Search alternatives:
transform » transport (Expand Search)
Showing 101 - 120 results of 6,775 for search 'different transform (method OR methods)', query time: 0.23s Refine Results
  1. 101

    Transformer Failure Rate Model Based on DDgPCE Method and Oil Chromatography Datadd by CHEN Li juan, WU Jian jun, WANG Gang, DAI Zi kuo, LIU Zhen dong, TAN Yu hua, ZHOU Yul ong

    Published 2023-12-01
    “…Thirdly, considering the health status and service life of transformer, the distribution model of transformer failure rate is established by data-driven generalized polynomial chaos method. …”
    Get full text
    Article
  2. 102

    DDoS-MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer by Bangli Wang, Yuxuan Jiang, You Liao, Zhen Li

    Published 2024-01-01
    “…In order to provide an effective method for detecting abnormal traffic, this paper proposes a novel network architecture called DDoS-MSCT, which combines a multiscale convolutional neural network and transformer. …”
    Get full text
    Article
  3. 103

    A novel method for power transformer fault diagnosis considering imbalanced data samples by Jun Chen, Yong Wang, Lingming Kong, Yilong Chen, Mianzhi Chen, Qian Cai, Gehao Sheng

    Published 2025-01-01
    “…IntroductionMachine learning-based power transformer fault diagnosis methods often grapple with the challenge of imbalanced fault case distributions across different categories, potentially degrading diagnostic accuracy. …”
    Get full text
    Article
  4. 104

    Evidence conflict measurement method based on Pignistic probability transformation and singular value decomposition by Xinglin GUO, Zhenxiao SUN, Yuyao ZHOU, Lianzhi QI, Yi ZHANG

    Published 2021-04-01
    “…In view of the problem of poor adaptability and low accuracy of common evidence conflict measurement method, an evidence conflict measurement method based on Pignistic probability transformation and singular value decomposition was proposed.First, Pignistic probability transformation was used to map the evidence focal element difference to the belief difference, and the evidence composite belief function matrix was constructed.Then, the matrix features were extracted by singular value decomposition, and the matrix feature space was divided into similar subspace and conflict subspace according to singular value characteristics.Considering the similarity and conflict characteristics of the evidence matrix, and the ratio of the singular value of the conflict subspace to the singular value of the similar subspace was taken as the new conflict measure factor.Finally, the proposed method was compared with common methods in various evidence conflict scenarios, such as full conflict scenario, variable reliability scenario, variable focus element scenario, focal element nested scenario, and the results show that the proposed method has wide adaptability, high accuracy and good stability.…”
    Get full text
    Article
  5. 105

    Traffic concealed data detection method based on contrastive learning and pre-trained Transformer by HE Shuai, ZHANG Jingchao, XU Di, JIANG Shuai, GUO Xiaowei, FU Cai

    Published 2025-03-01
    “…To solve the problems of characterizing representing massive encrypted traffic, perceiving malicious behaviors, and identifying the ownership of privacy data, a traffic concealed data detection method was proposed based on contrastive learning and pre-trained Transformer. …”
    Get full text
    Article
  6. 106
  7. 107

    A robust method for calculating the vertical derivative of potential fields based on Hilbert transforms by Xin’gang Luo, Shengrong Liu, Xiaoping Tang

    Published 2025-05-01
    “…Our approach leverages the Hilbert transform properties in the frequency domain combined with finite difference approximations for horizontal derivatives in the spatial domain, establishing a recursive framework for vertical derivative computation. …”
    Get full text
    Article
  8. 108

    Leveling method for airborne electromagnetic data based on the curvelet transform and adaptive group-sparse variational model by Qiong Zhang, Xin Chen, Haomiao Wang, Zhonghang Ji, Fei Yan, Yunqing Liu

    Published 2025-04-01
    “…Traditional leveling methods predominantly rely on time-domain and frequency-domain analysis to characterize leveling errors. …”
    Get full text
    Article
  9. 109

    Automatic serving method of volleyball training robot based on improved YOLOv5 and improved Hough transform by Tao Sun, Xiaolong He, Jiajun Zhang

    Published 2025-08-01
    “…An automatic serving method for volleyball training robots is proposed based on You Only Look Once v5 and Hough transform. …”
    Get full text
    Article
  10. 110

    An artificial neural networks approach and hybrid method with wavelet transform to investigate the quality of Tallo River, Indonesia by Dahlan Abdullah, Kristina Gartsiyanova, Khurramova (Eshmamatova) Madina Mansur qizi, Eshkobilov Akhmad Javlievich, Mullabayev Baxtiyarjon Bulturbayevich, Gavxar Zokirova, Mohd Norazmi Nordin

    Published 2023-07-01
    “…The findings indicated that using the hybrid method with wavelet transformation ameliorated the ANN model's exactitude by 10% during training and 16% during testing. …”
    Get full text
    Article
  11. 111

    Underwater Small Target Detection Method Based on the Short-Time Fourier Transform and the Improved Permutation Entropy by Jing Zhou, Baoan Hao, Yaan Li, Xiangfeng Yang

    Published 2024-10-01
    “…To validate the proposed methods, comparative analysis experiments were executed utilizing actual experiment data. …”
    Get full text
    Article
  12. 112
  13. 113

    Wavelet-based forecasting of ARIMA time series - an empirical comparison of different methods by Stephan Schlueter, Carola Deuschle

    Published 2014-08-01
    “…By means of wavelet transform, an ARIMA time series can be split into different frequency components. …”
    Get full text
    Article
  14. 114

    Research on digital twin modeling method for combustion process based on model reduction by Yue Zhang, Jiale Li

    Published 2025-01-01
    “…The average absolute error of the reconstructed temperature fields from three methods under different operating conditions is then compared. …”
    Get full text
    Article
  15. 115
  16. 116
  17. 117

    Methods for Adaptive Transformation of Content in Hypertext Format on Corporate TV and Information Kiosks of Educational Institutions by D. S. Filippov

    Published 2024-07-01
    “…In system engineering, the main emphasis (and, as a result, the key task) is on the absence of duplication of content for different types of output screens (including interactive touchscreen kiosks), which is especially important because the implemented system will be built on free, open-source technologies and integrated into the current university website, which no other proprietary Digital Signage software system can offer.Materials and methods: the study uses different methods of transformation and output of content, but adaptation methods based on cascading style sheets (CSS) are mainly used. …”
    Get full text
    Article
  18. 118

    Comparisons Between Quantitative FMECA Methods: A Case Study on Power Transformer Risk Assessments by Andrés A. Zúñiga, João F. P. Fernandes, Paulo J. C. Branco

    Published 2025-06-01
    “…This fact motivated us to introduce an alternative approach for comparing different FMECA methods based on agreement coefficients, enabling a statistical comparison between rankings generated by independent raters. …”
    Get full text
    Article
  19. 119

    Forecasting Limits of Feasible Organization Growth by Using Key Predictors of Organizational Transformation by A. L. Bobkov

    Published 2024-05-01
    “…The principle distinguishing feature of this methodological approach is the use of indicators defined by the author as key predictors of organizational transformation. This set of indicators was identified by the author through results of earlier statistical research of transformation laws of organization production structure in different sectors of economy. …”
    Get full text
    Article
  20. 120