Search alternatives:
feature » features (Expand Search)
Showing 3,621 - 3,640 results of 11,103 for search 'feature problems', query time: 0.11s Refine Results
  1. 3621

    CharTeC-Net: An Efficient and Lightweight Character-Based Convolutional Network for Text Classification by Aboubakar Nasser Samatin Njikam, Huan Zhao

    Published 2020-01-01
    “…This paper introduces an extremely lightweight (with just over around two hundred thousand parameters) and computationally efficient CNN architecture, named CharTeC-Net (Character-based Text Classification Network), for character-based text classification problems. This new architecture is composed of four building blocks for feature extraction. …”
    Get full text
    Article
  2. 3622

    Driver and Path Detection through Time-Series Classification by Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo

    Published 2018-01-01
    “…The proposed feature model is exploited using a time-series classification approach based on a multilayer perceptron (MLP) network to evaluate their effectiveness for the goals listed above. …”
    Get full text
    Article
  3. 3623

    Studying behavior of the asymptotic solutions to P-Laplacian type diffusion-convection model by Habeeb Aal-Rkhais, Ruba Qasim

    Published 2024-06-01
    “…The rescaling method is presented to allow us to establish nonnegative local solutions to the evolution of the Cauchy problem (CP) of the nonlinear degenerate parabolic p-Laplacian process with conservation laws that are posed in one-dimensional space. …”
    Get full text
    Article
  4. 3624

    EL ALCANCE PRÁCTICO DEL LENGUAJE NO SEXISTA SOLICITADO DESDE EL PLANO NORMATIVO: ¿UNA CUESTIÓN RESUELTA? by Fernando Centenera Sanchez Seco

    Published 2011-12-01
    “…Consideration is also given to certain practices observable today which may appear to provide a solution to the foregoing situation, but which also pose some problems. …”
    Get full text
    Article
  5. 3625

    Botulinum toxin A for trismus in cephalic tetanus by Luiz Augusto F. Andrade, Sonia Maria D. Brucki

    Published 1994-09-01
    “…As in generalized forms , trismus is a prominent feature of the disease, leading to considerable difficulty in feeding, swallowing of the saliva and mouth hygiene. …”
    Get full text
    Article
  6. 3626

    MP-LLAVRec: an agricultural product recommendation algorithm based on LLAVA and user modal preference by Peishan Li, Peishan Li, Peishan Li, Lutao Gao, Lutao Gao, Lutao Gao, Lilian Zhang, Lilian Zhang, Lilian Zhang, Lin Peng, Lin Peng, Lin Peng, Chunhui Bai, Chunhui Bai, Chunhui Bai, Linnan Yang, Linnan Yang, Linnan Yang

    Published 2025-01-01
    “…However, the following three problems still exist in the traditional agricultural product recommendation domain: (1) the problem of missing modalities made it difficult for consumers to intuitively and comprehensively understood the product information; (2) most of them relied on shallow information about the basic attributes of agricultural products and ignored the deeper associations among the products; (3) they ignored the deeper connections among individual users and the intrinsic associations between the user embedding and the localized user representation in different modalities, which affected the accuracy of user modeling and hindered the final recommendation effect.MethodsTo address these problems, this paper innovatively proposed an agricultural product recommendation algorithm based on LLAVA and user behavioral characteristics, MP-LLaVRec(Modal Preference - Large Language and Vision Recommendation). …”
    Get full text
    Article
  7. 3627

    Android collusion attack detection model by Hongyu YANG, Zaiming WANG

    Published 2018-06-01
    “…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
    Get full text
    Article
  8. 3628

    Fault Diagnosis of Rolling-Element Bearing Using Multiscale Pattern Gradient Spectrum Entropy Coupled with Laplacian Score by Xiaoan Yan, Ying Liu, Peng Ding, Minping Jia

    Published 2020-01-01
    “…Nonetheless, PSE and PGSE are only able to evaluate dynamic behavior of the time series on a single scale, which implies there is no consideration of feature information at other scales. To address this problem, a novel approach entitled multiscale pattern gradient spectrum entropy (MPGSE) is further implemented to extract fault features across multiple scales, where its key parameters are determined adaptively by grey wolf optimization (GWO). …”
    Get full text
    Article
  9. 3629

    Performance Evaluation of Multimodal Multifeature Authentication System Using KNN Classification by Gayathri Rajagopal, Ramamoorthy Palaniswamy

    Published 2015-01-01
    “…However, information fused at feature level has the problem of curse in dimensionality; here PCA (principal component analysis) is used to diminish the dimensionality of the feature sets as they are high dimensional. …”
    Get full text
    Article
  10. 3630

