Showing 10,501 - 10,520 results of 11,103 for search 'features problems', query time: 0.17s Refine Results
  1. 10501

    Building extraction method for aerial images based on DeepLabv3+ semantic segmentation by LIAO Yuanhui, WANG Jingdong, LI Haoran, YANG Heng

    Published 2024-12-01
    “…It effectively avoids the problem of merged segmentation between neighboring buildings and results in more regular segmentation boundaries, enabling more accurate extraction of the building contours.…”
    Get full text
    Article
  2. 10502

    Integration of Multivariate Beta-based Hidden Markov Models and Support Vector Machines with Medical Applications by Narges Manouchehri, Nizar Bouguila

    Published 2022-05-01
    “…Moreover, in some applications, data may have various feature-length. We tackle this problem with Fisher Kernel. …”
    Get full text
    Article
  3. 10503

    Improving Performance of KNN and C4.5 using Particle Swarm Optimization in Classification of Heart Diseases by Pareza Alam Jusia, Abdul Rahim, Herti Yani, Jasmir Jasmir

    Published 2024-06-01
    “…Heart disease is a major problem that must be overcome for human life. In recent years, the volume of medical data related to heart disease has increased rapidly, and various heart disease data has collaborated with information technology such as machine learning to detect, predict, and classify diseases. …”
    Get full text
    Article
  4. 10504

    3D Reconstruction With Spherical Cameras by Yan Cui, Qingling Chang, Qiang Liu, Xin Yang, Yajiang Huang, Shichao Chen, Fei Ren, Didier Stricker

    Published 2025-01-01
    “…In the camera locating part, we use a global descriptor augmentation model to build a labeled panorama dataset GDAP, in which the images are captured by our designed spherical cameras; In the depth estimation part, we propose a new network UMDE that can estimate the depth of both indoor and outdoor scenes; Finally, in the 3D surface reconstruction section, we turn the reconstruction problem to a graph optimization problem, called GraphFit, in which, we optimize the point clouds with s-t graph and smoothing method successively. …”
    Get full text
    Article
  5. 10505

    Degrade or Super-Resolve to Recognize? Bridging the Domain Gap for Cross-Resolution Face Recognition by Klemen Grm, Berk Kemal Ozata, Alperen Kantarci, Vitomir Struc, Hazim Kemal Ekenel

    Published 2025-01-01
    “…In this work, we address the problem of cross-resolution face recognition, where a low-resolution probe face is compared against high-resolution gallery faces. …”
    Get full text
    Article
  6. 10506

    An Efficient and Fast Image Mosaic Approach for Highway Panoramic UAV Images by Haoxin Zheng, Zhanqiang Chang, Yakai Li, Jie Zhu, Wei Wang, Qing Yang, Chou Xie, Jingfa Zhang, Jiaxi Liu

    Published 2024-01-01
    “…The cause is that the time consumption sharply increases when stitching plenty of UAV images—this is the bottleneck problem. Herein, we proposed a novel splicing method based on the Superpoint network and a self-designed algorithm of matrix iteration. …”
    Get full text
    Article
  7. 10507

    MA-VoxelMorph: Multi-scale attention-based VoxelMorph for nonrigid registration of thoracoabdominal CT images by Qing Huang, Lei Ren, Tingwei Quan, Minglei Yang, Hongmei Yuan, Kai Cao

    Published 2025-01-01
    “…To alleviate the large deformation problem, a multi-scale axial attention mechanism is utilized by using a residual dilated pyramid pooling for multi-scale feature extraction, and position-aware axial attention for long-distance dependencies between pixels capture. …”
    Get full text
    Article
  8. 10508

    MRCPs-and-ERS/D-Oscillations-Driven Deep Learning Models for Decoding Unimanual and Bimanual Movements by Jiarong Wang, Luzheng Bi, Aberham Genetu Feleke, Weijie Fei

    Published 2023-01-01
    “…The proposed model consists of a feature representation module, an attention-based channel-weighting module, and a shallow convolutional neural network module. …”
    Get full text
    Article
  9. 10509

    Electricity Theft Detection Using Rule-Based Machine Leaning (rML) Approach by Sheyda Bahrami, Erol Yumuk, Alper Kerem, Beytullah Topçu, Ahmetcan Kaya

    Published 2024-06-01
    “…With an astounding 93% recall rate for the rule-based feature space combination of the random forest classifier, this novel approach has produced outstanding results. …”
    Get full text
    Article
  10. 10510

    RUSSIAN-BELARUSIAN BORDER REGION AS AN INTERCAPITAL REGION by A. P. Katrovskiy, A. K. Nizhnikova

