a method for the improvement of word vectors, addressing the limitations of traditional approaches like Word2Vec or GloVe through introducing into embeddings richer semantic properties. …”
    Get full text
    Article
  16. 176
  17. 177

    Road scene map for autonomous driving and modeling method by Juan Lei, Xiong You, Jiangpeng Tian, Jian Yang, Kuiliang Gao, Weitang Liu

    Published 2025-08-01
    “…Building on cartographic principles, we propose the concept of a road scene map along with its modeling method that incorporates dynamic/static traffic elements with geometric/semantic features. …”
    Get full text
    Article
  18. 178

    Programmable semantic parsing approach for mimic arbitration by Wenjian ZHANG, Ke SONG, Libo TAN, Shuai WEI, Chunlei DONG

    Published 2020-04-01
    “…Aiming at the application of mimic arbitration,a programmable semantic parsing approach for mimic arbitration was proposed.Based on the idea of matching lookup table,this method could achieve custom protocol parsing through domain pointer configuration,and solve the problem of programmable protocol parsing for different protocols.By adopting pipeline control method,the congestion free in the procedure of protocol parsing was guaranteed and the performance of protocol parsing was improved.By introducing Hash operation,the complexity of semantic reordering design of sub-packages was simplified.The performance analysis results show that this approach has the characteristics of high flexibility protocol parsing,high processing capacity and low resource utilization.…”
    Get full text
    Article
  19. 179

    GBSS:researches on group-based semantic search by CHEN Hai-tao, GONG Zheng-hu, HUANG Zun-guo

    Published 2006-01-01
    “…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
    Get full text
    Article
  20. 180

    GBSS:researches on group-based semantic search by CHEN Hai-tao, GONG Zheng-hu, HUANG Zun-guo

    Published 2006-01-01
    “…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
    Get full text
    Article