Suggested Topics within your search.
Suggested Topics within your search.
-
1461
Time lag effect of precipitation on groundwater level based on wavelet analysis in the People’s Victory Canal irrigation area, China
Published 2025-04-01“…This study is based on the monthly average precipitation and groundwater depth data from the Xiazhuang in the People’s Victory Canal irrigation area from 1993 to 2021. It uses methods such as continuous wavelet transform, cross-wavelet transform, and cross-correlation analysis to systematically analyze the lag effect and its changing patterns of groundwater table depth in response to precipitation at different time scales. …”
Get full text
Article -
1462
Multi-Vehicle Object Recognition Method Based on YOLOv7-W
Published 2025-01-01Get full text
Article -
1463
Optimal path calculation method of optical network under complex constraints
Published 2024-12-01“…An optimal path calculation method is proposed, involving the transformation of the network topology based on various constraints. …”
Get full text
Article -
1464
-
1465
Improved crop row detection by employing attention-based vision transformers and convolutional neural networks with integrated depth modeling for precise spatial accuracy
Published 2025-08-01“…Incorporating artificial intelligence (AI) within agricultural practices has fundamentally transformed the discipline by facilitating sophisticated data analysis, predictive modeling, and automation. …”
Get full text
Article -
1466
Fault Diagnosis Method of Gear based on VMD and Multi-feature Fusion
Published 2017-01-01“…Finally,the high- dimensional feature vectors composed of PE and energy are transformed as input of least squares support vector machine( LS- SVM) to identify gear fault types.The experimental results indicate that VMD can better separate complex multi- components signal from each other,the PE and energy feature can reveal the gear fault information from different scales,the intelligent fault diagnosis method based on VMD and multi- feature fusion can identify the operating conditions of gear accurately and provide reference for the gear fault warning and severity.…”
Get full text
Article -
1467
Webshell malicious traffic detection method based on multi-feature fusion
Published 2021-12-01“…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
Get full text
Article -
1468
A fine‐grained image classification method based on information interaction
Published 2024-12-01“…The experimental results show that the method has good generalization on different datasets.…”
Get full text
Article -
1469
A novel rotation and scale-invariant deep learning framework leveraging conical transformers for precise differentiation between meningioma and solitary fibrous tumor
Published 2025-04-01“…The proposed framework employs a novel architecture of conical transformers to capture both global and local imaging markers from whole-slide images, accommodating variations across different magnification scales. …”
Get full text
Article -
1470
Reinforcement Method for Transmission Corridor to Enhance Resilience Against Typhoon Disasters
Published 2025-05-01Get full text
Article -
1471
-
1472
Parkinson’s Disease Gravity Index: A Method by means of Optimal Scaling
Published 2020-01-01“…Once the dimensions were transformed into interval variables, optimal scaling was carried out. …”
Get full text
Article -
1473
Visual Odometry through Appearance- and Feature-Based Method with Omnidirectional Images
Published 2012-01-01“…The data used in the experiments consists of a large sets of omnidirectional images captured along the robot's trajectory in three different real scenarios. Experimental results demonstrate the accuracy of the estimations and the capability of both methods to work in real-time.…”
Get full text
Article -
1474
Evaluating the think-aloud method for English reading: a systematic review
Published 2025-12-01“…This study emphasizes scaffolding and tailored teaching practices to maximize think-aloud method’s benefits. Overall, the study confirms think-aloud method’s potential as a transformative tool to address EFL/ESL learners’ challenges in reading, and to incorporate theoretical insights into practical strategies for improving EFL/ESL learners’ reading ability and metacognitive development.…”
Get full text
Article -
1475
Multicriteria decision making-based approach to classify loose-leaf teas
Published 2025-03-01“…Different spectral transformations (MSC, SNV and derivatives) and seven supervised linear and non-linear chemometric methods were performed. …”
Get full text
Article -
1476
TFC: A Series of Band Selection Methods for Hyperspectral Target Detection
Published 2025-01-01“…According to the different method for solving constrained optimization problem, the TFC methods are divided into TFC-MP (TFC-Matching Pursuit), TFC-OMP (TFC-Orthogonal Matching Pursuit) and TFC-StOMP (TFC-Stagewise Orthogonal Matching Pursuit) methods. …”
Get full text
Article -
1477
Research on dust identification and concentration detection method based on machine vision
Published 2025-08-01Get full text
Article -
1478
An Evidential Solar Irradiance Forecasting Method Using Multiple Sources of Information
Published 2024-12-01“…The Yager combination method and pignistic transformation are utilized to aggregate the individual models. …”
Get full text
Article -
1479
RMFKAN: Network Spammers Detection Method Based on Improved Graph Mamba
Published 2025-05-01“…Detecting network spammers is crucial for creating a harmonious online environment. Existing graph Transformer-based methods for network spammers detection face challenges due to indiscriminate information propagation between nodes within communities. …”
Get full text
Article -
1480
Application of CIPP flipped lining method in the rehabilitation of old gas pipelines
Published 2025-04-01“…By comparing the characteristics of different trenchless pipeline repair techniques, the technical adaptability of CIPP flipped lining method was analyzed, and the construction parameter design, key process flow, and construction difficulties of using CIPP flipped lining to repair gas pipelines were explored and revealed, as well as the control of engineering quality impact. …”
Get full text
Article