Search alternatives:
convolution » convolutional (Expand Search)
Showing 881 - 900 results of 3,382 for search '(difference OR different) convolution', query time: 0.14s Refine Results
  1. 881

    BAM-SLDK: biologically inspired attention mechanism with spiking learnable delayed kernel synapses by Mario Chacón-Falcón, Alberto Patiño-Saucedo, Luis Camuñas-Mesa, Teresa Serrano-Gotarredona, Bernabé Linares-Barranco

    Published 2025-01-01
    “…More precisely, our main technical contributions are: (1) we add kernels to the temporal dimension to enlarge the receptive field of the convolution; (2) we time kernels activations to mimic multiple delayed times; and (3) we introduce three different pruning techniques to optimize the number of delays and parameters used. …”
    Get full text
    Article
  2. 882
  3. 883
  4. 884
  5. 885

    A Lightweight Network with Domain Adaptation for Motor Imagery Recognition by Xinmin Ding, Zenghui Zhang, Kun Wang, Xiaolin Xiao, Minpeng Xu

    Published 2024-12-01
    “…This paper proposes an innovative method that combines a lightweight convolutional neural network (CNN) with domain adaptation. …”
    Get full text
    Article
  6. 886

    Handwritten Words Image Character Extraction Adaptive Algorithm Based on the Multi-branch Structure by GUO Xiaojing, ZHAO Xiaoyuan, ZOU Songlin

    Published 2025-05-01
    “…Deep convolution layers are known for learning features at different abstraction levels, while lower layers capture more localized details. …”
    Get full text
    Article
  7. 887
  8. 888
  9. 889

    RACNet: risk assessment Net of cervical lesions in colposcopic images by Tianxiang Xu, Peizhong Liu, Ping Li, Xiaoxia Wang, Huifeng Xue, JingMing Guo, Binhua Dong, Pengming Sun

    Published 2022-12-01
    “…In colposcopy-assisted diagnosis, the difference between the different lesion grades of colposcopic images is small, and the visual similarity is high. …”
    Get full text
    Article
  10. 890

    MCAF-Net: Multi-Channel Temporal Cross-Attention Network with Dynamic Gating for Sleep Stage Classification by Xuegang Xu, Quan Wang, Changyuan Wang, Yaxin Zhang

    Published 2025-07-01
    “…To overcome these shortcomings, we present MCAF-Net, a novel network architecture that employs temporal convolution modules to extract channel-specific features from each input signal and introduces a dynamic gated multi-head cross-channel attention mechanism (MCAF) to effectively model the interdependencies between different physiological channels. …”
    Get full text
    Article
  11. 891

    Improving YOLOv11 for marine water quality monitoring and pollution source identification by Fang Wang

    Published 2025-07-01
    “…The Marine Fusion Loss (MFL) mechanism optimizes detection weight allocation among different pollutant categories, reducing false positives. …”
    Get full text
    Article
  12. 892

    Lightweight multiscale information aggregation network for land cover land use semantic segmentation from remote sensing images by Yahia Said, Oumaima Saidani, Ali Delham Algarni, Mohammad H. Algarni, Ayman Flah

    Published 2025-08-01
    “…This paper presents a lightweight neural network designed to address these challenges by integrating dense dilated convolutions with pyramid depthwise convolutions for multiscale feature extraction. …”
    Get full text
    Article
  13. 893

    SFPFMformer: Short-Term Power Load Forecasting for Proxy Electricity Purchase Based on Feature Optimization and Multiscale Decomposition by Chengfei Qi, Yanli Feng, Junling Wan, Xinying Mao, Peisen Yuan

    Published 2025-05-01
    “…Finally, we utilize a depthwise separable convolution block to extract features from power load data, which efficiently captures the pattern of change in load. …”
    Get full text
    Article
  14. 894

    Modeling of Ultrasonic Flaw Detection Processes in the Task of Searching and Visualizing Internal Defects in Assemblies and Structures by B. V. Sobol, A. N. Soloviev, P. V. Vasiliev, A. A. Lyapin

    Published 2023-12-01
    “…The study uses the finite difference method in the time domain. It is applied to identify and visualize internal defects in materials using ultrasonic nondestructive testing and convolutional generative neural networks.Results. …”
    Get full text
    Article
  15. 895
  16. 896

    Micro-expression recognition method based on progressive attention by ZHAN Ziwei, SUN Zhaocai, LI Xiang, WU Zhendong

    Published 2024-11-01
    “…First, the multi-scale convolutional module is used to learn fine-grained features from different receptive fields, extracting rich details. …”
    Get full text
    Article
  17. 897

    A Gesture Recognition Method Based on Deep Learning by DING Chi, LIN Jun, YOU Jun, YUAN Hao

    Published 2018-01-01
    “…In order to increase the accuracy and robustness of gesture recognition in video, and better utilize the advantages of different deep neural network architectures, it presented an approach to realize gesture recognition by combining multiple advanced convolutional neural network architectures. …”
    Get full text
    Article
  18. 898

    Research on Android malware detection method based on multimodal feature fusion by Ge Jike, He Mingkun, Chen Zuqin, Ling Jin, Zhang Yifan

    Published 2025-01-01
    “…Existing Android malware detection methods mainly use single-modal data to characterize program features, but fail to fully mine and fuse different feature information, resulting in unsatisfactory detection results. …”
    Get full text
    Article
  19. 899

    Visualization of internal defects using a deep generative neural network model and ultrasonic nondestructive testing by Р. V. Vasiliev, А. V. Senichev, I. Giorgio

    Published 2021-09-01
    “…The propagation of an ultrasonic wave is modeled by the finite difference method in the time domain. An ultrasonic signal received at the internal points of the control object is applied to the input of the convolutional neural network. …”
    Get full text
    Article
  20. 900

    Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks by Qazi Emad ul Haq, Muhammad Hamza Faheem, Iftikhar Ahmad

    Published 2024-11-01
    “…Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites. …”
    Get full text
    Article