Showing 2,641 - 2,660 results of 11,103 for search 'features problems', query time: 0.14s Refine Results
  1. 2641

    DAHD-YOLO: A New High Robustness and Real-Time Method for Smoking Detection by Jianfei Zhang, Chengwei Jiang

    Published 2025-02-01
    “…We introduce the ECA-FPN, an improved version of the feature pyramid network, designed to refine the extraction of hierarchical information and enhance cross-scale feature interactions. …”
    Get full text
    Article
  2. 2642
  3. 2643

    Encrypted traffic classification method based on convolutional neural network by Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN

    Published 2022-12-01
    “…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
    Get full text
    Article
  4. 2644

    CF-YOLO for small target detection in drone imagery based on YOLOv11 algorithm by Chengcheng Wang, Yuqi Han, Chenggui Yang, Mingjie Wu, Zaiqing Chen, Lijun Yun, Xuesong Jin

    Published 2025-05-01
    “…Firstly, addressing the issue of small target information loss that may arise from hierarchical convolutional structures, we conduct in-depth research on the Path Aggregation Network (PAN) and innovatively propose a Cross-Scale Feature Pyramid Network (CS-FPN). Secondly, to overcome the problems of positional information deviation and feature redundancy during multi-scale feature fusion, we design a Feature Recalibration Module (FRM) and a Sandwich Fusion Module. …”
    Get full text
    Article
  5. 2645

    Deep Learning Algorithm for Optimized Sensor Data Fusion in Fault Diagnosis and Tolerance by M. Elhoseny, Deepak Dasaratha Rao, Bala Dhandayuthapani Veerasamy, Noha Alduaiji, J. Shreyas, Piyush Kumar Shukla

    Published 2024-12-01
    “…Here, the major objective is to locate problems in detection by analysing previous data or sequential patterns of data that cause failure. …”
    Get full text
    Article
  6. 2646

    Speech emotion recognition algorithm of intelligent robot based on ACO-SVM by Xueliang Kang

    Published 2025-12-01
    “…In the feature selection stage, ACO algorithm is introduced to explore the optimal combination of emotion features, aiming at improving the efficiency and robustness of emotion recognition. …”
    Get full text
    Article
  7. 2647
  8. 2648

    A Temporal-Spectral Fused and Attention-Based Deep Model for Automatic Sleep Staging by Guidan Fu, Yueying Zhou, Peiliang Gong, Pengpai Wang, Wei Shao, Daoqiang Zhang

    Published 2023-01-01
    “…The TSA-Net is composed of a two-stream feature extractor, feature context learning, and conditional random field (CRF). …”
    Get full text
    Article
  9. 2649

    Positive solutions to a coupled singular anisotropic system with nonstandard growth and singular nonlinearities by Seyedeh Atefeh Fallahshams, Abdolrahman Razani

    Published 2025-06-01
    “…By employing variational methods and an approximation problem, we prove the existence of positive solutions under suitable conditions on the nonlinearities.…”
    Get full text
    Article
  10. 2650

    Spark: The First Choice for Novices by Judith Gal-Ezer, Smadar Szekely

    Published 2024-12-01
    “…Setting itself apart from its counterparts, Spark boasts an innovative formal language and a rich set of features. Unlike traditional platforms, Spark emphasizes computational problem solving over programming syntax, making it accessible to learners of all levels. …”
    Get full text
    Article
  11. 2651

    Optimizing PHEV Routing with Hybrid Mode and Partial Charging via Labeling-Based Methods by Zhenhua Chen, Qiong Chen, Yiying Chao, Cheng Xue

    Published 2025-06-01
    “…This study investigates a variant of the shortest path problem (SPP) tailored for plug-in hybrid electric vehicles (PHEVs), incorporating two practical features: hybrid energy mode switching and partial charging. …”
    Get full text
    Article
  12. 2652
  13. 2653
  14. 2654

    A multi objective collaborative reinforcement learning algorithm for flexible job shop scheduling by Jian Li, Shifa Li, Pengbo He, Huankun Li

    Published 2025-07-01
    “…First, a mathematical model for flexible job shop scheduling optimization is established, with the makespan and total energy consumption of the shop as optimization objectives, and a disjunctive-graph is introduced to represent state features. Second, two intelligent agents are designed to address the simultaneous decision making problems of jobs and machines. …”
    Get full text
    Article
  15. 2655

    THE EFFICIENCY IMPROVING OF PILOTS AND CADETS TRAINING TO SAFETY CONTROL USING THE MODIFICATIONS OF CLASSICAL METHOD OF "ROY" (PSO) by V. V. Yurasov, L. A. Yurasova

    Published 2017-11-01
    “…The increased accuracy and the introduction of additional variables in the optimization problem of security is solved based on the methodology PSO. …”
    Get full text
    Article
  16. 2656

    Multiperiod Location–Allocation Optimization of Construction Logistics Centers for Large-Scale Projects in Complex Environmental Regions by Hao Shen, Jin Zhang, Wenjie Sun, Wenguang Yang, Guoqi Li

    Published 2025-03-01
    “…However, the CLC location–allocation problem, which considers periodic demand and transportation risk, has not been adequately solved. …”
    Get full text
    Article
  17. 2657

    Introducing the ethical cycle model for resolving ethical conflicts in medical practice: addressing challenges in treating pandemic patients by Ensieh Madani, Ali Dizani, Saeedeh Saeedi Tehrani, Mansure Madani

    Published 2024-12-01
    “… Ethical dilemmas are among the most important ethical problems in medicine. With the advent of COVID-19, the moral problems of physicians have taken on new dimensions as the specific features of this disease pose additional ethical challenges that require particular solutions. …”
    Get full text
    Article
  18. 2658
  19. 2659
  20. 2660

    Cryptographic hardness assumptions identification based on discrete wavelet transform by Ke Yuan, Yu Du, Yizheng Liu, Rongjin Feng, Bowen Xu, Gaojuan Fan, Chunfu Jia

    Published 2025-06-01
    “…Based on these wavelets, a feature extraction method is designed to extract features from both ciphertexts and digital signatures. …”
    Get full text
    Article