Showing 4,621 - 4,640 results of 11,478 for search 'learning function', query time: 0.19s Refine Results
  1. 4621

    Review of Fault Detection and Diagnosis Methods in Power Plants: Algorithms, Architectures, and Trends by Camelia Adela Maican, Cristina Floriana Pană, Daniela Maria Pătrașcu-Pană, Virginia Maria Rădulescu

    Published 2025-06-01
    “…The analysis reveals a significant transition from traditional statistical methods to machine learning (ML) and deep learning (DL) models, with over 70% of recent studies employing AI-driven approaches. …”
    Get full text
    Article
  2. 4622

    Educational status influences cognitive-motor learning in older adults: going to university provides greater protection against aging than going to high school by Mariana Callil Voos, Maria Elisa Pimentel Piemonte, Letícia Lessa Mansur, Fátima Aparecida Caromano, Sonia Maria Dozzi Brucki, Luiz Eduardo Ribeiro do Valle

    “…ABSTRACT Objective: To investigate if middle-aged and older adults with a higher education would differ from those with an average education in cognitive-motor tasks involving lower limb function. Methods: A walking version of the Trail Making Test (Walking Executive Function Task, [WEFT]) was used. …”
    Get full text
    Article
  3. 4623

    Predicting grip strength-related frailty in middle-aged and older Chinese adults using interpretable machine learning models: a prospective cohort study by Lisheng Yu, Lisheng Yu, Shunshun Cao, Botian Song, Yangyang Hu

    Published 2024-12-01
    “…The SHAP summary plot showed that all features predicted frailty in order of importance, with cognitive function being considered the most important predictive feature. …”
    Get full text
    Article
  4. 4624

    Efficient handover authentication protocol for cloud-edge collaborative UAV networks by RUI Li, ZHANG Xiongwei, YANG Jibin, XU Weiguang

    Published 2025-06-01
    “…For current unmanned aerial vehicle (UAV) network handover authentication protocols in cloud-edge colla-borative environments suffered from low efficiency and lack of physical security, an efficient handover authentication protocol based on physical unclonable function was proposed, which achieved lightweight handover authentication for UAV between different ground stations within a cloud-edge architecture. …”
    Get full text
    Article
  5. 4625

    A Local–Global Graph KAN for Multi‐Class Prediction of PPI by Minghui Liu, Ying Qu

    Published 2025-05-01
    “…To mitigate data imbalance, an asymmetric loss function is utilized to better handle minority classes and improve overall prediction accuracy. …”
    Get full text
    Article
  6. 4626
  7. 4627

    LPFFNet: Lightweight Prior Feature Fusion Network for SAR Ship Detection by Xiaozhen Ren, Peiyuan Zhou, Xiaqiong Fan, Chengguo Feng, Peng Li

    Published 2025-05-01
    “…At present, many deep learning-based ship detection methods have improved the detection accuracy but also increased the complexity and computational cost. …”
    Get full text
    Article
  8. 4628

    Performance Assessment of Solar-Transformer-Consumption System Using Neural Network Approach by Ritu Gupta, Ekata, C.M. Batra

    Published 2022-08-01
    “…MATLAB code for FFBP algorithm is built to improve the values of reliability and cost function by minimizing the error up to 0.0001 precision. …”
    Get full text
    Article
  9. 4629

    Hygienic assessment of the state of health of senior pupils at the 5-day school week by V. R. Kuchma, I. K. Rapoport, S. B. Sokolova, A. Yu. Makarova

    Published 2015-06-01
    “…Activities aimed at maintaining the health in the educational institution should be aimed at creating a hygienically sound learning environments. The aim of the research was to study the effect of the mode in general education schools on 5-day training week on the State of health of pupils 10-11 classes, and also features the day students. …”
    Get full text
    Article
  10. 4630

    GuardianMPC: Backdoor-Resilient Neural Network Computation by Mohammad Hashemi, Domenic Forte, Fatemeh Ganji

