-
941
-
942
Research on Iterative Learning Method for Lower Limb Exoskeleton Rehabilitation Robot Based on RBF Neural Network
Published 2025-05-01“…We propose a novel control strategy integrating iterative learning with RBF neural network-based sliding mode control, featuring a single hidden-layer pre-feedback architecture. …”
Get full text
Article -
943
-
944
Short-term photovoltaic power forecasting based on a new hybrid deep learning model incorporating transfer learning strategy
Published 2024-12-01“…Subsequently, the temporal characteristics between the features are extracted in the BiLSTM layer. Finally, an attention mechanism is used to strengthen the key features by assigning weights to efficiently construct the relationship between the features and output variables. …”
Get full text
Article -
945
Graph-enhanced implicit aspect-level sentiment analysis based on multi-prompt fusion
Published 2025-05-01“…Additionally, they often use short texts with few available features, making the analysis more challenging. To this end, this paper proposes a generative model for graph-enhanced implicit aspect-level sentiment analysis based on multi-prompt fusion. …”
Get full text
Article -
946
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
Get full text
Article -
947
Application of optical flow method in metro train speed measurement
Published 2022-03-01“…Subway speed is an important parameter of train control system. The traditional subway speed measurement methods have some defects. …”
Get full text
Article -
948
Adversarial training driven malicious code detection enhancement method
Published 2022-09-01“…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
Get full text
Article -
949
-
950
Load identification method based on one class classification combined with fuzzy broad learning
Published 2022-05-01Get full text
Article -
951
An integrated strategy based on radiomics and quantum machine learning: diagnosis and clinical interpretation of pulmonary ground-glass nodules
Published 2025-07-01“…The CT images was randomly divided into training and testing cohorts (80:20), with radiomic features extracted from the training cohort. …”
Get full text
Article -
952
-
953
A Study on Canopy Volume Measurement Model for Fruit Tree Application Based on LiDAR Point Cloud
Published 2025-01-01“…Additionally, improvements to the mesh integral volume method incorporate the effects of canopy gaps in height difference calculations, significantly enhancing the accuracy of canopy volume estimation. For feature selection, a random forest-based recursive feature elimination method with cross-validation was employed to filter 10 features. …”
Get full text
Article -
954
Audio recognition method of belt conveyor roller fault based on convolutional neural network and linear regression
Published 2025-06-01“…Finally, based on two weak classifiers, using the spectrogram and sound quality features as data sources, fusion of multimodal faulty features and enrich data dimensions, based on the spectrogram and sound quality features, residual convolutional neural network computing image features, fast fitting of audio basic features using multiple linear regression, a roller fault voiceprint representation model combining convolutional neural network and linear regression is generated for joint training. …”
Get full text
Article -
955
A Spatiotemporal Sequence Prediction Framework Based on Mask Reconstruction: Application to Short-Duration Precipitation Radar Echoes
Published 2025-07-01“…During pre-training, the model learns global structural features of meteorological systems from sparse contexts by randomly masking local spatiotemporal regions of radar images. …”
Get full text
Article -
956
P-TAME: Explain Any Image Classifier With Trained Perturbations
Published 2025-01-01Get full text
Article -
957
Sentinel-2 Masking CNNs Trained on Physics-Supervised Labels
Published 2025-01-01“…Rather than relying on manually labeled data, the proposed method selects high-quality training samples from Python-based atmospheric correction software (PACO), using pixel selection strategies to remove ambiguous or inconsistent labels. …”
Get full text
Article -
958
Methodology for the organisation of professional training of senior citizens: general concept
Published 2021-04-01“…The conceptual model for the organisation of professional training of senior citizens is developed from the point of system-based approach and includes the following elements: 1) clarification of conceptual apparatus of senior adult education; 2) determination of anatomical and physiological features of senior citizens; 3) argumentation of the need of senior citizens for professional training; 4) determination of the peculiarities of professional training for senior citizens; 5) development of prerequisites list for successful learning of senior citizens; 6) formulation of learning objectives and tasks for its organisation; 7) choice of approaches for building the model of training and its principles as well as methodology for determining the quality and results of training.Practical significance. …”
Get full text
Article -
959
Machine Training of the System of Functional Diagnostics of the Shaft Lifting Machine
Published 2019-08-01Get full text
Article -
960
Preoperative MR - based model for predicting prognosis in patients with intracranial extraventricular ependymoma
Published 2025-06-01“…Objectives: To develop and validate a prediction model based on brain MRI features to predict disease-free survival (DFS) and overall survival (OS) for patients with intracranial extraventricular ependymoma (IEE). …”
Get full text
Article