Showing 3,621 - 3,640 results of 5,425 for search 'complex layer', query time: 0.12s Refine Results
  1. 3621

    A New Control Scheme for Three-level Shunt Active Filter Using Artificial Neural Network Controllers to Eliminate the Current Harmonics and Compensate Reactive Power by Chenai Salim, Benchouia M.T

    Published 2024-02-01
    “…In order to gain the advantages of the three-level inverter and artificial neural networks and to reduce the complexity of classical control schemes, a new active power filter configuration controlled by two MLPNN (Multi-Layer Perceptron Neural Network) is proposed in this paper. …”
    Get full text
    Article
  2. 3622
  3. 3623

    Digital security risk identification and model construction of smart city based on deep learning by Zhilei Zhao

    Published 2025-07-01
    “…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
    Get full text
    Article
  4. 3624

    Dendritic overgrowth and elevated ERK signaling during neonatal development in a mouse model of autism. by Ning Cheng, Fawaz Alshammari, Elizabeth Hughes, Maryam Khanbabaei, Jong M Rho

    Published 2017-01-01
    “…Further, basal dendrites in the BTBR mice had higher branching complexity. In contrast, cross-sectional area of the soma was unchanged. …”
    Get full text
    Article
  5. 3625

    Re-LSTM: A long short-term memory network text similarity algorithm based on weighted word embedding by Weidong Zhao, Xiaotong Liu, Jun Jing, Rongchang Xi

    Published 2022-12-01
    “…The hidden features and state information of the layer above each gate are considered for extracting more implicit features. …”
    Get full text
    Article
  6. 3626

    On the Design of Junction Termination for 4H-SiC High-Voltage Devices by Zimo Yuan, Anders Hallen, Mietek Bakowski

    Published 2025-01-01
    “…A buried termination structure, where implanted zones are buried under a thin field buffer layer is proposed to obtain a nearly rectangular field distribution at the SiC/oxide interface. …”
    Get full text
    Article
  7. 3627

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  8. 3628

    XIAP protection of photoreceptors in animal models of retinitis pigmentosa. by Kevin C Leonard, Dino Petrin, Stuart G Coupland, Adam N Baker, Brian C Leonard, Eric C LaCasse, William W Hauswirth, Robert G Korneluk, Catherine Tsilfidis

    Published 2007-03-01
    “…Despite the complexity of the underlying genetic basis for RP, the final common pathway is photoreceptor cell death via apoptosis.…”
    Get full text
    Article
  9. 3629

    A Machine Learning-Based Framework for Measuring Attack Surfaces of IoT Systems by Bandar M. Alshammari

    Published 2025-01-01
    “…Moreover, the latest increase in intelligent cyberattacks along with the complexity increase in IoT architectures place a greater risk that many of those cyberattacks will not be discovered until very late stages. …”
    Get full text
    Article
  10. 3630

    Multi-Scale Construction Site Fire Detection Algorithm with Integrated Attention Mechanism by Haipeng Sun, Tao Yao

    Published 2025-06-01
    “…First, considering the wide range of scale variations in detected objects, an additional detection layer with a 64-times down-sampling rate is introduced to enhance the algorithm’s detection capability for multi-scale targets. …”
    Get full text
    Article
  11. 3631

    Image-Based Malware Detection Using Deep CNN Models by hawraa omran musa, Muhanad Tahrir Younis

    Published 2025-06-01
    “…The architecture of the proposed CNN primarily consists of more than one convolutional layer, max-pooling, dropout to mitigate overfitting problem, fully connected layers for achieving better classification results. …”
    Get full text
    Article
  12. 3632

    Self-Supervised Neural Networks for Precoding in MIMO Rate Splitting Multiple Access Systems by Dheeraj Raja Kumar, Carles Anton-Haro, Xavier Mestre

    Published 2025-01-01
    “…Complementarily, we compare their complexity in terms of the number of trainable parameters and computation time. …”
    Get full text
    Article
  13. 3633

    A lightweight transformer based multi task learning model with dynamic weight allocation for improved vulnerability prediction by Lan Liu, Zhanfa Hui, Guiming Chen, Tingfeng Cai, Chiyu Zhou

    Published 2025-08-01
    “…To address this, we propose the MTLPT: Multi-Task Learning with Position Encoding and Lightweight Transformer for Vulnerability Prediction, a novel multi-task learning framework that leverages custom lightweight Transformer blocks and position encoding layers to effectively capture long-range dependencies and complex patterns in source code. …”
    Get full text
    Article
  14. 3634

    Design of an Optimal Convolutional Neural Network Architecture for MRI Brain Tumor Classification by Exploiting Particle Swarm Optimization by Sofia El Amoury, Youssef Smili, Youssef Fakhri

    Published 2025-01-01
    “…PSO systematically searches for an optimal configuration of architectural parameters—such as the types and numbers of layers, filter quantities and sizes, and neuron numbers in fully connected layers—with the objective of enhancing classification accuracy. …”
    Get full text
    Article
  15. 3635

    The Relationship Among Trade Openness, Financial Development and Economic Growth Indicators and Income Distribution Inequality: Testing the Kuznets, Financial Kuznets, and Stolper-... by İsmail Hakkı İşcan, Tuğba Demirel

    Published 2024-02-01
    “…While the empirical underpinning within developed countries aligns with the Stolper-Samuelson premise, the observed outcomes in developing nations diverge from the tenets of the Stolper-Samuelson hypothesis, thereby introducing a layer of complexity to the overall findings.…”
    Get full text
    Article
  16. 3636

    A unified elliptic curve cryptographic algorithm for secure communication and homomorphic encryption: A multi-parameter (Built-in CIA) Approach by Josepha Menandas J, Mary Subaja Christo

    Published 2025-06-01
    “…Data security is a critical concern due to the increasing volume and complexity of data being generated and processed. Data security involves implementing strategies, protocols, and technologies to safeguard data from unknown access, breaches, and other threats. …”
    Get full text
    Article
  17. 3637

    Real time weed identification with enhanced mobilevit model for mobile devices by Xiaoyan Liu, Qingru Sui, Zhihui Chen

    Published 2025-07-01
    “…Also, existing methods generally use large, slow multi-layer convolutional networks (CNNs), which are impractical for use on mobile embedded devices. …”
    Get full text
    Article
  18. 3638

    A Two-Phase Embedding Approach for Secure Distributed Steganography by Kamil Woźniak, Marek R. Ogiela, Lidia Ogiela

    Published 2025-02-01
    “…Subsequently, this internal key is further divided and embedded using a shared stego key known only to the sender and receiver, adding an additional security layer. The algorithm effectively reduces key management complexity while enhancing resilience against sophisticated steganalytic attacks. …”
    Get full text
    Article
  19. 3639

    Multi-granularity representation learning with vision Mamba for infrared small target detection by Yongji Li, Luping Wang, Shichao Chen

    Published 2025-08-01
    “…Transformer with quadratic computational complexity struggles for local feature refinement. Inspired by the quad-directional scanning State Space Model (SSM) with linear complexity for long-range modeling, this research reconceptualizes the spatial and structural information of small targets in IR images. …”
    Get full text
    Article
  20. 3640

    Two-stage Mamba-based diffusion model for image restoration by Lei Liu, Luan Ma, Shuai Wang, Jun Wang, Silas N. Melo

    Published 2025-07-01
    “…However, transformer-based methods face high computational costs due to quadratic complexity, while diffusion-based methods often struggle with suboptimal results due to inaccurate noise estimation. …”
    Get full text
    Article