Showing 1,401 - 1,420 results of 51,339 for search 'learning (method OR methods)', query time: 0.41s Refine Results
  1. 1401
  2. 1402

    The influence of correlated features on neural network attribution methods in geoscience by Evan Krell, Antonios Mamalakis, Scott A. King, Philippe Tissot, Imme Ebert-Uphoff

    Published 2025-01-01
    “…With correlated input features, learning methods can produce many networks that achieve very similar performance (e.g., arising from different initializations). …”
    Get full text
    Article
  3. 1403

    Virtual histopathology methods in medical imaging - a systematic review by Muhammad Talha Imran, Imran Shafi, Jamil Ahmad, Muhammad Fasih Uddin Butt, Santos Gracia Villar, Eduardo Garcia Villena, Tahir Khurshaid, Imran Ashraf

    Published 2024-11-01
    “…Abstract Virtual histopathology is an emerging technology in medical imaging that utilizes advanced computational methods to analyze tissue images for more precise disease diagnosis. …”
    Get full text
    Article
  4. 1404
  5. 1405

    Desentiment: A New Method to Control Sentimental Tendency During Summary Generation by Hongyu Cao, Jinlong Li

    Published 2025-05-01
    “…Due to a scarcity of labeled data for sentiment-supervised summarization, we utilize sentiment sentences from original texts as positive samples in the training process, augmented with a prompt learning method. Our method achieves a better result on the CNN/DailyMail and XSum datasets regarding sentiment scores and has a small influence on the semantic information of summaries. …”
    Get full text
    Article
  6. 1406

    Artificial intelligence methods used in various aquaculture applications: A systematic literature review by Thurein Aung, Rafiza Abdul Razak, Adibi Rahiman Bin Md Nor

    Published 2025-02-01
    “…After a rigorous screening process involving over 116 studies, 57 highly relevant works were identified and analyzed according to key themes involving demonstrated AI applications, employed methodologies and challenges that are expected when applying such methods. The findings revealed that AI‐driven tools such as computer vision, machine learning, and predictive modeling hold much potential for enhancing sustainability, efficiency, and productivity within aquaculture operations through applications like disease monitoring, environmental management, and production optimization. …”
    Get full text
    Article
  7. 1407
  8. 1408

    ACCELERATING THE FORMATION OF CHILDREN’S VALUES IN A LEARNING ENVIRONMENT by A. I. Mantarova, I. A. Angelova

    Published 2017-04-01
    “…Pilot data got during the experiment prove the model is an innovative method of pedagogical interaction and a «practical tool» for teachers. …”
    Get full text
    Article
  9. 1409

    ABOUT LYRICS AND CHILDREN: A REVIEW OF THE BOOK “THE APPLICATION OF THE MNEMONIC METHOD AT PRESCHOOL AGE: FOR THE PERCEPTION AND LEARNING OF A LYRICAL WORK” by Bojidar Angelov

    Published 2023-12-01
    “…This peer-reviewed book examines the application of the mnemonic method to rote learning of a lyric work at preschool age. …”
    Get full text
    Article
  10. 1410

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article
  11. 1411
  12. 1412

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article
  13. 1413

    Voice Adversarial Sample Generation Method for Ultrasonicization of Motion Noise by Jun Wang, Juan Liu

    Published 2024-01-01
    “…Ingeniously integrating ultrasonic noise into the original vocal recordings, our method can mislead sophisticated deep learning systems while remaining undetectable to the human ear, leading to erroneous outcomes in voice-based applications. …”
    Get full text
    Article
  14. 1414

    Research on Personalized Course Resource Recommendation Method Based on GEMRec by Enliang Wang, Zhixin Sun

    Published 2025-01-01
    “…Compared with existing methods, GEMRec achieves 0.267, 0.265, and 0.297 on the Precision@10, Recall@10, and NDCG@10 metrics, respectively, significantly outperforming traditional collaborative filtering and other deep learning models. …”
    Get full text
    Article
  15. 1415

    Cross-language refactoring detection method based on edit sequence by Tao LI, Dongwen ZHANG, Yang ZHANG, Kun ZHENG

    Published 2024-12-01
    “…Aiming at the problems of unreliable commit message caused by developers not consistently recording refactoring operations, and language singularityin deep learning-based refactoring detection methods, a cross-language refactoring detection method RefCode was proposed. …”
    Get full text
    Article
  16. 1416
  17. 1417
  18. 1418

    Specific Emitter Identification Method for Limited Samples via Time–Wavelet Spectrum Consistency by Chunyang Tang, Jing Lian, Li Zheng, Rui Gao

    Published 2025-01-01
    “…We propose a TFC-CNN method. Specifically, we first use continuous wavelet transform (CWT) as a data augmentation method to construct time–wavelet spectrum sample pairs. …”
    Get full text
    Article
  19. 1419

    Improving Cell Nuclei Segmentation in Pathological Tissues Using Self-Supervised Regression Method by Hesham Ali, Mostafa Hammouda, Mustafa Elattar, Sahar Selim

    Published 2025-01-01
    “…This study introduces a novel self-supervised learning approach for nuclei segmentation in WSIs, comparing its efficacy against other self-supervised techniques and traditional methods. …”
    Get full text
    Article
  20. 1420

    An efficient non-parametric feature calibration method for few-shot plant disease classification by Jiqing Li, Zhendong Yin, Dasen Li, Hongjun Zhang, Mingdong Xu

    Published 2025-05-01
    “…The temporal and spatial irregularity of plant diseases results in insufficient image data for certain diseases, challenging traditional deep learning methods that rely on large amounts of manually annotated data for training. …”
    Get full text
    Article