    Published 2022-07-01
    “…Territorial socioeconomic polarization has become the most important feature of economic dynamics in the inter-capital space. …”
    Get full text
    Article
  11. 10511

    Computer-Vision-Aided Deflection Influences Line Identification of Concrete Bridge Enhanced by Edge Detection and Time-Domain Forward Inference by Jianfeng Chen, Long Zhao, Yuliang Feng, Zhiwei Chen

    Published 2024-11-01
    “…To tackle the ill-posed nature of the inverse problem, a TDFI model is introduced to identify IL, recursively capturing the static bridge response generated by the bridge under the influence of successive axles of a multi-axle vehicle. …”
    Get full text
    Article
  12. 10512

    LEARNING INNOVATION: APPLICATION OF DISCOVERY LEARNING-BASED WORKSHEETS TO SHARPEN STUDENTS’ COLLABORATION SKILLS ON HYDROELECTRIC POWER PLANTS by Ihza Rizky Winedar, Habibatul Unayah, Muhammad Rasyid, Jumadi Jumadi, Sabar Nurohman

    Published 2025-04-01
    “…Methodology – This research employed a quasi-experimental design featuring a one-group pretest-posttest method, with 35 students at SMP IT Ibnu Abbas serving as participants. …”
    Get full text
    Article
  13. 10513

    Siamese Neural Networks in Unmanned Aerial Vehicle Target Tracking Process by Athraa Sabeeh Hasan Allak, Jianjun Yi, Haider M. Al-Sabbagh, Liwei Chen

    Published 2025-01-01
    “…At the same time, the problem of UAV target tracking has also been widely concerned. …”
    Get full text
    Article
  14. 10514

    Structural Redundancy Assessment of Adjacent Precast Concrete Box-Beam Bridges in Service by Yanling Leng, Jinquan Zhang, Ruinian Jiang, Yangjian Xiao

    Published 2020-01-01
    “…In addition, a nonlinear FE analysis is not feasible for practitioners to use. To tackle this problem, a new simplified approach based on linear FE analysis and field load testing is introduced in this paper to address the particular structural feature and topology of adjacent precast concrete box-beam bridges for the assessment of structural redundancy. …”
    Get full text
    Article
  15. 10515

    Engineering Design and Application of the Autonomous-rail Rapid Transitin Yibin City by JIANG Xiaoqing, XIAO Lei, WU Xiongtao, HU Zhengyuan, LI Shupei, HE Jie

    Published 2020-01-01
    “…In order to solve the increasing urban congestion problem, optimize the urban traffic structure and enhance the attractiveness of city, it planned seven lines, a total of 156.9 kilometers traffic network of autonomous-rail rapid transit (ART) in Yibin City of Sichuan Province. …”
    Get full text
    Article
  16. 10516

    Study on the Rolling Bearing Fault Diagnosis based on the Hilbert Envelope Spectrum Singular Value and IPSO-SVM by Qin Bo, Sun Guodong, Zhang Liqiang, Liu Yongliang, Zhang Chao, Wang Jianguo

    Published 2017-01-01
    “…For the problem that the characterization of the gear fault signal feature is difficult to extract and the structure parameters selection of support vector machine( SVM) are based on experience leads the poor precision and generalization ability of fault state recognition,a method that IPSO- SVM rolling bearing fault diagnosis based on the Hilbert envelope spectrum singular value is proposed. …”
    Get full text
    Article
  17. 10517

    Robust Predictive Functional Control for Quadrotor Flight Systems by Kai Masuda, Kenji Uchiyama

    Published 2025-07-01
    “…However, PFC does not require solving a quadratic programming problem for every control loop like MPC. This feature enables PFC to be implemented in small-scale systems such as actuators, where embedding a high-performance computer is difficult. …”
    Get full text
    Article
  18. 10518

    RESISTANT POLYMER NANOCOMPOSITES’ DEVELOPMENT AND INVESTIGATION by Yu. K. Mashkov, O. A. Kurguzova, A. S. Ruban

    Published 2018-03-01
    “…Materials and methods. The problem mentioned above is solved by means of the structural modification’s methods of the PCM polymer matrix and the technological process optimization of the composite materials’ synthesis. …”
    Get full text
    Article
  19. 10519

    Turnover tra generazioni nel settore agrario: il caso della mancata applicazione della misura PACSRG004 “Cooperazione per il ricambio generazionale” by Pippo Russo

    Published 2024-12-01
    “…Although methodological simplifications tend to underestimate the real generational change in farming, the problem remains unresolved and requires appropriate responses that will encourage the fight against aging of agricultural sector. …”
    Get full text
    Article
  20. 10520

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article