Showing 8,461 - 8,480 results of 11,103 for search 'features problems', query time: 0.14s Refine Results
  1. 8461

    Querying 3D point clouds exploiting open-vocabulary semantic segmentation of images by A. Alami, A. Alami, F. Remondino

    Published 2024-12-01
    “…Recently, open-vocabulary and zero-shot models have addressed this problem. However, these models are still relying on some data for training and fine-tuning for specific tasks. …”
    Get full text
    Article
  2. 8462

    Who, how and where should treat a patient with surgical complications of lung cancer (organizational, diagnostic, therapeutic, socio-ethical aspects)? by E. A. Korymasov, A. S. Benian, M. A. Medvedchikov-Ardiia

    Published 2021-01-01
    “…Recognition of patients as palliative does not mean the cessation of emergency measures to save them from life-threatening complications. The problem can be solved with the participation of thoracic surgeons, oncologists, healthcare organizers.…”
    Get full text
    Article
  3. 8463

    CAML-PSPNet: A Medical Image Segmentation Network Based on Coordinate Attention and a Mixed Loss Function by Yuxia Li, Peng Li, Hailing Wang, Xiaomei Gong, Zhijun Fang

    Published 2025-02-01
    “…The problems of missed segmentation with fuzzy boundaries of segmented regions and small regions are common in segmentation tasks, and greatly decrease the accuracy of clinicians’ diagnosis. …”
    Get full text
    Article
  4. 8464

    Design of experiments for the stochastic unit commitment with economic dispatch models by Nahal Sakhavand, Jay Rosenberger, Victoria C.P. Chen, Harsha Gangammanavar

    Published 2024-01-01
    “…To address this challenge, we develop a novel DACE approach that exploits the structure of the first-stage unit commitment decision space in a design of experiments, uses features based upon solar generation, and trains a multivariate adaptive regression splines model to approximate the second stage of the stochastic unit commitment-economic dispatch problem. …”
    Get full text
    Article
  5. 8465

    FPGA-oriented lightweight multi-modal free-space detection network by Feiyi Fang, Junzhu Mao, Wei Yu, Jianfeng Lu

    Published 2023-12-01
    “…The pruning is in two parts. For the feature extractors, we propose a data-dependent filter pruner according to the principle that the low-rank feature map contains less information. …”
    Get full text
    Article
  6. 8466

    An exploration of the research framework for the coupling of farmland and rural residential land use transition under the perspective of spatial production by LI Jingjing, FENG Yingbin, GU Lei, LI Yue

    Published 2025-01-01
    “…[Objective] The exploration of feature identification, pattern judgment, and mechanism response in the coupling of farmland and rural residential land use transition is a key link in studying the complex correlation characteristics and multiple causal problems of land use transition, which is also a scientific problem that urgently needs to be solved in the land system. …”
    Get full text
    Article
  7. 8467

    Identification characteristics of non-smoking tobacco products by S. V. Kalashnikov, M. V. Shkidyuk

    Published 2021-06-01
    “…Modern trends in the reduction of cigarette consumption have led to the spread of smokeless tobacco and non-tobacco nicotine-containing products [1]; their variety creates certain problems with the identification of products in this segment. …”
    Get full text
    Article
  8. 8468

    Two-stage spline-approximation in linear structure routing by D. A. Karpov, V. I. Struchenkov

    Published 2021-10-01
    “…The main distinguishing feature of the considered design problems is that the number of elements of the required spline is usually unknown and must be determined in the process of solving the problem. …”
    Get full text
    Article
  9. 8469

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  10. 8470

    Pear Fruit Detection Model in Natural Environment Based on Lightweight Transformer Architecture by Zheng Huang, Xiuhua Zhang, Hongsen Wang, Huajie Wei, Yi Zhang, Guihong Zhou

    Published 2024-12-01
    “…Aiming at the problems of low precision, slow speed and difficult detection of small target pear fruit in a real environment, this paper designs a pear fruit detection model in a natural environment based on a lightweight Transformer architecture based on the RT-DETR model. …”
    Get full text
    Article
  11. 8471

