Search alternatives:
feature » features (Expand Search)
Showing 5,181 - 5,200 results of 11,103 for search 'feature problems', query time: 0.14s Refine Results
  1. 5181

    A Fast Logdet Divergence Based Metric Learning Algorithm for Large Data Sets Classification by Jiangyuan Mei, Jian Hou, Jicheng Chen, Hamid Reza Karimi

    Published 2014-01-01
    “…It is a challenging task to classify large data sets efficiently, accurately, and robustly, as large data sets always contain numerous instances with high dimensional feature space. In order to deal with this problem, in this paper we present an online Logdet divergence based metric learning (LDML) model by making use of the powerfulness of metric learning. …”
    Get full text
    Article
  2. 5182

    THE EFFECT OF TIME ON TRANSPORT SERVICES OF THE INTERNATIONAL SUPPLY CHAIN by Yu. O. Glushkova, O. Yu. Gordashnikova, A. V. Pahomova

    Published 2018-02-01
    “…The basis of the research consists of the chain  substitutions’ methods and the comparison index. The problem, the  developed block-scheme and algorithm of adjustment factor calculation and  the traffic volume dependence. …”
    Get full text
    Article
  3. 5183

    MOD3NN: A Framework for Automatic Signal Modulation Detection Using 3D CNN by Vishal Perekadan, Chaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao, Hovannes Kulhandjian, Michel Kulhandjian

    Published 2023-05-01
    “…Raw I/Q signal data exhibits a special “helical” structure that can be exploited with three-dimensional convolutions (3D convolutions) to learn spatio-temporal features from the signal for the problem of modulation recognition. …”
    Get full text
    Article
  4. 5184

    Building extraction method for aerial images based on DeepLabv3+ semantic segmentation by LIAO Yuanhui, WANG Jingdong, LI Haoran, YANG Heng

    Published 2024-12-01
    “…It effectively avoids the problem of merged segmentation between neighboring buildings and results in more regular segmentation boundaries, enabling more accurate extraction of the building contours.…”
    Get full text
    Article
  5. 5185

    Classification of Real and Fake Images Using Error Level Analysis Technique and MobileNetV2 Architecture by Muhamad Nur Baihaqi, Aris Sugiharto, Henri Tantyoko

    Published 2025-05-01
    “…This study evaluates the contribution of ELA features in classifying authentic and forged images using the MobileNetV2 model. …”
    Get full text
    Article
  6. 5186

    Integration of Multivariate Beta-based Hidden Markov Models and Support Vector Machines with Medical Applications by Narges Manouchehri, Nizar Bouguila

    Published 2022-05-01
    “…Moreover, in some applications, data may have various feature-length. We tackle this problem with Fisher Kernel. …”
    Get full text
    Article
  7. 5187

    Improving Performance of KNN and C4.5 using Particle Swarm Optimization in Classification of Heart Diseases by Pareza Alam Jusia, Abdul Rahim, Herti Yani, Jasmir Jasmir

    Published 2024-06-01
    “…Heart disease is a major problem that must be overcome for human life. In recent years, the volume of medical data related to heart disease has increased rapidly, and various heart disease data has collaborated with information technology such as machine learning to detect, predict, and classify diseases. …”
    Get full text
    Article
  8. 5188

    High-Level Codewords Based on Granger Causality for Video Event Detection by Shao-nian Huang, Dong-jun Huang, Mansoor Ahmed Khuhro

    Published 2015-01-01
    “…Video event detection is a challenging problem in many applications, such as video surveillance and video content analysis. …”
    Get full text
    Article
  9. 5189

    A Lightweight Approach to Comprehensive Fabric Anomaly Detection Modeling by Shuqin Cui, Weihong Liu, Min Li

    Published 2025-03-01
    “…In order to solve the problem of high computational resource consumption in fabric anomaly detection, we propose a lightweight network, GH-YOLOx, which integrates ghost convolutions and hierarchical GHNetV2 backbone together to capture both local and global anomaly features. …”
    Get full text
    Article
  10. 5190

    MATHEMATICAL MODELING OF FOURIER TRANSFORM IMAGING SPECTROMETER by N. K. Artioukhina, T. V. Klimovich, M. N. Kotov

    Published 2015-04-01
    “…SFTIS mathematical modeling is performed to optimize the features of the instrument.…”
    Get full text
    Article
  11. 5191

    A Review on Single-Phase AC-AC Z-Source Converters by Ebrahim Babaei, Seyed Mohammad Javad Mousavi, Mohammadamin Alami, Darioush Alizadeh

