Suggested Topics within your search.
Suggested Topics within your search.
-
2141
-
2142
FEATURES OF WRITTEN LANGUAGE COMMUNICATION BY MEANS OF THE UKRAINIAN LANGUAGE (on the example of official-business, epistolary and conversational-functional styles)
Published 2021-06-01“…Achieving this goal involves a number of tasks: 1) to outline the features of construction, placement of details, language tools of business letters; 2) to study the structure and linguistic richness of Lesya Ukrainka’s letters; 3) identify typical and different linguistic and stylistic means of business and private letters; 4) analyze the features of messages transmitted using instant messaging programs Viber and Telegram; 5) to investigate the influence of gender on the features of language means of various forms of written communication. …”
Get full text
Article -
2143
Hematological features of mine-blast trauma, accompanied by acubarotrauma, among servicemen - participants in high-intensity combat operations
Published 2024-12-01“…In patients with ear injury, a significant increase in the total number of leukocytes and the absolute number of segmented neutrophils was observed compared to patients in the control group. A feature of the peripheral blood of patients with ear injury was a significant increase (p<0,05) in the absolute number of monocytes (0.7±0.36×10⁹/l) compared to the results of the control group (0.29±0.11×10⁹/l). …”
Get full text
Article -
2144
Features of correction of vitamin D deficiency in patients with diabetic kidney disease: the role of vitamin D-binding protein
Published 2025-06-01“…The relevance of the problem of kidney damage in diabetes mellitus (DM) lies in the annual progressive growth in the number of affected people. …”
Get full text
Article -
2145
-
2146
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
2147
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
2148
基于透视不变二值特征描述子的图像匹配算法
Published 2015-04-01“…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
Get full text
Article -
2149
Mobile platform continuous authentication scheme based on gait characteristics
Published 2019-07-01“…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
Get full text
Article -
2150
基于透视不变二值特征描述子的图像匹配算法
Published 2015-04-01“…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
Get full text
Article -
2151
Rore: robust and efficient antioxidant protein classification via a novel dimensionality reduction strategy based on learning of fewer features
Published 2024-12-01“…This approach significantly preserves the original information and overcomes the information loss problem associated with previous feature selection. …”
Get full text
Article -
2152
A Framework for Efficient N-Way Interaction Testing in Case/Control Studies With Categorical Data
Published 2021-01-01“…The first two steps of the framework are quality control and feature selection. The next step uses clustering and binary encodes the features. …”
Get full text
Article -
2153
Double Cost Sensitive Random Forest Algorithm
Published 2021-10-01“…A Double Cost Sensitive Random Forest (DCS-RF) algorithm is proposed to solve the problem that the accuracy of a few classes is not ideal when the classifier identifies unbalanced data. …”
Get full text
Article -
2154
Technologies and Algorithms for Building the Augmented Reality
Published 2013-04-01“…Main attention is payed to the problem of making projection of a 3D model on the marker’s plane. …”
Get full text
Article -
2155
Software Defect Prediction For Quality Evaluation Using Learning Techniques Ensemble Stacking
Published 2023-11-01“…The preprocessing process involved label encoding, feature selection with Pearson correlation, standard normalization, and the use of SMOTE to handle data imbalance. …”
Get full text
Article -
2156
Neural-XGBoost: A Hybrid Approach for Disaster Prediction and Management Using Machine Learning
Published 2025-01-01“…This study addresses a multi-classification problem and proposes the Neural-XGBoost disaster prediction model (N-XGB), a hybrid model that combines neural networks (NN) for feature extraction with XGBoost for classification. …”
Get full text
Article -
2157
Recognition of Impact Load on Connecting-Shaft Rotor System Based on Motor Current Signal Analysis
Published 2024-10-01“…These findings indicate that using the motor current as the analysis signal can solve the problem of the difficult layout for traditional vibration sensors in rolling sites. …”
Get full text
Article -
2158
Grape cluster detection based on spatial-to-depth convolution and attention mechanism
Published 2024-12-01“…Secondly, based on the problem of information loss in grape cluster detection, a plug-and-play module of spatial-to-depth convolution (STD-Conv) is added to enrich grape cluster feature information. …”
Get full text
Article -
2159
Enhancing the data processing speed of a deep-learning-based three-dimensional single molecule localization algorithm (FD-DeepLoc) with a combination of feature compression and pip...
Published 2025-03-01“…This new algorithm uses the feature compression method to reduce the parameters of the model, and combines it with pipeline programming to accelerate the inference process of the deep learning model. …”
Get full text
Article -
2160
GCV-SLAM: Ground Constrained Visual SLAM Through Local Ground Planes
Published 2025-01-01“…To avoid the over-parameterization problem in the graph-factor-based optimization process, the Closest Point(CP) representation is adopted to describe the local ground plane. …”
Get full text
Article