Showing 3,441 - 3,460 results of 8,676 for search 'rate data (preprocessing OR processing)', query time: 0.27s Refine Results
  1. 3441

    Design of real-time transmission system for underwater panoramic camera based on RTSP. by Wenhui Wang, Yongqi Li, Rufei He

    Published 2025-01-01
    “…The experimental results show that the data transmission effect and quality of the system are good, and the average reprojection error of the calibrated image is 0.12 pixels; During the process of data collection and transmission, the effective time window of the eye diagram is the largest, and the waveform of the top-level data transmission tends to be stable with the smallest fluctuation amsplitude; Dynamically adjust the data transmission rate, control the network packet loss rate below 0.5%, and improve the real-time transmission efficiency of underwater data.…”
    Get full text
    Article
  2. 3442

    Performance of the ALICE Zero Degree Calorimeters in LHC Run 3 by Zugravel Stefan Cristi

    Published 2025-01-01
    “…The presence of electromagnetic dissociation (EMD) processes makes the ZDC operating conditions extremely challenging, raising the readout rate for the channels of the most exposed calorimeters up to 1.4 Mevents/s, compared to an hadronic rate of about 50 Kevents/s sustained by all other detectors. …”
    Get full text
    Article
  3. 3443

    A borehole image dataset for the intelligent identification of structural planes by Yi Cheng, Zengqiang Han, Yuyong Jiao, Shuangyuan Chen, Chao Wang

    Published 2025-09-01
    “…These images underwent systematic preprocessing including data cleaning, image cropping and adjustment, rigorous annotation and verification protocols, resulting in a curated dataset of 708 borehole images. …”
    Get full text
    Article
  4. 3444

    Machine learning framework for oxytetracycline removal using nanostructured cupric oxide supported on magnetic chitosan alginate biocomposite by Hassan Rasoulzadeh, Hossein Azarpira, Mojtaba Pourakbar, Amir Sheikhmohammadi, Alieh Rezagholizade-shirvan

    Published 2025-07-01
    “…The Tikhonov model demonstrates high accuracy with R2 values of 0.973 for training data and 0.958 for testing data, showcasing strong generalization capabilities, while maintaining low error rates, as evidenced by RMSE and MAE values of 4.62 and 3.65 for training data, and 5.04 and 4.21 for testing data, respectively. …”
    Get full text
    Article
  5. 3445

    Brain Tumor Classification Using an Ensemble of Deep Learning Techniques by S Gopal Krishna Patro, Nikhil Govil, Surabhi Saxena, Brojo Kishore Mishra, Abu Taha Zamani, Achraf Ben Miled, Nikhat Parveen, Hashim Elshafie, Mosab Hamdan

    Published 2024-01-01
    “…The proposed ensemble framework begins with the image preprocessing of the brain MRI to enhance the quality of images. …”
    Get full text
    Article
  6. 3446
  7. 3447

    Rapid detection and quantification of Nile Red-stained microplastic particles in sediment samples by Masashi Tsuchiya, Tomo Kitahashi, Yosuke Taira, Hitoshi Saito, Kazumasa Oguri, Ryota Nakajima, Dhugal J. Lindsay, Katsunori Fujikura

    Published 2025-03-01
    “…In this study, we demonstrated the utility of the developed system by comparing its recovery rate and analysis time with those of the conventional methods used for manual processing. …”
    Get full text
    Article
  8. 3448

    Optimal Task Offloading Strategy for Vehicular Networks in Mixed Coverage Scenarios by Xuewen He, Yuhao Cen, Yinsheng Liao, Xin Chen, Chao Yang

    Published 2024-11-01
    “…The main constraint is that the data transmission rates of users should satisfy the quality of service. …”
    Get full text
    Article
  9. 3449

    Near real-time LOD prediction using ConvLSTM model through integrating IGS rapid LOD and effective angular momentum by Kehao Yu, Xiaoya Wang, Zhao Li, Jian Wang, Lihua Li, Weiping Jiang, Kai Yang, Jingwen Long, Yunzhao Li

