Suggested Topics within your search.
Suggested Topics within your search.
- Enterprise application integration (Computer systems) 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Management information systems 1
- Mass media 1
- Mass media and technology 1
- Philosophy 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- Study and teaching 1
- Technological innovations 1
-
1
Semantic Security Methods for Software-Defined Networks
Published 2017-12-01“…The paper shows how this problem can be solved by using a semantic security model. We propose a method that allows us to construct semantics that captures necessary security properties the network must follow. …”
Get full text
Article -
2
The Semantic Reference Data Modelling Method: Creating Understandable, Reusable and Sustainable Semantic Data Models
Published 2025-03-01“…To address these challenges, this contribution presents the Semantic Reference Data Model (SRDM) modelling method, a protocol that offers a practical approach to (i) simplifying ontological complexity, (ii) standardising semantic patterns and (iii) facilitating the creation of new knowledge graphs. …”
Get full text
Article -
3
Information Content Methods for Semantic Similarity: An Experimental Assessment
Published 2025-01-01“…Although previous studies suggest that extensional methods outperform intensional ones, our findings reveal that both categories of methods can achieve strong performance in semantic similarity tasks. …”
Get full text
Article -
4
THE CORRELATION OF SEMANTICS AND PRAGMATICS OF LANGUAGE ABSURD (INTERPRETATION METHODS)
Published 2021-09-01Get full text
Article -
5
Modelling the Semantic Landscape of Angels in Augustine of Hippo
Published 2025-07-01Get full text
Article -
6
Web service discovery method based on semantic expansion
Published 2007-01-01“…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
Get full text
Article -
7
A Gradual Adversarial Training Method for Semantic Segmentation
Published 2024-11-01Get full text
Article -
8
Vector semantic computing method study for short sentence
Published 2016-02-01“…A vector semantic computing method study for short sentence based on artificial neural network was proposed. …”
Get full text
Article -
9
Web service discovery method based on semantic expansion
Published 2007-01-01“…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
Get full text
Article -
10
A Comparison of Segmentation Methods for Semantic OctoMap Generation
Published 2025-06-01“…Instead of computationally demanding 3D segmentation of point clouds, we propose efficient segmentation on RGB images and projection of the corresponding LIDAR measurements on the semantic OctoMap. This study presents a comparative evaluation of different semantic segmentation methods and examines the impact of input image resolution on the accuracy of 3D semantic environment reconstruction, inference time, and computational resource usage. …”
Get full text
Article -
11
An innovative semantically guided SAR imaging and target enhancement method
Published 2024-12-01“…Abstract Conventional sparse synthetic aperture radar (SAR) imaging methods apply regularisation to constrain scene priors. …”
Get full text
Article -
12
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
13
INVESTIGATION OF THE SUBJECT-SPATIAL ENVIRONMENT OF THE SCHOOL BY THE METHOD OF SEMANTIC DIFFERENTIAL
Published 2018-07-01“…Data processing was carried out using the mid-group analysis, cross-group relations, and cluster and regression analysis using the method of step selection. Student’s t-test, Cronbach’s Alpha and Pearson’s Correlation were applied to test reliability and validity of the method of semantic differential and the received results.Results and scientific novelty. …”
Get full text
Article -
14
METHOD OF BUILDING THE SEMANTIC NETWORK OF DISTRIBUTED SEARCH IN E-LEARNING
Published 2017-11-01“…The method of synthesizing a decision tree and a stratified semantic network is suggested; this method enables considering them as closely interrelated ones in the context of distributed search in e-learning. …”
Get full text
Article -
15
Research on Semantic Driven Urban Pipeline Dataspace Construction Method
Published 2024-10-01“…To address this problem, this paper proposes a semantics-driven urban pipeline dataspace construction method, which aims to realize the efficient organization of pipeline data. …”
Get full text
Article -
16
METHODS OF TEXT INFORMATION CLASSIFICATION ON THE BASIS OF ARTIFICIAL NEURAL AND SEMANTIC NETWORKS
Published 2017-01-01Get full text
Article -
17
Spatial Semantic Expression of Terrain Viewshed: A Data Mining Method
Published 2025-03-01“…Compared with traditional methods, the proposed method significantly improves the resolution of spatial semantic relationship expression and has practical application value in fields such as archaeology, tourism planning, and urban design.…”
Get full text
Article -
18
THE COMPLEX ANALYSIS METHOD OF SEMANTIC ASSOCIATIONS IN STUDYING THE STUDENTS’ CREATIVE ETHOS
Published 2015-03-01“…The paper demonstrates the sociological research findings concerning the students’ ideas of creativity based on the questionnaires and testing of the students of the natural science, humanities and technical profiles at Siberian Federal University over the period of 2007-2011.The author suggests a new method of semantic association analysis in order to identify the latent groups of notions related to the concept of creativity. …”
Get full text
Article -
19
A Knowledge and Semantic Fusion Method for Automatic Geometry Problem Understanding
Published 2025-04-01“…This paper proposes a knowledge and semantic fusion method to achieve high-quality, interpretable, and scalable GPU. …”
Get full text
Article -
20
The pig pose recognition method based on pig body semantic segmentation
Published 2025-12-01“…To address these challenges, this paper proposes a novel pig pose recognition method based on the semantic segmentation of pig body parts. …”
Get full text
Article