Suggested Topics within your search.
Suggested Topics within your search.
-
8461
Querying 3D point clouds exploiting open-vocabulary semantic segmentation of images
Published 2024-12-01“…Recently, open-vocabulary and zero-shot models have addressed this problem. However, these models are still relying on some data for training and fine-tuning for specific tasks. …”
Get full text
Article -
8462
Who, how and where should treat a patient with surgical complications of lung cancer (organizational, diagnostic, therapeutic, socio-ethical aspects)?
Published 2021-01-01“…Recognition of patients as palliative does not mean the cessation of emergency measures to save them from life-threatening complications. The problem can be solved with the participation of thoracic surgeons, oncologists, healthcare organizers.…”
Get full text
Article -
8463
CAML-PSPNet: A Medical Image Segmentation Network Based on Coordinate Attention and a Mixed Loss Function
Published 2025-02-01“…The problems of missed segmentation with fuzzy boundaries of segmented regions and small regions are common in segmentation tasks, and greatly decrease the accuracy of clinicians’ diagnosis. …”
Get full text
Article -
8464
Design of experiments for the stochastic unit commitment with economic dispatch models
Published 2024-01-01“…To address this challenge, we develop a novel DACE approach that exploits the structure of the first-stage unit commitment decision space in a design of experiments, uses features based upon solar generation, and trains a multivariate adaptive regression splines model to approximate the second stage of the stochastic unit commitment-economic dispatch problem. …”
Get full text
Article -
8465
FPGA-oriented lightweight multi-modal free-space detection network
Published 2023-12-01“…The pruning is in two parts. For the feature extractors, we propose a data-dependent filter pruner according to the principle that the low-rank feature map contains less information. …”
Get full text
Article -
8466
An exploration of the research framework for the coupling of farmland and rural residential land use transition under the perspective of spatial production
Published 2025-01-01“…[Objective] The exploration of feature identification, pattern judgment, and mechanism response in the coupling of farmland and rural residential land use transition is a key link in studying the complex correlation characteristics and multiple causal problems of land use transition, which is also a scientific problem that urgently needs to be solved in the land system. …”
Get full text
Article -
8467
Identification characteristics of non-smoking tobacco products
Published 2021-06-01“…Modern trends in the reduction of cigarette consumption have led to the spread of smokeless tobacco and non-tobacco nicotine-containing products [1]; their variety creates certain problems with the identification of products in this segment. …”
Get full text
Article -
8468
Two-stage spline-approximation in linear structure routing
Published 2021-10-01“…The main distinguishing feature of the considered design problems is that the number of elements of the required spline is usually unknown and must be determined in the process of solving the problem. …”
Get full text
Article -
8469
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01“…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
Get full text
Article -
8470
Pear Fruit Detection Model in Natural Environment Based on Lightweight Transformer Architecture
Published 2024-12-01“…Aiming at the problems of low precision, slow speed and difficult detection of small target pear fruit in a real environment, this paper designs a pear fruit detection model in a natural environment based on a lightweight Transformer architecture based on the RT-DETR model. …”
Get full text
Article -
8471
Comparative Analysis of Automated Machine Learning for Hyperparameter Optimization and Explainable Artificial Intelligence Models
Published 2025-01-01“…Artificial intelligence (AI) has been increasingly applied to solve complex real-world problems. One of the most significant challenges in AI lies in selecting and fine-tuning the optimal algorithm for a given task. …”
Get full text
Article -
8472
Formal Verification of Three-Valued Digital Waveforms
Published 2019-09-01“…The main results are mathematical notions, propositions, and algorithms which allow to formalize and solve a formal verification problem for considered waveforms, including: definitions for signals and waveforms which the mentioned typical digital signal features; a temporal logic suitable for formalization of waveform correctness properties, and a related verification problem statement; a solution technique for the verification problem, which is based on reduction to signal transfromation and analysis; a corresponding verification algorithm together with its correctness proof and “reasonable” complexity bounds.…”
Get full text
Article -
8473
From the Etymology of the Words Backup and Insurance - to the Creation of Backup and Insurance Copies of Documents in Electronic Form, Digital Documents in Archives and Libraries
Published 2024-01-01“…The aim of the article is to investigate the problem of creating insurance copies of documents in e-form and their metadata, to analyze technical solutions, the current legal and methodological framework, standards and, based on the results, to propose own vision for the creation of the appropriate technology, its regulatory and legal regulation and the solution of the terminological problem regarding its denomination, determining the purpose of the insurance fund of documents in e-form and data backups. …”
Get full text
Article -
8474
Optimization of spline parameters in approximation of multivalued functions
Published 2023-04-01“…When designing the routes of linear structures, it is necessary to consider a problem with an unknown number of elements. An algorithm implemented for solving this problem when designing a longitudinal profile was published earlier. …”
Get full text
Article -
8475
A SVM Approach of Aircraft Conflict Detection in Free Flight
Published 2018-01-01“…In this article, aircraft conflict detection is considered as a binary classification problem; therefore, it can be solved by a pattern recognition method. …”
Get full text
Article -
8476
Analysis of printed document identification based on Deep Learning
Published 2023-10-01“… In this study, we investigate the effectiveness of ResNet, a deep neural network architecture, for a deep learning approach to address the problem of printed document identification. ResNet is known for its ability to handle the vanishing gradient problem and learn highly representative features. …”
Get full text
Article -
8477
Specific study of dialectisms in the native (tatar) language and literature classes in a polylingual education (on the example of dialect somatisms)
Published 2023-03-01“…The need to solve the problem of studying dialectisms in the context of multilingual education is a relevant issue. …”
Get full text
Article -
8478
Analysis of printed document identification based on Deep Learning
Published 2023-10-01“… In this study, we investigate the effectiveness of ResNet, a deep neural network architecture, for a deep learning approach to address the problem of printed document identification. ResNet is known for its ability to handle the vanishing gradient problem and learn highly representative features. …”
Get full text
Article -
8479
Onboard LiDAR–Camera Deployment Optimization for Pavement Marking Distress Fusion Detection
Published 2025-06-01“…First, LiDAR and camera sensors’ detection capability was assessed based on the sensors’ built-in features. Then, the LiDAR–camera deployment problem was mathematically formulated for pavement marking distress fusion detection. …”
Get full text
Article -
8480
An Energy-Efficient Clustering Routing Protocol Based on Evolutionary Game Theory in Wireless Sensor Networks
Published 2015-11-01“…The features that sensor nodes are powered by battery and have severe energy constraint make the design of energy-efficient protocol a key task for wireless sensor networks (WSNs). …”
Get full text
Article