Suggested Topics within your search.
Suggested Topics within your search.
-
461
Proposal of a method system for interpersonal communication in the Higher Education context
Published 2017-12-01“…Curriculum transformation in the university majors in Ecuador has generated a growing concern for studying different aspects of interpersonal communication in the teaching-learning process. …”
Get full text
Article -
462
Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation
Published 2022-01-01“…One class of the existing defense methods is the preprocessing-based defense which transforms the inputs before feeding them to the system. …”
Get full text
Article -
463
Image retrieval method based on data mining and deep residual network
Published 2025-12-01“…To address the significant shortcomings of traditional image retrieval models in feature extraction and recognition accuracy, this study proposes a new method based on the improved residual network and attention mechanism. …”
Get full text
Article -
464
Method for synthesizing a logic element that implements several functions simultaneously
Published 2023-06-01“…Therefore, the purpose of the present work is to develop a LUT structure for implementing several logic functions simultaneously on inactive transmitting transistors.Methods. The evolution of LUT structure is presented for three variables, in which the number of simultaneously implemented functions increases. …”
Get full text
Article -
465
A Learned Reduced-Rank Sharpening Method for Multiresolution Satellite Imagery
Published 2025-01-01“…Our method offers several distinct advantages: it requires no external training data beyond the image being processed, it provides fast training speeds through a compact, interpretable network model, and most importantly, it adapts to different input images without requiring extensive parameter tuning—a common limitation of traditional methods. …”
Get full text
Article -
466
Multi-Vehicle Object Recognition Method Based on YOLOv7-W
Published 2025-01-01Get full text
Article -
467
Optimal path calculation method of optical network under complex constraints
Published 2024-12-01“…An optimal path calculation method is proposed, involving the transformation of the network topology based on various constraints. …”
Get full text
Article -
468
Fault Diagnosis Method of Gear based on VMD and Multi-feature Fusion
Published 2017-01-01“…Finally,the high- dimensional feature vectors composed of PE and energy are transformed as input of least squares support vector machine( LS- SVM) to identify gear fault types.The experimental results indicate that VMD can better separate complex multi- components signal from each other,the PE and energy feature can reveal the gear fault information from different scales,the intelligent fault diagnosis method based on VMD and multi- feature fusion can identify the operating conditions of gear accurately and provide reference for the gear fault warning and severity.…”
Get full text
Article -
469
Webshell malicious traffic detection method based on multi-feature fusion
Published 2021-12-01“…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
Get full text
Article -
470
A fine‐grained image classification method based on information interaction
Published 2024-12-01“…The experimental results show that the method has good generalization on different datasets.…”
Get full text
Article -
471
Reinforcement Method for Transmission Corridor to Enhance Resilience Against Typhoon Disasters
Published 2025-05-01Get full text
Article -
472
Parkinson’s Disease Gravity Index: A Method by means of Optimal Scaling
Published 2020-01-01“…Once the dimensions were transformed into interval variables, optimal scaling was carried out. …”
Get full text
Article -
473
Visual Odometry through Appearance- and Feature-Based Method with Omnidirectional Images
Published 2012-01-01“…The data used in the experiments consists of a large sets of omnidirectional images captured along the robot's trajectory in three different real scenarios. Experimental results demonstrate the accuracy of the estimations and the capability of both methods to work in real-time.…”
Get full text
Article -
474
Evaluating the think-aloud method for English reading: a systematic review
Published 2025-12-01“…This study emphasizes scaffolding and tailored teaching practices to maximize think-aloud method’s benefits. Overall, the study confirms think-aloud method’s potential as a transformative tool to address EFL/ESL learners’ challenges in reading, and to incorporate theoretical insights into practical strategies for improving EFL/ESL learners’ reading ability and metacognitive development.…”
Get full text
Article -
475
Research on dust identification and concentration detection method based on machine vision
Published 2025-08-01Get full text
Article -
476
An Evidential Solar Irradiance Forecasting Method Using Multiple Sources of Information
Published 2024-12-01“…The Yager combination method and pignistic transformation are utilized to aggregate the individual models. …”
Get full text
Article -
477
RMFKAN: Network Spammers Detection Method Based on Improved Graph Mamba
Published 2025-05-01“…Detecting network spammers is crucial for creating a harmonious online environment. Existing graph Transformer-based methods for network spammers detection face challenges due to indiscriminate information propagation between nodes within communities. …”
Get full text
Article -
478
Application of CIPP flipped lining method in the rehabilitation of old gas pipelines
Published 2025-04-01“…By comparing the characteristics of different trenchless pipeline repair techniques, the technical adaptability of CIPP flipped lining method was analyzed, and the construction parameter design, key process flow, and construction difficulties of using CIPP flipped lining to repair gas pipelines were explored and revealed, as well as the control of engineering quality impact. …”
Get full text
Article -
479
Lightweight deep learning method for end-to-end point cloud registration
Published 2025-02-01“…Point cloud registration, a fundamental task in computer science and artificial intelligence, involves rigidly transforming point clouds from different perspectives into a common coordinate system. …”
Get full text
Article -
480
Method for identifying passable areas in mines based on spatiotemporal continuous compensation
Published 2024-10-01“…Finally, to eliminate unstable regions with inconsistent passability across different point cloud frames, a grid map was constructed based on a normal distribution transformation algorithm, and temporal stability weights were used to assess grid stability, ultimately filtering out unstable regions through regional grid projection. …”
Get full text
Article