Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
3841
METHOD OF FILTER SELECTION FOR SPECLE-NOISE SMOOTHING IN SAR IMAGES
Published 2016-09-01“…It allows selecting the filters with better speckle noise smoothing effect. Unlike the known approaches, the presented method is based on ENL parameter calculation for automatically selected areas.…”
Get full text
Article -
3842
Analysis for Detecting Banana Leaf Disease Using the CNN Method
Published 2025-03-01“…To solve this problem, fast and accurate automated detection is needed to help farmers effectively identify diseases on banana leaves. This research focuses on developing a banana leaf disease detection model using Convolutional Neural Network (CNN) method with MobileNetV2 architecture. …”
Get full text
Article -
3843
An Interpretable Method for Anomaly Detection in Multivariate Time Series Predictions
Published 2025-07-01“…In the selection of important features, we adopt the method of multiplying the absolute gradient by the input to measure the independent effects of different dimensions of data. …”
Get full text
Article -
3844
Spatial Circular Granulation Method Based on Multimodal Finger Feature
Published 2016-01-01“…In order to test the performance of the multilevel FGs, a top-down matching method is proposed. Experimental results show that the proposed method achieves higher accuracy recognition rate in finger feature recognition.…”
Get full text
Article -
3845
Rapid Laser Ranging Method for Compact LiDAR Systems
Published 2025-03-01“…Analysis and experiments validate its effectiveness. In the experiments, the method demonstrated a ranging accuracy of 5 mm, a ranging precision of 2 mm (1σ), and a rapid ranging rate of 10 MHz. …”
Get full text
Article -
3846
Polarimetric Calculation Method of Global Pixel for Underwater Image Restoration
Published 2021-01-01“…The experimental results demonstrate that the global pixel calculation method has obvious effect on image detail recovery of the underwater scene to realize the clear underwater vision. …”
Get full text
Article -
3847
Use of front epipharyngoscopy method for diagnostics of adenoids and adenoiditis in children
Published 2021-06-01“…The effectiveness and safety of the front epipharyngoscopy method for diagnostics of adenoids and adenoiditis in children were determined. …”
Get full text
Article -
3848
IDENTIFICATION OF MESHING STIFFNESS FUNCTION BY MEANS OF FINITE ELEMENT METHOD
Published 2014-03-01“…Nevertheless, these methods are burdened by some limitations with the effect of significant disagreement between foreseen (by simulation) and an actual behavior of real objects. …”
Get full text
Article -
3849
The decomposition possibility of vietnamese monazite concentrate by the pressure alkali method
Published 2025-03-01Get full text
Article -
3850
Realization Method of Digital Filter in Pathological Assistant Diagnosis System
Published 2022-02-01“…The pathology-assisted diagnosis system adopts the method of placing a filter on the slice to filter the light source and obtain the monochromatic parallel light, which is used to calculate the optical density parameter of the image to reflect the content of a certain substance in the slice.But the use of filter not only reduces the color contrast of the image, which interferes with the doctor’s follow-up diagnosis and increases the possibility of misdiagnosis, but also increases expenditure costs.In order to solve this problem, the CGAN model is trained to realize the conversion from unfiltered image to a filtered image, which is used to replace the hardware filter, and the trained model is called a digital filter.In order to improve the performance of the digital filter, a full-scale jump connection is added to the generator to improve the quality of the generated image, and the integral optical density constraint is added to the loss function to facilitate accurate measurement of the integrated optical density of the nucleus in the generated image.Experiments show that the digital filter can achieve the filtering effect of a hardware filter, and the generated image is close to the real filtered image in terms of visual effects.In the task of calculating the integral optical density of the cell nucleus, the generated image deviates 5.3% from the real filtered image with a mean value of 119, the performance is improved by 10.9%, 3.2%, and 6.1% compared with CycleGAN, pix2pix, and pix2pixHD methods.…”
Get full text
Article -
3851
Cross-language refactoring detection method based on edit sequence
Published 2024-12-01“…Secondly, the CodeBERT pre-training model was combined with the BiLSTM-attention model to train and test on the dataset. Finally, the effectiveness of the proposed method was evaluated from six perspectives. …”
Get full text
Article -
3852
Hyperspectral Image Change Detection Method Based on the Balanced Metric
Published 2025-02-01“…Experiments show that on the four datasets, the proposed method can achieve a good change detection effect.…”
Get full text
Article -
3853
ORGANIZATION AND METHOD FOR THE REMOTE LABORATORY WORK OF GENERAL TECHNICAL DISCIPLINE
Published 2016-05-01“…The authors consider structure of the distant system to real experiments control and the method of realization distant laboratory work in the educational process. …”
Get full text
Article -
3854
An Instructional Optimization Method Based on Bidirectional Transformer and Reinforcement Learning
Published 2025-01-01“…Existing recommendation methods often struggle with effectively modeling learner interests, addressing the cold-start problem, and dynamically adapting recommendation strategies to meet personalized needs. …”
Get full text
Article -
3855
Node Classification Method Based on Hierarchical Hypergraph Neural Network
Published 2024-11-01Get full text
Article -
3856
An Aerodynamic Method for the Analysis of Isolated Horizontal-Axis Wind Turbines
Published 1997-01-01“…In most existing performance-analysis methods, wind turbines are considered isolated so that interference effects caused by other rotors or by the site topology are neglected. …”
Get full text
Article -
3857
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
3858
Parametric Design Method and Performance Analysis of Double S-Shaped Nozzles
Published 2019-01-01“…A parametric design method, which was based on super-elliptical transition and self-adaption infrared radiation shield for the double S-shaped nozzle, was introduced. …”
Get full text
Article -
3859
Tolerance to Morphine Analgesia: Influence of Pain and Method of Morphine Delivery
Published 2000-01-01“…These results show the importance of the method used to deliver morphine in determining the effects of pain on the development of tolerance to morphine analgesia.…”
Get full text
Article -
3860
Method of integrated consideration of factors for calculation of anchor system of pontoons
Published 2024-11-01Get full text
Article