-
601
Adaptive temporal compression for reduction of computational complexity in human behavior recognition
Published 2024-05-01“…With the advancement of deep learning algorithms and computer hardware, the conventional two-dimensional convolution technique for training video models has been replaced by three-dimensional convolution, which enables the extraction of spatio-temporal features. …”
Get full text
Article -
602
Spatial–Spectral Hierarchical Multiscale Transformer-Based Masked Autoencoder for Hyperspectral Image Classification
Published 2025-01-01“…First, after the spatial–spectral feature embedding with a spatial–spectral feature extraction module, to solve the increased computational complexity caused by filling invisible patches in traditional masked autoencoder (MAE), the grouped window attention module is introduced to process only the visible patches of HSIs during spatial–spectral reconstruction, avoiding unnecessary computations for masked ones. …”
Get full text
Article -
603
ENHANCING NETWORK INTRUSION DETECTION USING MACHINE LEARNING AND META-MODELLING FOR IMPROVED CYBER SECURITY PERFORMANCE
Published 2025-04-01“…Common parameters such as accuracy, precision, recall, and F1-score were computed on each model to allow for a comparative evaluation. …”
Get full text
Article -
604
The algorithnt software program for cakulating the mechanical parameters of multilayer rod
Published 2004-12-01“…The program is developed for training purposes, so the algorithm used is idealized and not sophisticated but preserving the main features of multilayer structural elements calculation. …”
Get full text
Article -
605
Machine Learning Sensors for Diagnosis of COVID-19 Disease Using Routine Blood Values for Internet of Things Application
Published 2022-10-01“…We propose to use these 11 features and their binary combinations as important biomarkers for ML sensors in the diagnosis of the disease, supporting edge computing on Arduino and cloud IoT service.…”
Get full text
Article -
606
2D affine transform parameters by Gaussian elimination with pivoting
Published 2025-06-01“…Geometric transformation is a technique used to define the properties of common features between different images using the same coordinates basis, This method can be effectively used in image processing and computer vision to facilitate the computation process throughout eliminating the need for solving the inverse of the matrix.…”
Get full text
Article -
607
-
608
Mathematical modelling with computational fractional order for the unfolding dynamics of the communicable diseases
Published 2024-12-01“…Mathematical models based on computational fractional orders, employed for accurate modelling of complex dynamic systems, can ensure the implementation of various analytical, numerical and computing methods encompassing their applications to emerging and ever-varying real-world problems. …”
Get full text
Article -
609
High-Resolution Computed Tomography of Single Breast Cancer Microcalcifications in Vivo
Published 2011-07-01“…Microcalcification is a hallmark of breast cancer and a key diagnostic feature for mammography. We recently described the first robust animal model of breast cancer microcalcification. …”
Get full text
Article -
610
Testing of Technical Indicators of Accumulators by Means of Complex Computer Model of EV
Published 2020-01-01Get full text
Article -
611
Modeling and Simulations of Retina-Like Three-Dimensional Computational Ghost Imaging
Published 2019-01-01“…R-3DCGI models are developed, and corresponding simulations are conducted to verify and evaluate the accuracy and features of the R-3DCGI. Results show that the models obtain rotation and scaling invariances and compress redundant information, thereby improving imaging efficiency over the traditional computational ghost imaging. …”
Get full text
Article -
612
A Space-Time Plume Algorithm to Represent and Compute Dynamic Places
Published 2025-07-01“…Point clustering analysis commonly assumes events occur in an empty space and therefore ignores geospatial features where events take place. This research introduces relational density, a novel concept redefining density as relative to the spatial structure of geospatial features rather than an absolute measure. …”
Get full text
Article -
613
Radiomics Signature of Aging Myocardium in Cardiac Photon-Counting Computed Tomography
Published 2025-07-01“…<b>Conclusions</b>: Radiomics texture features of the left ventricular myocardium outperformed conventional parameters like EAT density and thickness in differentiating age groups, offering a potential imaging biomarker for myocardial aging. …”
Get full text
Article -
614
A Novel SHiP Vector Machine for Network Intrusion Detection
Published 2025-01-01Get full text
Article -
615
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01“…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
Get full text
Article -
616
Data-driven discovery and parameter estimation of mathematical models in biological pattern formation.
Published 2025-01-01Get full text
Article -
617
Evaluation of the volume and function of the right atrial appendage using computed tomography
Published 2025-07-01“…Abstract Objective To assess the volume and function of the right atrial appendage (RAA) in patients with sinus rhythm using 256-slice spiral computed tomography (CT) angiography. Methods A total of 60 patients with normal cardiac CT imaging features were enrolled in this retrospective study. …”
Get full text
Article -
618
Development and application of distributed computing system in inverse problems of fracture mechanics
Published 2017-12-01“…This simplifies the process of the system deployment, and increases the productivity of the computing process. A finite element model with a large set of parameters is calculated. …”
Get full text
Article -
619
Computer Multimedia Art Pattern Creation Based on P-Filling Algorithm
Published 2021-01-01“…Experimental results show that, through this production model, users can produce a large number of computer multimedia art patterns with hand-drawn style features through very little interaction and parameter control.…”
Get full text
Article -
620
A malware detection method with function parameters encoding and function dependency modeling
Published 2025-06-01“…Specifically, we first design a parameter encoder to convert various types of function parameters into feature vectors, and then discretize various parameter features through clustering methods to enhance the representation of API encoding. …”
Get full text
Article