Showing 5,781 - 5,800 results of 11,103 for search 'features problems', query time: 0.24s Refine Results
  1. 5781

    FRORS: An Effective Fine-Grained Retrieval Framework for Optical Remote Sensing Images by Yong-Qiang Mao, Zhizhuo Jiang, Yu Liu, Yiming Zhang, Kehan Qi, Hanbo Bi, You He

    Published 2025-01-01
    “…To solve this problem, we propose a novel fine-grained retrieval framework of optical remote sensing (FRORS) images, which aims to improve fine-grained retrieval capabilities by constructing interaction and matching between intraclass heterogeneity features, interclass commonality features, and image features. …”
    Get full text
    Article
  2. 5782

    Light Field Angular Super-Resolution via Spatial-Angular Correlation Extracted by Deformable Convolutional Network by Daichuan Li, Rui Zhong, Yungang Yang

    Published 2025-02-01
    “…However, existing LFASR methods based on DNNs fail to extract SAC features accurately and completely. Due to the limited receptive field, methods based on regular Convolutional Neural Networks (CNNs) are unable to capture SAC features from distant pixels, leading to incomplete SAC feature extraction. …”
    Get full text
    Article
  3. 5783

    Multi‐stage attention network for monaural speech enhancement by Kunpeng Wang, Wenjing Lu, Peng Liu, Juan Yao, Huafeng Li

    Published 2023-03-01
    “…To tackle such a problem, we divide the speech enhancement model into multiple stages, with a special attention mechanism introduced in each stage so that the detailed speech information is retained and the features of high levels are captured. …”
    Get full text
    Article
  4. 5784

    An Enhanced Comprehensive Learning Particle Swarm Optimizer with the Elite-Based Dominance Scheme by Chengcheng Chen, Xianchang Wang, Helong Yu, Nannan Zhao, Mingjing Wang, Huiling Chen

    Published 2020-01-01
    “…Moreover, the algorithm is favorably utilized in feature selection and three constrained engineering construction problems. …”
    Get full text
    Article
  5. 5785

    Characteristics Analysis of Mental Health Data of College Students Based on Convolutional Neural Network and TOPSIS Evaluation Model by Lanfeng Zhou

    Published 2022-01-01
    “…With the rapid development of modern society, there are many problems concerning the physical and mental health of students. …”
    Get full text
    Article
  6. 5786
  7. 5787

    Development of a vocational rehabilitation intervention to support return-to-work and well-being following major trauma: a person-based approach by Roshan das Nair, Trevor Jones, Richard Morriss, Marilyn James, Denise Kendrick, Stephen Timmons, Blerina Kellezi, Priya Patel, Jain Holmes, Jade Kettlewell, Kate Radford, Kay Bridger, Rebecca Lindley, Hereward Tresidder, Isobel Andrews, Blanca De Dios Perez, Abigail Statham, Tadeusz Jones, Karen Hoffman

    Published 2024-10-01
    “…Mechanisms of effective interventions identified in the review included early intervention, colocation, employer engagement, case coordination and work accommodations. Intervention features identified by IDWG members (n=13) from stages 1 and 2 were use of stepped-care approaches by occupational therapists (OTs) and clinical psychologists (CPs), OT/CP formulation for complex cases, assessment of mental health problems, individually tailored rehabilitation including vocational goal setting, cross-sector coordination/communication, employer engagement, phased RTW, education/advice for family/employers, exploration of work alternatives, ongoing review of physical and mental health needs, work stability monitoring. …”
    Get full text
    Article
  8. 5788

    High-capacity image steganography algorithm combining image encryption and deep learning by Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG

    Published 2021-09-01
    “…Aiming at the problem that the residual image of cover image and carrier image in the high-capacity image steganography scheme based on deep learning will expose the secret image, a high-capacity image steganography scheme combining image encryption and deep learning was proposed.An image feature extraction method was used, so that the features extracted from the cover image were consistent with the features extracted from the carrier image.Before the image steganography, the sender extracted features from the cover image as a key to encrypt the secret image.After the extractor extracted the encrypted secret image, the features were extracted from the carrier image as a key to decrypt the secret image.The experimental results show that the attacker cannot find the information of the secret image from the residual image, and the frequency of key transmission is lower, and the security of the algorithm is improved.…”
    Get full text
    Article
  9. 5789

    Progressive multi-scale multi-attention fusion for hyperspectral image classification by Hu Wang, Sixiang Quan, Jun Liu, Hai Xiao, Yingying Peng, Zhihui Wang, Huali Li

