-
2241
A Multi-Feature Fusion Approach for Road Surface Recognition Leveraging Millimeter-Wave Radar
Published 2025-06-01“…The statistical features and wavelet transform features are fused at the feature level, culminating in the formation of a 56-dimensional feature vector. Four machine learning models, namely the Wide Neural Network (WNN), K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Kernel methods, are employed as classifiers for both training and testing purposes. …”
Get full text
Article -
2242
Prediction of contact resistance of electrical contact wear using different machine learning algorithms
Published 2024-01-01“…Abstract H62 brass material is one of the important materials in the process of electrical energy transmission and signal transmission, and has excellent performance in all aspects. …”
Get full text
Article -
2243
On ensuring joint tightness on the basis of technological induction
Published 2019-06-01“…In the former case, the magnetic induction vector was first oriented perpendicular to the longitudinal axis of the joint. …”
Get full text
Article -
2244
Creation of the development strategy in enterprise based on dynamic SPACE-analysis
Published 2016-09-01“…The study offers an integrated approach to the definition of policy recommendations for each strategic unit based on an analysis of superposition defined basic trajectories. S-trajectory or S-vectors can be represented as the sum of two vectors (vectors base paths): numbers and appropriate call intensity factors relevant basic trajectories since their values determine the degree of contribution of each of these basic paths in the integrated S-vector is a vector strategic set of strategic business units to achieve strategic objectives, transfered into numerical form by partial criteria by expert predictive testing. …”
Get full text
Article -
2245
Abnormal heart sound recognition using SVM and LSTM models in real-time mode
Published 2025-03-01“…The proposed solution relies on the support vector machine and the long-short term memory neural network to distinguish between normal and abnormal heartbeat sounds and to recognize the type of abnormality (in the case distinguished) respectively. …”
Get full text
Article -
2246
Klasifikasi Cyberbullying Pada Tweet Bahasa Sunda Dengan Menggunakan Hybrid Learning Model
Published 2025-03-01“…Peneliti menerapkan beberapa model machine learning yaitu random forest dan Support Vector Machine (SVM) serta model deep learning yaitu convolutional neural network-bidirectional long short-term memory (CNN-BiLSTM), CNN, dan BiLSTM. …”
Get full text
Article -
2247
Pengukuran Kemiripan Makna Menggunakan Cosine Similarity dan Basis Data Sinonim Kata
Published 2023-08-01“…This is because the use of ID based on word groups and slices during the weighting process can increase the similarity value. The average similarity value in the use of ID as a calculating vector is 94.48% and the average similarity value in the comparison method or plot is 69.96%. …”
Get full text
Article -
2248
A Novel Adaptive Fine-Tuning Algorithm for Multimodal Models: Self-Optimizing Classification and Selection of High-Quality Datasets in Remote Sensing
Published 2025-05-01“…Next, the data within each cluster are processed by calculating the translational difference between the original and perturbed data in the multimodal large model’s vector space. …”
Get full text
Article -
2249
PageRank of Gluing Networks and Corresponding Markov Chains
Published 2025-06-01“…By an innovative application of the method of gluing Markov chains, we study the properties of Markov chains and extend their applicability by accounting for the damping factor and the personalization vector. Many properties of Markov chains related to spectrums and eigenvectors of the transition matrix, including the stationary distribution, periodicity, and persistent and transient states, will be investigated as well as part of the gluing process. …”
Get full text
Article -
2250
Redes comerciales y traslado de herencias entre el Imperio Hispánico y Galicia: Andrés de Losada Sotomayor y los retornos monetarios a Compostela (1744-1790)
Published 2019-10-01“…This paper analyses the trajectory of Andres de Losada Sotomayor and his role as agent on the process of transferring the monetary wealth bequeathed by Galician (Spain) origins migrants to their parishes of birth. …”
Get full text
Article -
2251
Research on ammunition support task classification based on PPSVM
Published 2025-01-01“…In order to solve that problems of few ammunition support personnel, low support efficiency and repeated statistics, the classification model of emergency ammunition material support task is studied, the application of PPSVM in the classification of emergency ammunition material support task is analyzed, the probability output model of multi- classification support vector machine is established, and then the classification process is completed by selecting the class number with the largest posterior probability as the class output of test samples The experimental results show that the method can solve the classification problem of emergency ammunition material support task.…”
Get full text