    Published 2025-01-01
    “…The rapid growth of deep learning (DL) has raised serious concerns about users’ data and neural network (NN) models’ security and privacy, particularly the risk of backdoor insertion when outsourcing the training or employing pre-trained models. …”
    Get full text
    Article
  11. 4631

    Minimizing Total Weighted Completion Time on Single Machine with Past-Sequence-Dependent Setup Times and Exponential Time-Dependent and Position-Dependent Learning Effects by Kaibiao Sun, Hongxing Li

    Published 2009-01-01
    “…This paper addresses a single-machine problem in which the past-sequence-dependent (p-s-d) setup times and exponential time-dependent and position-dependent learning effects are considered. By the exponential time-dependent learning effect, it means that the processing time of a job is defined by an exponent function of the total actual processing time of the already processed jobs. …”
    Get full text
    Article
  12. 4632

    DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Zhenghai Liu

    Published 2024-11-01
    “…Furthermore, DN-ShapeIoU, a novel loss function, has been established to enhance detection accuracy, and depthwise separable convolutions have been included to decrease computational complexity. …”
    Get full text
    Article
  13. 4633

    A pose generation model for animated characters based on DCNN and PFNN by Boli Wang

    Published 2024-12-01
    “…Therefore, to reduce the cost of generating 3D animated characters and improve the similarity between animated characters and real humans, a 3D action recognition and animated character generation model based on ResNet and phase function neural network is proposed. The experiment outcomes denote that the raised model begins to converge at 50 iterations, with a minimum loss value of 0.13. …”
    Get full text
    Article
  14. 4634

    An Overview of Distributed Firewalls and Controllers Intended for Mobile Cloud Computing by Cyril Godwin Suetor, Daniele Scrimieri, Amna Qureshi, Irfan-Ullah Awan

    Published 2025-02-01
    “…It explores the complexities involved in merging Software-Defined Networking (SDN), Network Function Virtualisation (NFV), and CASB into a cohesive system, focusing on the need to resolve interoperability issues and maintain low latency and high throughput while balancing performance across distributed firewalls and controllers. …”
    Get full text
    Article
  15. 4635

    Innovative Ghost Channel Spatial Attention Network with Adaptive Activation for Efficient Rice Disease Identification by Yang Zhou, Yang Yang, Dongze Wang, Yuting Zhai, Haoxu Li, Yanlei Xu

    Published 2024-12-01
    “…Through combining the advantages of Mish and ReLU, we designed the Mish-ReLU Adaptive Activation Function (MAAF), enhancing the model’s generalization capacity and convergence speed. …”
    Get full text
    Article
  16. 4636

    Method for Augmenting Side-Scan Sonar Seafloor Sediment Image Dataset Based on BCEL1-CBAM-INGAN by Haixing Xia, Yang Cui, Shaohua Jin, Gang Bian, Wei Zhang, Chengyang Peng

    Published 2024-09-01
    “…Secondly, a BCEL1 loss function (combining binary cross-entropy and L1 loss functions) is introduced into the discriminator, enabling it to focus on both global image consistency and finer distinctions for better generation results. …”
    Get full text
    Article
  17. 4637
  18. 4638

    Promoting physical activity in middle-aged and older adults through digital intervention: matching message frame and recipient profile through deep reinforcement learning by Patrizia Catellani, Marco Piastra

    Published 2025-07-01
    “…Finally, by applying Deep Reinforcement Learning to develop an automatic strategy to quickly profile recipients and select the most effective messages . …”
    Get full text
    Article
  19. 4639

    HTCNN-Attn: a fine-grained hierarchical multi-label deep learning model for disaster emergency information intelligent extraction from social media by Shanshan Li, Qingjie Liu, Xiaoling Sun

    Published 2025-07-01
    “…The model employs a hierarchical loss function to enforce label consistency across three levels: binary disaster filtering (Level 1), mid-level category classification (Level 2), and fine-grained subcategory extraction (Level 3). …”
    Get full text
    Article
  20. 4640