    Published 2022-06-01
    “…Therefore, several modified or improved structures along with different control methods have been introduced to solve their problems and limitations. Based on the four features, these structures can be categorized into four groups: without magnetic coupling, with magnetic coupling, able to change the frequency, and inherent commutation. …”
    Get full text
    Article
  12. 5192

    Structural Redundancy Assessment of Adjacent Precast Concrete Box-Beam Bridges in Service by Yanling Leng, Jinquan Zhang, Ruinian Jiang, Yangjian Xiao

    Published 2020-01-01
    “…In addition, a nonlinear FE analysis is not feasible for practitioners to use. To tackle this problem, a new simplified approach based on linear FE analysis and field load testing is introduced in this paper to address the particular structural feature and topology of adjacent precast concrete box-beam bridges for the assessment of structural redundancy. …”
    Get full text
    Article
  13. 5193

    Ethical Traditions of Adyghe: Genre Criteria and Main Motives by Z. Zh. Kudaeva, K. N. Paranuk, A. P. Golodova

    Published 2021-07-01
    “…It is noted that in this regard, the study of ethical traditions is one of the necessary stages in solving this problem. The main goal of the article is to determine genre features and main functions, to identify the main motives and images inherent in ethical legends. …”
    Get full text
    Article
  14. 5194

    Engineering Design and Application of the Autonomous-rail Rapid Transitin Yibin City by JIANG Xiaoqing, XIAO Lei, WU Xiongtao, HU Zhengyuan, LI Shupei, HE Jie

    Published 2020-01-01
    “…In order to solve the increasing urban congestion problem, optimize the urban traffic structure and enhance the attractiveness of city, it planned seven lines, a total of 156.9 kilometers traffic network of autonomous-rail rapid transit (ART) in Yibin City of Sichuan Province. …”
    Get full text
    Article
  15. 5195

    Study on the Rolling Bearing Fault Diagnosis based on the Hilbert Envelope Spectrum Singular Value and IPSO-SVM by Qin Bo, Sun Guodong, Zhang Liqiang, Liu Yongliang, Zhang Chao, Wang Jianguo

    Published 2017-01-01
    “…For the problem that the characterization of the gear fault signal feature is difficult to extract and the structure parameters selection of support vector machine( SVM) are based on experience leads the poor precision and generalization ability of fault state recognition,a method that IPSO- SVM rolling bearing fault diagnosis based on the Hilbert envelope spectrum singular value is proposed. …”
    Get full text
    Article
  16. 5196

    Research on Particle Filter Video Tracking Algorithms by YU Shuchun, TONG Xiaoyu

    Published 2020-08-01
    “…Aiming at the problem of insufficient robustness of moving target tracking in complex scenes, a particle filter target tracking algorithm based on CNN feature extraction is proposed CNN selflearning mechanism is used to extract highlevel semantic features of objects in images Chaotic sequence variable scale firefly algorithm is introduced to improve the accuracy of target recognition A particle filter tracking algorithm combining mean shift and weight optimization is constructed to optimize the weight of particles, improve the diversity of particle sets and make video tracking more accurate The simulation results show that the proposed algorithm can effectively adapt to occlusion, illumination, violent motion and other scenes, and has good adaptability and high realtime performance to illumination change, scale change, occlusion and so on The results of comparison with seven other methods show that under the same experimental conditions, the tracking success rate and tracking accuracy of this method are 5%~40% higher than those of other methods…”
    Get full text
    Article
  17. 5197

    Robust Predictive Functional Control for Quadrotor Flight Systems by Kai Masuda, Kenji Uchiyama

    Published 2025-07-01
    “…However, PFC does not require solving a quadratic programming problem for every control loop like MPC. This feature enables PFC to be implemented in small-scale systems such as actuators, where embedding a high-performance computer is difficult. …”
    Get full text
    Article
  18. 5198

    RESISTANT POLYMER NANOCOMPOSITES’ DEVELOPMENT AND INVESTIGATION by Yu. K. Mashkov, O. A. Kurguzova, A. S. Ruban

    Published 2018-03-01
    “…Materials and methods. The problem mentioned above is solved by means of the structural modification’s methods of the PCM polymer matrix and the technological process optimization of the composite materials’ synthesis. …”
    Get full text
    Article
  19. 5199

    Turnover tra generazioni nel settore agrario: il caso della mancata applicazione della misura PACSRG004 “Cooperazione per il ricambio generazionale” by Pippo Russo

    Published 2024-12-01
    “…Although methodological simplifications tend to underestimate the real generational change in farming, the problem remains unresolved and requires appropriate responses that will encourage the fight against aging of agricultural sector. …”
    Get full text
    Article
  20. 5200

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article