Suggested Topics within your search.
Suggested Topics within your search.
-
3061
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Get full text
Article -
3062
Estimation of Tree Canopy Closure Based on U-Net Image Segmentation and Machine Learning Algorithms
Published 2025-05-01Get full text
Article -
3063
Research of the state of the stress-realizing systems in pregnant women with miscarriage
Published 2013-06-01“…The results of this work helps to develop algorithm for evaluation and prediction of the risk of miscarriage…”
Get full text
Article -
3064
Interpreting Microbial Species–Area Relationships: Effects of Sequence Data Processing Algorithms and Fitting Models
Published 2025-03-01“…This study serves as a comprehensive comparison and reference for fundamental methods in microbial SAR research. Future microbial SAR studies should carefully select the most appropriate algorithms and models based on specific research objectives and data structures.…”
Get full text
Article -
3065
Improving AOD Algorithm Evaluation: A Spatial Matching Method for Minimizing Quality Control Bias
Published 2025-03-01Get full text
Article -
3066
Evaluation Method for Running State of Electricity Meters Based on Random Matrix Theory and Clustering Algorithm
Published 2020-11-01“…Based on the principle of big data mining analysis, this paper proposes a method based on random matrix theory and clustering algorithm to evaluate the running state of electric energy meter. …”
Get full text
Article -
3067
-
3068
-
3069
Research on Hardware-in-the-loop Simulation for Traction Drive System of EMUs
Published 2018-01-01“…Finally, the correctness and effectiveness of the research were verified by comparison between HIL simulation results of EMUs with 4M4T and actual EMUs test results.…”
Get full text
Article -
3070
Research on Dead Time Compensation of Cascaded High-voltage Inverter
Published 2015-01-01Get full text
Article -
3071
Research on verification of behavior requirement patterns based on action sequences
Published 2011-01-01Get full text
Article -
3072
Researching Exotic Forms Lactuca sativa L. of Oaklieaf group
Published 2013-08-01“…Exotic forms of common knowledge varieties of Oakleaf group of salad were researched, newly developed Dublianskiy variety was applied for the official research and technical examination of plant varieties with the view of the variety official listing, as well as the rights thereof. …”
Get full text
Article -
3073
Research progress of abnormal user detection technology in social network
Published 2018-03-01“…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
Get full text
Article -
3074
Results of research on the formation of students readiness to keep the professional ethics
Published 2016-06-01“…The author presents the results of the research on the formation of readiness of future journalists to abide by professional ethics. …”
Get full text
Article -
3075
Retracted: Content-Based E-Commerce Image Classification Research
Published 2020-01-01Get full text
Article -
3076
Research on Avoidance of Energy Hole Scheme in the Wireless Mesh Network
Published 2013-11-01Get full text
Article -
3077
Automatic detection and classification of drill bit damage using deep learning and computer vision algorithms
Published 2025-04-01“…Leveraging advancements in computer vision and deep learning algorithms, this research proposes an automated detection and classification method for polycrystalline diamond compact (PDC) bit damage. …”
Get full text
Article -
3078
MetaboLINK is a novel algorithm for unveiling cell-specific metabolic pathways in longitudinal datasets
Published 2025-01-01“…IntroductionIn the rapidly advancing field of ‘omics research, there is an increasing demand for sophisticated bioinformatic tools to enable efficient and consistent data analysis. …”
Get full text
Article -
3079
-
3080