Suggested Topics within your search.
Suggested Topics within your search.
-
3621
CharTeC-Net: An Efficient and Lightweight Character-Based Convolutional Network for Text Classification
Published 2020-01-01“…This paper introduces an extremely lightweight (with just over around two hundred thousand parameters) and computationally efficient CNN architecture, named CharTeC-Net (Character-based Text Classification Network), for character-based text classification problems. This new architecture is composed of four building blocks for feature extraction. …”
Get full text
Article -
3622
Driver and Path Detection through Time-Series Classification
Published 2018-01-01“…The proposed feature model is exploited using a time-series classification approach based on a multilayer perceptron (MLP) network to evaluate their effectiveness for the goals listed above. …”
Get full text
Article -
3623
Studying behavior of the asymptotic solutions to P-Laplacian type diffusion-convection model
Published 2024-06-01“…The rescaling method is presented to allow us to establish nonnegative local solutions to the evolution of the Cauchy problem (CP) of the nonlinear degenerate parabolic p-Laplacian process with conservation laws that are posed in one-dimensional space. …”
Get full text
Article -
3624
EL ALCANCE PRÁCTICO DEL LENGUAJE NO SEXISTA SOLICITADO DESDE EL PLANO NORMATIVO: ¿UNA CUESTIÓN RESUELTA?
Published 2011-12-01“…Consideration is also given to certain practices observable today which may appear to provide a solution to the foregoing situation, but which also pose some problems. …”
Get full text
Article -
3625
Botulinum toxin A for trismus in cephalic tetanus
Published 1994-09-01“…As in generalized forms , trismus is a prominent feature of the disease, leading to considerable difficulty in feeding, swallowing of the saliva and mouth hygiene. …”
Get full text
Article -
3626
MP-LLAVRec: an agricultural product recommendation algorithm based on LLAVA and user modal preference
Published 2025-01-01“…However, the following three problems still exist in the traditional agricultural product recommendation domain: (1) the problem of missing modalities made it difficult for consumers to intuitively and comprehensively understood the product information; (2) most of them relied on shallow information about the basic attributes of agricultural products and ignored the deeper associations among the products; (3) they ignored the deeper connections among individual users and the intrinsic associations between the user embedding and the localized user representation in different modalities, which affected the accuracy of user modeling and hindered the final recommendation effect.MethodsTo address these problems, this paper innovatively proposed an agricultural product recommendation algorithm based on LLAVA and user behavioral characteristics, MP-LLaVRec(Modal Preference - Large Language and Vision Recommendation). …”
Get full text
Article -
3627
Android collusion attack detection model
Published 2018-06-01“…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
Get full text
Article -
3628
Fault Diagnosis of Rolling-Element Bearing Using Multiscale Pattern Gradient Spectrum Entropy Coupled with Laplacian Score
Published 2020-01-01“…Nonetheless, PSE and PGSE are only able to evaluate dynamic behavior of the time series on a single scale, which implies there is no consideration of feature information at other scales. To address this problem, a novel approach entitled multiscale pattern gradient spectrum entropy (MPGSE) is further implemented to extract fault features across multiple scales, where its key parameters are determined adaptively by grey wolf optimization (GWO). …”
Get full text
Article -
3629
Performance Evaluation of Multimodal Multifeature Authentication System Using KNN Classification
Published 2015-01-01“…However, information fused at feature level has the problem of curse in dimensionality; here PCA (principal component analysis) is used to diminish the dimensionality of the feature sets as they are high dimensional. …”
Get full text
Article -
3630
A Systematic Study on the Extraction and Image Reproduction of Ceramic Sculpture Artworks
Published 2022-01-01“…In order to solve the research on the extraction of ceramic sculpture artwork patterns, and, in the process of image reproduction, the problem of too few feature points in the object image, the author proposes an image stitching algorithm that combines SIFT and MSER algorithms. …”
Get full text
Article -
3631
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01“…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
Get full text
Article -
3632
Self-collision Detection and Motion Planning of Hydraulic Quadruped Robot
Published 2020-10-01“…Aiming at the selfcollision problem in the motion of fourlegged robots, the distance function method is adopted, the feature points are selected for the legs, and the distance between the feature points is detected to plan the trajectory of the foot In the research process, the threedimensional model of the quadruped robot was established, and four selfcollision position detection models were given The analysis of the leg motion space was performed Two feature points were selected on each leg, and the feature points were used to solve the feature points Control the distance between the legs to control the legs Through simulation analysis and experiment, the distance function method can be used to control the minimum distance between the two ends at 3472mm, effectively avoiding the collision problem between the legs during the running of the robot…”
Get full text
Article -
3633
Research on Multidomain Fault Diagnosis of Large Wind Turbines under Complex Environment
Published 2018-01-01“…Under the complicated environment of large wind turbines, the vibration signal of a wind turbine has the characteristics of coupling and nonlinearity. The traditional feature extraction method for the signal is hard to accurately extract fault information, and there is a serious problem of information redundancy in fault diagnosis. …”
Get full text
Article -
3634
Low illumination image enhancement algorithm of CycleGAN coal mine based on attention mechanism and Dilated convolution
Published 2024-12-01“…The complex underground environment, filled with a large amount of dust and water vapor, and uneven illumination of artificial light source, leads to problems such as low illumination and loss of detail features in images collected by underground monitoring equipment, which seriously affects the real-time performance of mining safety monitoring equipment, is not good for subsequent computer vision tasks, and it is difficult to collect underground data. …”
Get full text
Article -
3635
Latency and energy-efficient multi-hop routing protocol for unmanned aerial vehicle networks
Published 2019-08-01Get full text
Article -
3636
THE EVOLUTION OF LOCAL GOVERNMENT AND SELF-GOVERNMENT IN RUSSIA
Published 2017-03-01“…The development of the city is subject to problems of industrialization and development of the rural areas is subject to problems of collectivization. …”
Get full text
Article -
3637
RDSF-Net: Residual Wavelet Mamba-Based Differential Completion and Spatio-Frequency Extraction Remote Sensing Change Detection Network
Published 2025-01-01“…The network is designed with residual wavelet transform as the downsampler, which effectively integrates the key directional information and the overall structural information in the original features, and uses convolutional neural network and Mamba as the backbone network for both long-range and short-range feature extraction. …”
Get full text
Article -
3638
CFR-YOLO: A Novel Cow Face Detection Network Based on YOLOv7 Improvement
Published 2025-02-01“…First of all, the method of extracting the features of a cow’s face (including nose, eye corner, and mouth corner) is constructed. …”
Get full text
Article -
3639
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation
Published 2025-07-01“…Furthermore, data preprocessing utilizes the min-max scaling method to convert input data into a beneficial format. Additionally, feature selection (FS) is performed using the Aquila optimizer (AO) technique to recognize the most relevant features from input data. …”
Get full text
Article -
3640
Intelligent Photolithography Corrections Using Dimensionality Reductions
Published 2019-01-01“…Machine learning has emerged in OPC/EPC problems because conventional optical-solver-based OPC is time-consuming, and there is no physical model existing for EPC. …”
Get full text
Article