    Published 2025-08-01
    “…Although hyperspectral image classification methods based on convolutional neural networks (CNN) have noticeably improved performance, there are still certain shortcomings in the extraction of detailed and local features. Therefore, how to fully utilize spatial and spectral information in situations with limited samples has become a challenging problem. …”
    Get full text
    Article
  10. 5790

    An urban road traffic flow prediction method based on multi-information fusion by Xiao Wu, Hua Huang, Tong Zhou, Yudan Tian, Shisen Wang, Jingting Wang

    Published 2025-02-01
    “…Spatio-Temporal Graph Neural Networks (STGNN) solves the problem of combining temporal properties and spatial dependence, but does not extract long-term trends and cyclical features of historical data. …”
    Get full text
    Article
  11. 5791

    Identifying the Effective Factors in Making Trust in Online Social Networks on the perspective of Iranian experts Using Fuzzy ELECTRE by Elham Haghighi, Gholam Ali Montazer

    Published 2015-12-01
    “…By implementing Fuzzy ELECTRE on gathered data, respectively «usability factor», «supporting up to date technology factor», «integrity» and «the rate of ethics factor» are on the top of effective factors in making trust in users. In general, «web features» and «technology features» have a higher degree of importance than «security features», «individual-social features» and «cultural features». …”
    Get full text
    Article
  12. 5792

    Biclustering Multivariate Longitudinal Data with Application to Recovery Trajectories of White Matter After Sport-Related Concussion by Caleb Weaver, Luo Xiao, Qiuting Wen, Yu-Chien Wu, Jaroslaw Harezlak

    Published 2024-12-01
    “…We propose a penalized regression based method for solving this problem by exploiting the heterogeneity in the longitudinal patterns within subjects and features. …”
    Get full text
    Article
  13. 5793

    Intuitionistic Fuzzy Dimensional Analysis in Multi-Criteria Decision-Making: A Computational Approach by Luis Asuncion Perez-Dominguez, Mauro Callejas-Cuervo, Francesco Garcia-Luna

    Published 2024-01-01
    “…Furthermore, the software’s primary feature makes it easier to manipulate data utilizing a fuzzy set approach for the assessment of multi-criteria decision-making problems. …”
    Get full text
    Article
  14. 5794

    The red eye by N. du Toit, L. van Zyl

    Published 2013-02-01
    “…The red eye is a clinical problem that is encountered regularly in most primary healthcare settings. …”
    Get full text
    Article
  15. 5795

    Cross-ViT based benign and malignant classification of pulmonary nodules. by Qinfang Zhu, Liangyan Fei

    Published 2025-01-01
    “…To solve this problem, a Cross fusion attention ViT (Cross-ViT) network that fuses local features extracted by CNN and global features extracted by Transformer is proposed. …”
    Get full text
    Article
  16. 5796

    Research on new energy station network security assessment method based on improved LSTM network by LIU Shan, LI Rui, WANG Yao

    Published 2024-10-01
    “…Finally, important features were input into the long short-term memory network, and attention mechanisms were used to adaptively allocate data time and features, strengthening the emphasis on important time and features in network traffic, thereby improving the accuracy of the model for network security assessment. …”
    Get full text
    Article
  17. 5797

    A spatial bearing fault classification method based on improved APSMOTE-WKMFA by CHEN Chao, YANG Chenhao, XU Haosen, WAN Ouying, HAN Liling

    Published 2025-01-01
    “…ObjectiveAiming at the problem of low accuracy of classification of time domain features of spatial bearings, time domain indicators and wavelet packet decomposition algorithms are combined to obtain the time-frequency distribution features of spatial bearings. …”
    Get full text
    Article
  18. 5798
  19. 5799

    A Framework for Determining the Big Five Personality Traits Using Machine Learning Classification through Graphology by null Samsuryadi, Rudi Kurniawan, Julian Supardi, null Sukemi, Fatma Susilawati Mohamad

    Published 2023-01-01
    “…Therefore, this study aims to design a reliable framework using image processing and machine learning approaches such as filtering, thresholding, and normalization to determine the personality traits through handwriting features. Then, handwriting features are classified according to the Big Five model. …”
    Get full text
    Article
  20. 5800

    Monocular Image Depth Estimation Based on the Fusion of Transformer and CNN by ZHANG Tao, ZHANG Xiao-li, REN Yan

    Published 2022-12-01
    “…First, ResNet-50 is used as the backbone network of the encoder-decoder network to extract image features. At the same time, the encoder-decoder network adopts a level fusion method to fuse the features of each level of the encoder as the decoder to input to improve the utilization of multi-scale feature information by the depth estimation network. …”
    Get full text
    Article