    A Systematic Study on the Extraction and Image Reproduction of Ceramic Sculpture Artworks by Yuhong Wang

    Published 2022-01-01
    “…In order to solve the research on the extraction of ceramic sculpture artwork patterns, and, in the process of image reproduction, the problem of too few feature points in the object image, the author proposes an image stitching algorithm that combines SIFT and MSER algorithms. …”
    Get full text
    Article
  11. 3631

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article
  12. 3632

    Self-collision Detection and Motion Planning of Hydraulic Quadruped Robot by SHAO Junpeng, CHI Hanwei, SUN Guitao

    Published 2020-10-01
    “…Aiming at the selfcollision problem in the motion of fourlegged robots, the distance function method is adopted, the feature points are selected for the legs, and the distance between the feature points is detected to plan the trajectory of the foot In the research process, the threedimensional model of the quadruped robot was established, and four selfcollision position detection models were given The analysis of the leg motion space was performed Two feature points were selected on each leg, and the feature points were used to solve the feature points Control the distance between the legs to control the legs Through simulation analysis and experiment, the distance function method can be used to control the minimum distance between the two ends at 3472mm, effectively avoiding the collision problem between the legs during the running of the robot…”
    Get full text
    Article
  13. 3633

    Research on Multidomain Fault Diagnosis of Large Wind Turbines under Complex Environment by Rong Jia, Fuqi Ma, Jian Dang, Guangyi Liu, Huizhi Zhang

    Published 2018-01-01
    “…Under the complicated environment of large wind turbines, the vibration signal of a wind turbine has the characteristics of coupling and nonlinearity. The traditional feature extraction method for the signal is hard to accurately extract fault information, and there is a serious problem of information redundancy in fault diagnosis. …”
    Get full text
    Article
  14. 3634

    Low illumination image enhancement algorithm of CycleGAN coal mine based on attention mechanism and Dilated convolution by Yuanbin WANG, Yaru GUO, Jia LIU, Xu WANG, Bingchao WU, Meng LIU

    Published 2024-12-01
    “…The complex underground environment, filled with a large amount of dust and water vapor, and uneven illumination of artificial light source, leads to problems such as low illumination and loss of detail features in images collected by underground monitoring equipment, which seriously affects the real-time performance of mining safety monitoring equipment, is not good for subsequent computer vision tasks, and it is difficult to collect underground data. …”
    Get full text
    Article
  15. 3635
  16. 3636

    THE EVOLUTION OF LOCAL GOVERNMENT AND SELF-GOVERNMENT IN RUSSIA by T. Yashchuk

    Published 2017-03-01
    “…The development of the city is subject to problems of industrialization and development of the rural areas is subject to problems of collectivization. …”
    Get full text
    Article
  17. 3637

    RDSF-Net: Residual Wavelet Mamba-Based Differential Completion and Spatio-Frequency Extraction Remote Sensing Change Detection Network by Shuo Wang, Dapeng Cheng, Genji Yuan, Jinjiang Li

    Published 2025-01-01
    “…The network is designed with residual wavelet transform as the downsampler, which effectively integrates the key directional information and the overall structural information in the original features, and uses convolutional neural network and Mamba as the backbone network for both long-range and short-range feature extraction. …”
    Get full text
    Article
  18. 3638

    CFR-YOLO: A Novel Cow Face Detection Network Based on YOLOv7 Improvement by Guohong Gao, Yuxin Ma, Jianping Wang, Zhiyu Li, Yan Wang, Haofan Bai

    Published 2025-02-01
    “…First of all, the method of extracting the features of a cow’s face (including nose, eye corner, and mouth corner) is constructed. …”
    Get full text
    Article
  19. 3639

    Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation by V. V. S. H. Prasad, Swathi Sowmya Bavirthi, C. S. S. Anupama, E. Laxmi Lydia, K. Sathesh Kumar, Khalid Ammar, Mohamad Khairi Ishak

    Published 2025-07-01
    “…Furthermore, data preprocessing utilizes the min-max scaling method to convert input data into a beneficial format. Additionally, feature selection (FS) is performed using the Aquila optimizer (AO) technique to recognize the most relevant features from input data. …”
    Get full text
    Article
  20. 3640

    Intelligent Photolithography Corrections Using Dimensionality Reductions by Parag Parashar, Chandni Akbar, Tejender S. Rawat, Sparsh Pratik, Rajat Butola, Shih H. Chen, Yung-Sung Chang, Sirapop Nuannimnoi, Albert S. Lin

    Published 2019-01-01
    “…Machine learning has emerged in OPC/EPC problems because conventional optical-solver-based OPC is time-consuming, and there is no physical model existing for EPC. …”
    Get full text
    Article