Suggested Topics within your search.
Suggested Topics within your search.
-
641
Rice-SVBDete: a detection algorithm for small vascular bundles in rice stem’s cross-sections
Published 2025-05-01Get full text
Article -
642
-
643
DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK
Published 2025-06-01“…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. Entropy and throughput metrics are employed as decision conditions at each sensing channel, enhancing uncertainty measurement and maintaining detection robustness under low Signal-to-Noise Ratio (SNR) conditions. …”
Get full text
Article -
644
TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5
Published 2025-05-01“…Finally, the EIOU loss function is introduced to measure the overlap between the predicted box and the real box more accurately and improve the detection accuracy. …”
Get full text
Article -
645
-
646
DSFA-SwinNet: A Multi-Scale Attention Fusion Network for Photovoltaic Areas Detection
Published 2025-01-01Get full text
Article -
647
YOLOv8n-DDSW: an efficient fish target detection network for dense underwater scenes
Published 2025-04-01“…Therefore, the YOLOv8n-DDSW fish target detection algorithm was proposed in this article to resolve the detection difficulties resulting from fish occlusion, deformation and detail loss in complex intensive aquaculture scenarios. (1) The C2f-deformable convolutional network (DCN) module is proposed to take the place of the C2f module in the YOLOv8n backbone to raise the detection accuracy of irregular fish targets. (2) The dual-pooling squeeze-and-excitation (DPSE) attention mechanism is put forward and integrated into the YOLOv8n neck network to reinforce the features of the visible parts of the occluded fish target. (3) Small detection is introduced to make the network more capable of sensing small targets and improving recall. (4) Wise intersection over union (IOU) rather than the original loss function is used for improving the bounding box regression performance of the network. …”
Get full text
Article -
648
-
649
Estimating Leaf Chlorophyll Fluorescence Parameters Using Partial Least Squares Regression with Fractional-Order Derivative Spectra and Effective Feature Selection
Published 2025-02-01“…Chlorophyll fluorescence (ChlF) parameters serve as non-destructive indicators of vegetation photosynthetic function and are widely used as key input parameters in photosynthesis–fluorescence models. …”
Get full text
Article -
650
-
651
A quasi affine transformation evolution algorithm with evolution matrix selection operation for parameter estimation of proton exchange membrane fuel cells
Published 2025-01-01“…The objective function of the optimization problem is defined as the sum of squared errors of the actual and predicted voltage data. …”
Get full text
Article -
652
Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data
Published 2025-05-01“…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
Get full text
Article -
653
-
654
-
655
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
656
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
657
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
Get full text
Article -
658
A fuzzy method for improving the functionality of search engines based on user's web interactions
Published 2015-04-01Get full text
Article -
659
Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction
Published 2016-01-01“…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
Get full text
Article -
660
A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS
Published 2025-02-01“…This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. Attacks were conducted on models of basic and modified variants of APUFs from the open-source library "pypuf", using classical logistic regression and artificial neural networks (ANNs). …”
Get full text
Article