Showing 2,481 - 2,500 results of 11,103 for search 'features problems', query time: 0.12s Refine Results
  1. 2481
  2. 2482

    A Disentangled Representation-Based Multimodal Fusion Framework Integrating Pathomics and Radiomics for KRAS Mutation Detection in Colorectal Cancer by Zhilong Lv, Rui Yan, Yuexiao Lin, Lin Gao, Fa Zhang, Ying Wang

    Published 2024-09-01
    “…However, there are still two major problems in existing studies: inadequate single-modal feature learning and lack of multimodal phenotypic feature fusion. …”
    Get full text
    Article
  3. 2483

    SNet: A novel convolutional neural network architecture for advanced endoscopic image classification of gastrointestinal disorders by Samra Siddiqui, Junaid A. Khan, Tallha Akram, Meshal Alharbi, Jaehyuk Cha, Dina A. AlHammadi

    Published 2025-08-01
    “…The objective of this research is to develop a robust deep network, called SNet, that offers a solution to complex classification problems. Firstly, the endoscopic images undergo preprocessing before being subjected to feature extraction. …”
    Get full text
    Article
  4. 2484

    Fuzzy Reliability Optimization for 2-Hub Center Problem with Cluster-Based Policy and Application in Cross-Border Supply Chain Network Design Using TS Algorithm by Chenyi Yan, Xifu Wang, Kai Yang

    Published 2020-01-01
    “…This problem differs from the classical HLP in the sense that (i) the hub-and-spoke (H&S) network is grouped into two clusters in advance based on their cross-border geographic features, and (ii) a fuzzy reliability optimization approach based on the possibility measure is developed. …”
    Get full text
    Article
  5. 2485

    Cost optimization model for multi-cloud network based on Kubernetes by Ming GAO, Ming LIU, Yangting CHEN, Weiming WANG

    Published 2023-02-01
    “…The cloud-native scheduling system, represented by Kubernetes, is widely used by cloud tenants in a multi-cloud environment.The problem of network observation becomes more and more serious, especially the cost of network traffic across cloud and region.In Kubernetes, the eBPF technology was introduced to collect the network data features of kernel state of operating system to solve the network observation problem, and then the network data features were modeled as QAP, a combination of heuristic and stochastic optimization was used to obtain the best near optimal solution in a real-time computing scenario.This model is superior to the Kubernetes native scheduler in the cost optimization of network resources, which is based on the scheduling strategy of computing resources only, and increases the complexity of scheduling links in a controllable range, effectively reduces the cost of network resources in a multi-cloud area deployment environment.…”
    Get full text
    Article
  6. 2486

    Early Prediction of Cardio Vascular Disease (CVD) from Diabetic Retinopathy using improvised deep Belief Network (I-DBN) with Optimum feature selection technique by T. K. Revathi, B. Sathiyabhama, S Kaliraj, Vidhushavarshini Sureshkumar

    Published 2025-01-01
    “…However, there are many works have been carried out on classification of the disease but they focused less on feature selection and increasing the accuracy of the model. …”
    Get full text
    Article
  7. 2487

    A Hybrid Deep Learning–Based Feature Selection Approach for Supporting Early Detection of Long-Term Behavioral Outcomes in Survivors of Cancer: Cross-Sectional Study by Tracy Huang, Chun-Kit Ngan, Yin Ting Cheung, Madelyn Marcotte, Benjamin Cabrera

    Published 2025-03-01
    “…Our approach holistically has higher F1, precision, and recall scores compared to existing feature selection methods. The models in this study select several significant clinical and socioenvironmental variables as risk factors associated with the development of behavioral problems in young survivors of acute lymphoblastic leukemia. …”
    Get full text
    Article
  8. 2488

    Robustness, Exploitable Relations and History: Assessing Varitel Semantics as a Hybrid Theory of Representation by Nicolás Sebastián Sánchez

    Published 2024-11-01
    “…I will conclude that internal problems beset Shea’s theory of representation. …”
    Get full text
    Article
  9. 2489

    One-stage uncertain linear optimization by Zeinab Zarea, Alireza Ghaffari-Hadigheh Ghaffari-Hadigheh

    Published 2018-06-01
    “…Uncertainty is one of the intrinsic features of natural phenomenon and optimization is not an exception. …”
    Get full text
    Article
  10. 2490

    Enhancing classification efficiency in capsule networks through windowed routing: tackling gradient vanishing, dynamic routing, and computational complexity challenges by Gangqi Chen, Zhaoyong Mao, Junge Shen, Dongdong Hou

    Published 2024-11-01
    “…This prevents saturation and mitigates the gradient vanishing problem. In addition, a novel gradient-friendly network structure is developed to facilitate the extraction of complex features with deeper networks. …”
    Get full text
    Article
  11. 2491

    Features of structural and geometric remodeling of the heart and changes in heart diastolic filling in patients with chronic heart failure of ischemic genesis with reduced left ven... by V. A. Lysenko

    Published 2021-02-01
    “…Despite a substantial range of studies on the features of structural and geometric remodeling of the heart, changes in systolic and diastolic function of the ventricles in CHF patients, this issue still presents a challenge and needs to be improved. …”
    Get full text
    Article
  12. 2492
  13. 2493

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  14. 2494

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  15. 2495

    基于透视不变二值特征描述子的图像匹配算法 by Li-chuan GENG, Song-zhi SU, Shao-zi LI

    Published 2015-04-01
    “…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
    Get full text
    Article
  16. 2496

    Mobile platform continuous authentication scheme based on gait characteristics by Li YANG, Zhuoru MA, Chenghui ZHANG, Qingqi PEI

    Published 2019-07-01
    “…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
    Get full text
    Article
  17. 2497

    基于透视不变二值特征描述子的图像匹配算法 by Li-chuan GENG, Song-zhi SU, Shao-zi LI

    Published 2015-04-01
    “…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
    Get full text
    Article
  18. 2498
  19. 2499

    Double Cost Sensitive Random Forest Algorithm by ZHOU Yan-long, SUN Guang-lu

    Published 2021-10-01
    “…A Double Cost Sensitive Random Forest (DCS-RF) algorithm is proposed to solve the problem that the accuracy of a few classes is not ideal when the classifier identifies unbalanced data. …”
    Get full text
    Article
  20. 2500

    Technologies and Algorithms for Building the Augmented Reality by I. A. Blagoveshchenskiy, N. A. Demyankov

    Published 2013-04-01
    “…Main attention is payed to the problem of making projection of a 3D model on the marker’s plane. …”
    Get full text
    Article