Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 4
- Research 3
- Study and teaching 3
- Education 2
- Law 2
- Social sciences 2
- ART / Digital 1
- Advertising 1
- Biotechnology 1
- Business communication 1
- Chemistry Techniques, Analytical 1
- Clinical psychology 1
- Comparative method 1
- Computer animation 1
- Consumer Behavior 1
- Cross-cultural studies 1
- Digital cinematography 1
- Drinking Behavior 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Ethnology 1
- Experimental methods 1
-
1401
Application of Image Recognition Methods to Determine Land Use Classes
Published 2025-04-01Get full text
Article -
1402
The influence of correlated features on neural network attribution methods in geoscience
Published 2025-01-01“…With correlated input features, learning methods can produce many networks that achieve very similar performance (e.g., arising from different initializations). …”
Get full text
Article -
1403
Virtual histopathology methods in medical imaging - a systematic review
Published 2024-11-01“…Abstract Virtual histopathology is an emerging technology in medical imaging that utilizes advanced computational methods to analyze tissue images for more precise disease diagnosis. …”
Get full text
Article -
1404
-
1405
Desentiment: A New Method to Control Sentimental Tendency During Summary Generation
Published 2025-05-01“…Due to a scarcity of labeled data for sentiment-supervised summarization, we utilize sentiment sentences from original texts as positive samples in the training process, augmented with a prompt learning method. Our method achieves a better result on the CNN/DailyMail and XSum datasets regarding sentiment scores and has a small influence on the semantic information of summaries. …”
Get full text
Article -
1406
Artificial intelligence methods used in various aquaculture applications: A systematic literature review
Published 2025-02-01“…After a rigorous screening process involving over 116 studies, 57 highly relevant works were identified and analyzed according to key themes involving demonstrated AI applications, employed methodologies and challenges that are expected when applying such methods. The findings revealed that AI‐driven tools such as computer vision, machine learning, and predictive modeling hold much potential for enhancing sustainability, efficiency, and productivity within aquaculture operations through applications like disease monitoring, environmental management, and production optimization. …”
Get full text
Article -
1407
Implications of Flexible Learning to Politics and Economics of Educational Management
Published 2022-10-01Subjects: Get full text
Article -
1408
ACCELERATING THE FORMATION OF CHILDREN’S VALUES IN A LEARNING ENVIRONMENT
Published 2017-04-01“…Pilot data got during the experiment prove the model is an innovative method of pedagogical interaction and a «practical tool» for teachers. …”
Get full text
Article -
1409
ABOUT LYRICS AND CHILDREN: A REVIEW OF THE BOOK “THE APPLICATION OF THE MNEMONIC METHOD AT PRESCHOOL AGE: FOR THE PERCEPTION AND LEARNING OF A LYRICAL WORK”
Published 2023-12-01“…This peer-reviewed book examines the application of the mnemonic method to rote learning of a lyric work at preschool age. …”
Get full text
Article -
1410
Method to generate cyber deception traffic based on adversarial sample
Published 2020-09-01“…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
Get full text
Article -
1411
Occlusion Vehicle Target Recognition Method Based on Component Model
Published 2024-11-01Get full text
Article -
1412
Method to generate cyber deception traffic based on adversarial sample
Published 2020-09-01“…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
Get full text
Article -
1413
Voice Adversarial Sample Generation Method for Ultrasonicization of Motion Noise
Published 2024-01-01“…Ingeniously integrating ultrasonic noise into the original vocal recordings, our method can mislead sophisticated deep learning systems while remaining undetectable to the human ear, leading to erroneous outcomes in voice-based applications. …”
Get full text
Article -
1414
Research on Personalized Course Resource Recommendation Method Based on GEMRec
Published 2025-01-01“…Compared with existing methods, GEMRec achieves 0.267, 0.265, and 0.297 on the Precision@10, Recall@10, and NDCG@10 metrics, respectively, significantly outperforming traditional collaborative filtering and other deep learning models. …”
Get full text
Article -
1415
Cross-language refactoring detection method based on edit sequence
Published 2024-12-01“…Aiming at the problems of unreliable commit message caused by developers not consistently recording refactoring operations, and language singularityin deep learning-based refactoring detection methods, a cross-language refactoring detection method RefCode was proposed. …”
Get full text
Article -
1416
Process management method in head and neck cancer patient care
Published 2025-05-01Get full text
Article -
1417
-
1418
Specific Emitter Identification Method for Limited Samples via Time–Wavelet Spectrum Consistency
Published 2025-01-01“…We propose a TFC-CNN method. Specifically, we first use continuous wavelet transform (CWT) as a data augmentation method to construct time–wavelet spectrum sample pairs. …”
Get full text
Article -
1419
Improving Cell Nuclei Segmentation in Pathological Tissues Using Self-Supervised Regression Method
Published 2025-01-01“…This study introduces a novel self-supervised learning approach for nuclei segmentation in WSIs, comparing its efficacy against other self-supervised techniques and traditional methods. …”
Get full text
Article -
1420
An efficient non-parametric feature calibration method for few-shot plant disease classification
Published 2025-05-01“…The temporal and spatial irregularity of plant diseases results in insufficient image data for certain diseases, challenging traditional deep learning methods that rely on large amounts of manually annotated data for training. …”
Get full text
Article