Article -
2252
Gender Classification Based on Geometry Features of Palm Image
Published 2014-01-01“…The first one is feature extraction by image processing. The other one is classification system with polynomial smooth support vector machine (PSSVM). …”
Get full text
Article -
2253
正交面齿轮齿面偏差的坐标测量
Published 2010-01-01“…The theoretical coordinates and normal vector of points on the grid were calculated. The deviations were obtained after measuring the surface along normal direction. …”
Get full text
Article -
2254
Cognitive radio auto-adaptive sensing algorithm based on POMDP
Published 2013-06-01“…In order to design an appropriate spectrum sensing mechanism in millisecond spectrum hole environment,the optimal data transmission time of secondary users was derived to maximize the data throughput.Furthermore,in order to exploit the millisecond spectrum holes,an auto-adaptive spectrum sensing algorithm based on POMDP (partially observ-able Markov decision process) was proposed.This algorithm executes spectrum sensing or data transmission action in the current decision epoch based on the belief vector and the observation result in the last decision epoch.Simulation results show that the proposed algorithm can constrain the collision probability between primary users and secondary users,and improve systemic spectrum utilization at the same time.…”
Get full text
Article -
2255
Social network information diffusion model based on user’s influence and interesting
Published 2017-11-01“…A new non-topological information diffusion model of social network was proposed,called non-topological influence-interest diffusion model (NT-II).Representation learning was exploited to construct two hidden spaces for NT-II,called the user-influence space and the user-interest space,each user and each propagation item was mapped into a vector in space.The model predicted the probability of a user receiving a propagated item,considering not only the degree of influence from other users,but also the user's preference for propagated item.The experimental results show that the model can simulate the propagation process and predict the propagation results more accurately.…”
Get full text
Article -
2256
Gesture recognition based on flexible solar cells and ultrathin hydrogel film
Published 2023-07-01“…Daily life involves various gestures, and combining these with smart wearable devices is crucial for improving quality of life.One effective solution to the challenges of gesture recognition and device energy consumption isutilizing the photoelectric conversion characteristics of solar energy-related devices.The data of five commonly used gestures were collected in the research of the combination of flexible solar cells and gesture recognition.Z-Score, low-pass filter, sliding window techniques for signal processing were applied, and successfully achieved 100% predicted accuracy using random forest, support vector machine and neural network algorithms even with small samples which showed that this method had significant advantages in the application of gesture recognition.…”
Get full text
Article -
2257
BALANCE OF PROGRESS AND REGRESS IN THE DEVELOPMENT OF POST-INDUSTRIAL SOCIETY
Published 2018-02-01“…Modern social realities demonstrate continuous interrelation of the progressive development with a regressive vector that defines changes of public relations. This difficult multi-aspect historical process covers all spheres of post-industrial society, including its structural organization, level of stability of social system, character of internal and external contradictions.…”
Get full text
Article -
2258
Domain-specific text embedding model for accelerator physics
Published 2025-04-01“…Accelerator physics presents unique challenges for natural language processing (NLP) due to its specialized terminology and complex concepts. …”
Get full text
Article -
2259
INSTITUTIONAL TRAPS OF DIGITAL ECONOMY
Published 2022-03-01“…The author sees the ways to overcome the traps in the practical implementation of the Digital Economy Program of Russia with the main vector directed to the formation of a ((digital human» possessing the competencies of creative realization ofpersonal potential in the rapidly changing digital economic environment followed by its technical equipment actively modernized.…”
Get full text
Article -
2260
Analysis of AS path looping
Published 2013-09-01“…AS (autonomous system) path looping occurs when there are two or more same AS numbers in a AS path vector and these numbers are not adjacent to each other.After processing and analyzing the global route data from RouteViews,statistics of the total number and the ratio of AS path looping conflicts were kept every day from June 1,2011 to May 31,2013.What’s more,distribution of the duration of AS path looping conflicts and the length of prefixes where AS path looping occurs were also analyzed.On the basis of these statistics,some possible causes of AS path looping were discussed,including routing information inconsistency,multi-national companies and faulty or malicious misconfiguration.What’s more,some advices were also provided for the configuration of BGP protocol.…”
Get full text
Article