Suggested Topics within your search.
Suggested Topics within your search.
-
2381
On-line evaluation method of CVT internal insulation state considering the influence of primary voltage fluctuation
Published 2025-06-01“…This method uses the intrinsic correlation between CVT populations and principal component analysis method to extract features from the output signals of the population to exclude the primary voltage fluctuation, and the characteristic information that characterizes the insulation anomaly in the CVT is obtained. …”
Get full text
Article -
2382
SLAM Algorithm for Mobile Robots Based on Improved LVI-SAM in Complex Environments
Published 2024-11-01“…First of all, the state-of-the-art feature detection algorithm SuperPoint is used to extract the feature points from a visual-inertial system, enhancing the detection ability of feature points in complex scenarios. …”
Get full text
Article -
2383
A Multi-Objective Bio-Inspired Optimization for Voice Disorders Detection: A Comparative Study
Published 2025-06-01“…Different multi-objective evolutionary algorithms (the Non-dominated Sorting Genetic Algorithm (NSGA-II), Strength Pareto Evolutionary Algorithm (SPEA-II), and the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D)) have been compared to detect voice disorders by optimizing two conflicting objectives: error rate and the number of features. The optimization problem has been formulated as a wrapper-based algorithm for feature selection and multi-objective optimization relying on four machine learning algorithms: K-Nearest Neighbour algorithm (KNN), Random Forest (RF), Multilayer Perceptron (MLP), and Support Vector Machine (SVM). …”
Get full text
Article -
2384
Research on Intrusion Detection Method Based on Transformer and CNN-BiLSTM in Internet of Things
Published 2025-04-01“…To address the issue of data class imbalance, the Borderline-SMOTE method is introduced to enhance the model’s ability to recognize minority class attack samples. To tackle the problem of redundant features in the original dataset, a comprehensive feature selection strategy combining XGBoost, Chi-square (Chi2), and Mutual Information is adopted to ensure the model focuses on the most discriminative features. …”
Get full text
Article -
2385
Economic Evaluation of the Investment in Sensor Equipment Based on Data Valuation in Prediction Model
Published 2025-01-01“…Traditional approaches primarily address this problem from a performance-oriented perspective, focusing on metrics like prediction or estimation accuracy. …”
Get full text
Article -
2386
Auxiliary Diagnosis of Breast Cancer Based on Machine Learning and Hybrid Strategy
Published 2023-01-01“…Then, the features of the dataset are initially screened using the mutual information method, and further secondary feature selection is performed using the recursive feature elimination method based on the XGBoost algorithm. …”
Get full text
Article -
2387
BG-YOLO: A Bidirectional-Guided Method for Underwater Object Detection
Published 2024-11-01“…The object detection branch only consists of a detection subnet. A feature-guided module connects the shallow convolution layers of the two branches. …”
Get full text
Article -
2388
ALPD-Net: a wild licorice detection network based on UAV imagery
Published 2025-07-01“…Traditional licorice resource survey methods are unsuitable for complex terrain and do not meet the requirements of large-scale monitoring.MethodsIn order to solve this problem, this study constructs a new dataset of wild licorice that was gathered using Unmanned Aerial Vehicle (UAV) and proposes a novel detection network named ALPD-Net for identifying wild licorice. …”
Get full text
Article -
2389
Explainable AI for Enhancing Efficiency of DL-Based Channel Estimation
Published 2025-01-01“…In particular, we derive the analytical expressions of the XAI-CHEST loss functions and the noise threshold fine-tuning optimization problem. Hence the designed XAI-CHEST delivers a smart low-complex one-shot input feature selection methodology for high-dimensional model input that can further improve the overall performance while optimizing the architecture of the employed model. …”
Get full text
Article -
2390
MSTNet: a multi-stage progressive network with local–global transformer fusion for image restoration
Published 2025-04-01“…Abstract Image restoration is a challenging and complex problem involving recovering the original clear image from a degraded or noisy image. …”
Get full text
Article -
2391
MGASM-Net: morphology-guided multi-task learning network with anatomic spatial mamba for 3D airway segmentation
Published 2025-06-01“…Inspired by deep supervision, a morphological feature guidance module introduces additional structural knowledge to direct attention of model to the airway regions, which helps alleviate the low intensity contrast problem. …”
Get full text
Article -
2392
Adaptive neuro-fuzzy inference systems for improved mastitis classification and diagnosis
Published 2025-07-01“…The dataset exhibited a problem of class imbalance, with the majority class (non-mastitis cases) being over-represented. …”
Get full text
Article -
2393
A Fine-Grained Aircraft Target Recognition Algorithm for Remote Sensing Images Based on YOLOV8
Published 2025-01-01“…Initially, this article designs a local detail feature module to tackle the problem of information loss in shallow networks. …”
Get full text
Article -
2394
Neutrino masses in the mirror twin Higgs with spontaneous ℤ 2 breaking
Published 2024-09-01“…Abstract We introduce a mirror twin Higgs model with spontaneous ℤ 2 symmetry breaking that ameliorates the constraints in twin Higgs cosmology and, at the same time, generates the Standard Model neutrino masses. The model features an SU(2) triplet with hypercharge 1 alongside its twin counterpart. …”
Get full text
Article -
2395
Models for analysis of water suitability
Published 2023-12-01“… The problem of unsuitability of available drinking water for safe consumption is considered. …”
Get full text
Article -
2396
Decoding the Enigmatic Synoptic Problem: An In-Depth Academic Analysis of Pentecostal Hermeneutics Applied to the Genealogy of Jesus Christ in Matthew 1:1-17 and Luke 3:23-38
Published 2025-01-01“…This article presents a Pentecostal Hermeneutics approach to resolving the synoptic problem through the genealogy of Jesus Christ in Matthew 1:1-17 and Luke 3:23-38. …”
Get full text
Article -
2397
Exact and greedy algorithms of allocating experts to maximum set of programmer teams
Published 2022-06-01“…The maximum clique search algorithm we propose accounts for the problem and graph features. Experimental results show that the exact algorithm is a reference one, and the double-greedy algorithm is very fast and can yield suboptimal solutions for large-size allocation problems.…”
Get full text
Article -
2398
Unsupervised Action Anticipation Through Action Cluster Prediction
Published 2025-01-01Get full text
Article -
2399
Interval-Aware Scheduling of Surveillance Drones: Exact and Heuristic Approaches
Published 2025-01-01“…Drones, with their high mobility and advanced features such as high-resolution cameras, offer a promising alternative to human patrols. …”
Get full text
Article -
2400
Method for Choosing a Balanced Set of Fault Tolerance Techniques for Distributed Computer Cystems
Published 2016-04-01“…In this problem we maximize reliability of DCS under constraints of system cost. …”
Get full text
Article