Suggested Topics within your search.
Suggested Topics within your search.
-
381
Separator equipment performance of iron ore and coal using experimental and ANN-based analysis
Published 2025-05-01Get full text
Article -
382
Eeg-based detection of epileptic seizures in patients with disabilities using a novel attention-driven deep learning framework with SHAP interpretability
Published 2025-09-01“…Additionally, the computational complexity of the proposed framework was evaluated in terms of floating-point operations per second (FLOPs) and the total number of parameters, ensuring its efficiency for real-time biomedical applications. …”
Get full text
Article -
383
Bag-of-words is competitive with sum-of-embeddings language-inspired representations on protein inference.
Published 2025-01-01“…Recently, studies have utilised mathematical ideas from natural language processing and self-supervised learning, to derive features based on protein sequence information. …”
Get full text
Article -
384
SYNTHESIS OF QUASI BAND LADDER TRANSFORMING HIGH ORDER FILTERS
Published 2019-12-01“…The purpose of the work, the results of which are presented in the article, was to develop a computerized mathematical model of the ladder filter to study the features of the synthesis of matching chains of any order on its basis. …”
Get full text
Article -
385
Wafer-scale radio frequency ZnO Schottky diodes and arithmetic circuits
Published 2025-07-01Get full text
Article -
386
The effect of the surface recombination velocity on 2D thermoelastic semiconductor solid sphere problem
Published 2025-08-01Get full text
Article -
387
A shape-controlled non-symmetric quaternary refinement scheme
Published 2025-07-01“…By appropriately selecting these parameters, we demonstrate that the resulting limit curves can achieve up to $$C^3$$ continuity, which is significant for applications requiring high smoothness. One of the key advantages of our scheme is its ability to generate smooth curves with reduced support size, leading to improved computational efficiency and locality of influence. …”
Get full text
Article -
388
ANALYSIS OF THE STABILITY OF IDENTIFICATION METHOD OF DDOS-ATTACKS AT THE PHYSICAL LEVEL OF THE OSI NETWORK MODEL TO VARIOUS VARIATIONS OF LOADING ON THE CHANNEL
Published 2022-10-01“…Where the main aspect of the research is: the identification and removal of vulnerabilities from various ways of pseudo-legitimization of traffic by an attacker. Mathematical models of attack and its identification were developed, the application of which was realized through the Lazarus software development environment. …”
Get full text
Article -
389
-
390
SCHEDULING PROBLEMS OF STATIONARY OBJECTS WITH THE PROCESSOR IN ONE-DIMENSIONAL ZONE
Published 2015-06-01“…We consider the mathematical model in which an operating processor serves the set of the stationary objects positioned in a one-dimensional working zone. …”
Get full text
Article -
391
-
392
A Survey on the Deep Learning-Based Mismatch Removal: Principles and Methods
Published 2023-01-01“…Furthermore, we present both the intuitive motivation and mathematical analysis of commonly used methods, elucidating their underlying principles and efficacy. …”
Get full text
Article -
393
Long-Term Structural Health Monitoring System for a High-Speed Railway Bridge Structure
Published 2015-01-01“…In order to ensure safety and detect the performance deterioration during the long-time service of the bridge, a Structural Health Monitoring (SHM) system has been implemented on this bridge by the application of modern techniques in sensing, testing, computing, and network communication. …”
Get full text
Article -
394
-
395
A cyclic redundancy check aided encoding construction method for list sphere polar decoder
Published 2025-08-01“…For control channels, although the sphere decoding (SD) algorithm boasts excellent performance, its high computational complexity and significant latency present clear limitations in practical applications. …”
Get full text
Article -
396
Digital Processing and Deep Learning Techniques: A review of the Literature
Published 2022-09-01“…Mathematical approaches are used to process images in image processing.Different approaches are done to the image in image processing to obtain a better image.The main goal of image enhancement is processing certain image so that the result is more appropriate for a specific application compared to original image. …”
Get full text
Article -
397
Decomposition of Technological Processes for Evaluating the Performance of Production Line for Pre Sowing Treatment of Seeds
Published 2018-07-01“…(Materials and methods) Experimental studies have been carried out with the use of computer mathematical modeling. Results of experiments were processed by methods of mathematical statistics, statistical analysis and data processing package, research application package, filtering, analysis and modeling of technological processes. …”
Get full text
Article -
398
-
399
Spintronic Memtransistor Leaky Integrate and Fire Neuron for Spiking Neural Networks
Published 2025-08-01Get full text
Article -
400
Supporting the Design of Systems for Energy Recovery from Mechanical Vibrations Containing MFC Piezoelectric Transducers
Published 2025-05-01“…For this purpose, a mathematical model of this type of system was developed, which was then combined with computer-aided engineering tools and the application of the finite element method. …”
Get full text
Article