    Published 2025-03-01
    “…It is not adequate for fields requiring strict real-time data processing and applications, such as precise tracking and navigation of interplanetary spacecraft, global navigation satellite system (GNSS) meteorology, real-time precision orbit determination of artificial satellites, real-time kinematic (RTK) positioning and so on. …”
    Get full text
    Article
  10. 3450

    Research on navigation method in closed-canopy orchard based on 3D LiDAR by Zhigang ZHANG, Kaiyuan BAO, Wenyu ZHANG, Fan DING, Zongyi TONG, Fukang ZHOU

    Published 2025-09-01
    “…For laser point cloud preprocessing, mounting error calibration of the liDAR was initially conducted. …”
    Get full text
    Article
  11. 3451

    Optimization of SVM Parameters with Hybrid CS-PSO Algorithms for Parkinson’s Disease in LabVIEW Environment by Duygu Kaya

    Published 2019-01-01
    “…The hybrid model shows that the accuracy of the performance achieved is 97.4359%. Also, the data classification results obtained by using SVM parameters determined by optimization are measured by precision, recall, F1 score, false positive rate (FPR), false discovery rate (FDR), false negative rate (FNR), negative predictive value (NPV), and Matthews’ correlation coefficient (MCC) parameters.…”
    Get full text
    Article
  12. 3452

    Soluble Soybean Polysaccharide Improves Quality and Shelf Life of Peanut Butter by Liangchen Zhang, Liyou Zheng, Jian Sun, Sameh A. Korma, Fahad Al-Asmari, Mengxi Xie, Miao Yu

    Published 2025-06-01
    “…Both the model predictions and experimental data confirmed that SSPS addition effectively extends the shelf life of peanut butter.…”
    Get full text
    Article
  13. 3453

    The Neural Basis of Salt Perception: A Focus on Potassium Chloride as a Sodium Alternative by Emilia Iannilli, Raffaela Fürer, Antje Welge-Lüssen, Thomas Hummel

    Published 2025-01-01
    “…High-density EEG data revealed distinct microstate patterns associated with each condition, particularly in the later stages of processing, which align with the endogenous phases of taste perception. …”
    Get full text
    Article
  14. 3454

    NEW MID-SEASON SPRING BARLEY CULTIVAR OMSKY 101 by P. N. Nikolaev, O. A. Yusova, N. I. Aniskov, I. V. Safonova, J. V. Ryapolova

    Published 2019-10-01
    “…Mathematical data processing complied with B. A. Dospekhov’s guidelines.Results. …”
    Get full text
    Article
  15. 3455

    Econometric analysis and modeling of the dynamics of the balance of payments’ development in Azerbaijan by N. S. Ayyubova

    Published 2022-05-01
    “…With differences of the first and second degree, the stationarity of the autoregressive model was determined based on the Student’s criterion by changing the lag value. In the process of modeling, the initially constructed model, covering the years 1995-2017 with five factors such as foreign investment, exports, imports, manat exchange rate, general investments, showed insufficient adequacy, that is, non-stationarity of the current account series of the balance of payments. …”
    Get full text
    Article
  16. 3456

    Integrated feature selection-based stacking ensemble model using optimized hyperparameters to predict breast cancer with smart web application by Rajib Kumar Halder, Marzana Akter Lima, Mohammed Nasir Uddin, Md.Aminul Islam, Adri Saha

    Published 2025-12-01
    “…Early detection is paramount as it significantly improves survival rates and reduces the complexity and cost of treatment. …”
    Get full text
    Article
  17. 3457

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  18. 3458

    Classification and Time-Frequency Localization of Arbitrary LPWAN Signals With Radial Deformable DETR by Chun Ho Kong, Haibo Hu

    Published 2025-01-01
    “…We devise an attention radius suitable for processing Low Power Wide Area Network (LPWAN) Spectrogram traces extracted from Software Defined Radios (SDRs) IQ data with Short-Time Fourier Transform (STFT). …”
    Get full text
    Article
  19. 3459
  20. 3460

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    “…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
    Get full text
    Article