Suggested Topics within your search.
Suggested Topics within your search.
-
10501
Building extraction method for aerial images based on DeepLabv3+ semantic segmentation
Published 2024-12-01“…It effectively avoids the problem of merged segmentation between neighboring buildings and results in more regular segmentation boundaries, enabling more accurate extraction of the building contours.…”
Get full text
Article -
10502
Integration of Multivariate Beta-based Hidden Markov Models and Support Vector Machines with Medical Applications
Published 2022-05-01“…Moreover, in some applications, data may have various feature-length. We tackle this problem with Fisher Kernel. …”
Get full text
Article -
10503
Improving Performance of KNN and C4.5 using Particle Swarm Optimization in Classification of Heart Diseases
Published 2024-06-01“…Heart disease is a major problem that must be overcome for human life. In recent years, the volume of medical data related to heart disease has increased rapidly, and various heart disease data has collaborated with information technology such as machine learning to detect, predict, and classify diseases. …”
Get full text
Article -
10504
3D Reconstruction With Spherical Cameras
Published 2025-01-01“…In the camera locating part, we use a global descriptor augmentation model to build a labeled panorama dataset GDAP, in which the images are captured by our designed spherical cameras; In the depth estimation part, we propose a new network UMDE that can estimate the depth of both indoor and outdoor scenes; Finally, in the 3D surface reconstruction section, we turn the reconstruction problem to a graph optimization problem, called GraphFit, in which, we optimize the point clouds with s-t graph and smoothing method successively. …”
Get full text
Article -
10505
Degrade or Super-Resolve to Recognize? Bridging the Domain Gap for Cross-Resolution Face Recognition
Published 2025-01-01“…In this work, we address the problem of cross-resolution face recognition, where a low-resolution probe face is compared against high-resolution gallery faces. …”
Get full text
Article -
10506
An Efficient and Fast Image Mosaic Approach for Highway Panoramic UAV Images
Published 2024-01-01“…The cause is that the time consumption sharply increases when stitching plenty of UAV images—this is the bottleneck problem. Herein, we proposed a novel splicing method based on the Superpoint network and a self-designed algorithm of matrix iteration. …”
Get full text
Article -
10507
MA-VoxelMorph: Multi-scale attention-based VoxelMorph for nonrigid registration of thoracoabdominal CT images
Published 2025-01-01“…To alleviate the large deformation problem, a multi-scale axial attention mechanism is utilized by using a residual dilated pyramid pooling for multi-scale feature extraction, and position-aware axial attention for long-distance dependencies between pixels capture. …”
Get full text
Article -
10508
MRCPs-and-ERS/D-Oscillations-Driven Deep Learning Models for Decoding Unimanual and Bimanual Movements
Published 2023-01-01“…The proposed model consists of a feature representation module, an attention-based channel-weighting module, and a shallow convolutional neural network module. …”
Get full text
Article -
10509
Electricity Theft Detection Using Rule-Based Machine Leaning (rML) Approach
Published 2024-06-01“…With an astounding 93% recall rate for the rule-based feature space combination of the random forest classifier, this novel approach has produced outstanding results. …”
Get full text
Article -
10510
RUSSIAN-BELARUSIAN BORDER REGION AS AN INTERCAPITAL REGION
Published 2022-07-01“…Territorial socioeconomic polarization has become the most important feature of economic dynamics in the inter-capital space. …”
Get full text
Article -
10511
Computer-Vision-Aided Deflection Influences Line Identification of Concrete Bridge Enhanced by Edge Detection and Time-Domain Forward Inference
Published 2024-11-01“…To tackle the ill-posed nature of the inverse problem, a TDFI model is introduced to identify IL, recursively capturing the static bridge response generated by the bridge under the influence of successive axles of a multi-axle vehicle. …”
Get full text
Article -
10512
LEARNING INNOVATION: APPLICATION OF DISCOVERY LEARNING-BASED WORKSHEETS TO SHARPEN STUDENTS’ COLLABORATION SKILLS ON HYDROELECTRIC POWER PLANTS
Published 2025-04-01“…Methodology – This research employed a quasi-experimental design featuring a one-group pretest-posttest method, with 35 students at SMP IT Ibnu Abbas serving as participants. …”
Get full text
Article -
10513
Siamese Neural Networks in Unmanned Aerial Vehicle Target Tracking Process
Published 2025-01-01“…At the same time, the problem of UAV target tracking has also been widely concerned. …”
Get full text
Article -
10514
Structural Redundancy Assessment of Adjacent Precast Concrete Box-Beam Bridges in Service
Published 2020-01-01“…In addition, a nonlinear FE analysis is not feasible for practitioners to use. To tackle this problem, a new simplified approach based on linear FE analysis and field load testing is introduced in this paper to address the particular structural feature and topology of adjacent precast concrete box-beam bridges for the assessment of structural redundancy. …”
Get full text
Article -
10515
Engineering Design and Application of the Autonomous-rail Rapid Transitin Yibin City
Published 2020-01-01“…In order to solve the increasing urban congestion problem, optimize the urban traffic structure and enhance the attractiveness of city, it planned seven lines, a total of 156.9 kilometers traffic network of autonomous-rail rapid transit (ART) in Yibin City of Sichuan Province. …”
Get full text
Article -
10516
Study on the Rolling Bearing Fault Diagnosis based on the Hilbert Envelope Spectrum Singular Value and IPSO-SVM
Published 2017-01-01“…For the problem that the characterization of the gear fault signal feature is difficult to extract and the structure parameters selection of support vector machine( SVM) are based on experience leads the poor precision and generalization ability of fault state recognition,a method that IPSO- SVM rolling bearing fault diagnosis based on the Hilbert envelope spectrum singular value is proposed. …”
Get full text
Article -
10517
Robust Predictive Functional Control for Quadrotor Flight Systems
Published 2025-07-01“…However, PFC does not require solving a quadratic programming problem for every control loop like MPC. This feature enables PFC to be implemented in small-scale systems such as actuators, where embedding a high-performance computer is difficult. …”
Get full text
Article -
10518
RESISTANT POLYMER NANOCOMPOSITES’ DEVELOPMENT AND INVESTIGATION
Published 2018-03-01“…Materials and methods. The problem mentioned above is solved by means of the structural modification’s methods of the PCM polymer matrix and the technological process optimization of the composite materials’ synthesis. …”
Get full text
Article -
10519
Turnover tra generazioni nel settore agrario: il caso della mancata applicazione della misura PACSRG004 “Cooperazione per il ricambio generazionale”
Published 2024-12-01“…Although methodological simplifications tend to underestimate the real generational change in farming, the problem remains unresolved and requires appropriate responses that will encourage the fight against aging of agricultural sector. …”
Get full text
Article -
10520
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article