    Comparative Analysis of Automated Machine Learning for Hyperparameter Optimization and Explainable Artificial Intelligence Models by Muhammad Salman Khan, Tianbo Peng, Hanzlah Akhlaq, Muhammad Adeel Khan

    Published 2025-01-01
    “…Artificial intelligence (AI) has been increasingly applied to solve complex real-world problems. One of the most significant challenges in AI lies in selecting and fine-tuning the optimal algorithm for a given task. …”
    Get full text
    Article
  12. 8472

    Formal Verification of Three-Valued Digital Waveforms by Nina Yu. Kutsak, Vladislav V. Podymov

    Published 2019-09-01
    “…The main results are mathematical notions, propositions, and algorithms which allow to formalize and solve a formal verification problem for considered waveforms, including: definitions for signals and waveforms which the mentioned typical digital signal features; a temporal logic suitable for formalization of waveform correctness properties, and a related verification problem statement; a solution technique for the verification problem, which is based on reduction to signal transfromation and analysis; a corresponding verification algorithm together with its correctness proof and “reasonable” complexity bounds.…”
    Get full text
    Article
  13. 8473

    From the Etymology of the Words Backup and Insurance - to the Creation of Backup and Insurance Copies of Documents in Electronic Form, Digital Documents in Archives and Libraries by Kovtaniuk Yurii

    Published 2024-01-01
    “…The aim of the article is to investigate the problem of creating insurance copies of documents in e-form and their metadata, to analyze technical solutions, the current legal and methodological framework, standards and, based on the results, to propose own vision for the creation of the appropriate technology, its regulatory and legal regulation and the solution of the terminological problem regarding its denomination, determining the purpose of the insurance fund of documents in e-form and data backups. …”
    Get full text
    Article
  14. 8474

    Optimization of spline parameters in approximation of multivalued functions by D. A. Karpov, V. I. Struchenkov

    Published 2023-04-01
    “…When designing the routes of linear structures, it is necessary to consider a problem with an unknown number of elements. An algorithm implemented for solving this problem when designing a longitudinal profile was published earlier. …”
    Get full text
    Article
  15. 8475

    A SVM Approach of Aircraft Conflict Detection in Free Flight by Xu-rui Jiang, Xiang-xi Wen, Ming-gong Wu, Ze-kun Wang, Xi Qiu

    Published 2018-01-01
    “…In this article, aircraft conflict detection is considered as a binary classification problem; therefore, it can be solved by a pattern recognition method. …”
    Get full text
    Article
  16. 8476

    Analysis of printed document identification based on Deep Learning by Dinh Thong Nguyen, Phu Quang Nguyen, Hoang Bao An Mai

    Published 2023-10-01
    “… In this study, we investigate the effectiveness of ResNet, a deep neural network architecture, for a deep learning approach to address the problem of printed document identification. ResNet is known for its ability to handle the vanishing gradient problem and learn highly representative features. …”
    Get full text
    Article
  17. 8477
  18. 8478

    Analysis of printed document identification based on Deep Learning by Dinh Thong Nguyen, Phu Quang Nguyen, Hoang Bao An Mai

    Published 2023-10-01
    “… In this study, we investigate the effectiveness of ResNet, a deep neural network architecture, for a deep learning approach to address the problem of printed document identification. ResNet is known for its ability to handle the vanishing gradient problem and learn highly representative features. …”
    Get full text
    Article
  19. 8479

    Onboard LiDAR–Camera Deployment Optimization for Pavement Marking Distress Fusion Detection by Ciyun Lin, Wenjian Sun, Ganghao Sun, Bown Gong, Hongchao Liu

    Published 2025-06-01
    “…First, LiDAR and camera sensors’ detection capability was assessed based on the sensors’ built-in features. Then, the LiDAR–camera deployment problem was mathematically formulated for pavement marking distress fusion detection. …”
    Get full text
    Article
  20. 8480

    An Energy-Efficient Clustering Routing Protocol Based on Evolutionary Game Theory in Wireless Sensor Networks by Deyu Lin, Quan Wang, Deqin Lin, Yong Deng

    Published 2015-11-01
    “…The features that sensor nodes are powered by battery and have severe energy constraint make the design of energy-efficient protocol a key task for wireless sensor networks (WSNs). …”
    Get full text
    Article