Suggested Topics within your search.
Suggested Topics within your search.
-
2681
A novel multi-scale and fine-grained network for large choroidal vessels segmentation in OCT
Published 2025-01-01“…To address the problem of low contrast and blurred boundaries of choroidal vessels in OCT images, we developed a large kernel and multi-scale attention module, which can improve the features of the target area through multi-scale convolution kernels, channel mixing and feature refinement. …”
Get full text
Article -
2682
Research on rock strength prediction model based on machine learning algorithm
Published 2024-12-01“…By selecting different features, the optimal feature combination for predicting rock compressive strength was obtained, and the optimal parameters for different models were obtained through the Sparrow Search Algorithm (SSA). …”
Get full text
Article -
2683
Machine Learning Models for Tracking Blood Loss and Resuscitation in a Hemorrhagic Shock Swine Injury Model
Published 2024-10-01“…Hemorrhage leading to life-threatening shock is a common and critical problem in both civilian and military medicine. Due to complex physiological compensatory mechanisms, traditional vital signs may fail to detect patients’ impending hemorrhagic shock in a timely manner when life-saving interventions are still viable. …”
Get full text
Article -
2684
DepthRL: a weakly supervised approach for monocular depth estimation using deep reinforcement learning
Published 2025-06-01“…In this network, we introduce the Multiscale Cross Attention Feature Enhancement Module (MCFEM), which enhances the upward transfer of low-order features, allowing high-level semantics to be complemented by low-level local details. …”
Get full text
Article -
2685
Preparation of future teachers for project activities of schoolchildren
Published 2022-11-01“…The article presents an analysis of theoretical studies, accumulated pedagogical experience on the problems of project activities of students in general education institutions and the preparation of future teachers for project activities of schoolchildren. …”
Get full text
Article -
2686
Optimal Consumption, Leisure, and Investment with Partial Borrowing Constraints over a Finite Horizon
Published 2025-03-01“…We study an optimal consumption, leisure, and investment problem over a finite horizon in a continuous-time financial market with partial borrowing constraints. …”
Get full text
Article -
2687
-
2688
Machine Learning in Baseball Analytics: Sabermetrics and Beyond
Published 2025-04-01Get full text
Article -
2689
A multistrategy improved hunger games search algorithm
Published 2025-08-01“…Moreover, a binary variant, BMHGS_V3, using sigmoid transformation, attains an average classification accuracy of 92.3% on ten UCI datasets for feature selection tasks. The proposed MHGS algorithm provides a novel and effective framework for solving complex optimization problems, demonstrating significant theoretical and practical value in the field of computational intelligence.…”
Get full text
Article -
2690
GrotUNet: a novel leaf segmentation method
Published 2025-07-01“…The former two make full use of the design ideas of GoogLeNet parallel branching and Resnet residual connectivity, while the latter further mines the fine-grained semantic information distributed in the feature space on the feature map after extraction by the WGRblock module to make the feature expression richer. …”
Get full text
Article -
2691
Oil well productivity capacity prediction based on support vector machine optimized by improved whale algorithm
Published 2024-10-01“…Aiming at these problems, a well productivity prediction method based on machine learning algorithm was proposed. …”
Get full text
Article -
2692
Toward Intelligent Financial Advisors for Identifying Potential Clients: A Multitask Perspective
Published 2022-03-01“…Then, we propose a Multitask Feature Extraction Model (MFEM), which can leverage useful information contained in these related tasks and learn them jointly, thereby solving the two problems simultaneously. …”
Get full text
Article -
2693
Evolving Hybrid Deep Neural Network Models for End-to-End Inventory Ordering Decisions
Published 2023-11-01“…However, current approaches predominantly rely on feed-forward networks, which may have difficulty capturing temporal correlations in time series data and identifying relevant features, resulting in less accurate predictions. <i>Methods:</i> Addressing this gap, we introduce novel E2E deep learning frameworks that combine Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) for resolving single-period inventory ordering decisions, also termed the Newsvendor Problem (NVP). …”
Get full text
Article -
2694
Research onconvolutional neural network for reservoir parameter prediction
Published 2016-10-01“…As the branch of artificial intelligence,artificial neural network solved many difficult practical problems in pattern recognition and classification prediction field successfully.However,they cannot learn the feature from networks.In recent years,deep learning becomes more and more advanced,but the research on the field of geological reservoir pa-rameter prediction is still rare.A method to predict reservoir parameters by convolutional neural network was presented,which can not only predict reservoir parameters accurately,but also get features of the geological reservoir.The study es-tablished the convolutional neural network model.Results show that the convolutional neural network can be used for reservoir parameter prediction,and get high prediction precision.Moreover,convolutional features from convolutional neural network provided important support for geological modeling and logging interpretation.…”
Get full text
Article -
2695
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
2696
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
2697
Analyzing and Classifying Risks Arising During Innovation Project Implementation in Aircraft Motor-Building
Published 2021-04-01Get full text
Article -
2698
Fast Visual Tracking With Robustifying Kernelized Correlation Filters
Published 2018-01-01“…Occlusion and fast motion problems can be effectively solved by the expansion of the search area. …”
Get full text
Article -
2699
Self‐Supervised Pre‐Training and Few‐Shot Finetuning for Gas‐Bearing Prediction
Published 2025-06-01Get full text
Article -
2700
Small target detection in UAV view based on improved YOLOv8 algorithm
Published 2025-01-01“…Firstly, a bi-directional feature pyramid network (BiFPN) is introduced to enhance the fusion capability of the features. …”
Get full text
Article