Showing 61 - 80 results of 499 for search 'explicit performance information', query time: 0.11s Refine Results
  1. 61
  2. 62

    Autoencoders with shared and specific embeddings for multi-omics data integration by Chao Wang, Michael J. O’Connell

    Published 2025-08-01
    “…Results In this study we propose a novel autoencoder (AE) structure with explicitly defined orthogonal loss between the shared and specific embeddings to integrate different data sources. …”
    Get full text
    Article
  3. 63
  4. 64

    DA-YOLOv7: A Deep Learning-Driven High-Performance Underwater Sonar Image Target Recognition Model by Zhe Chen, Guohao Xie, Xiaofang Deng, Jie Peng, Hongbing Qiu

    Published 2024-09-01
    “…New modules such as the Omni-Directional Convolution Channel Prior Convolutional Attention Efficient Layer Aggregation Network (OA-ELAN), Spatial Pyramid Pooling Channel Shuffling and Pixel-level Convolution Bilat-eral-branch Transformer (SPPCSPCBiFormer), and Ghost-Shuffle Convolution Enhanced Layer Aggregation Network-High performance (G-ELAN-H) are central to its design, which reduce the computational burden and enhance the accuracy in detecting small targets and capturing local features and crucial information. …”
    Get full text
    Article
  5. 65
  6. 66
  7. 67

    Lexicon-enhanced transformer with spatial-aware integration for Chinese named entity recognition by Jiachen Huang, Shuo Liu

    Published 2025-07-01
    “…Compared to previous state-of-the-art models, it achieves comparable or better performance.…”
    Get full text
    Article
  8. 68

    Shuffled Frog-Leaping Algorithm Metaheuristic for Extractive Single- Document Summarization by Juan-David Yip-Herrera, Martha-Eliana Mendoza-Becerra

    Published 2024-12-01
    “… Due to the increasing amount of information available on the Internet, it is important for users to have a summary containing the most important ideas from the documents they find, in order to quickly identify which ones to read. …”
    Get full text
    Article
  9. 69
  10. 70
  11. 71
  12. 72

    Identity Hides in Darkness: Learning Feature Discovery Transformer for Nighttime Person Re-Identification by Xin Yuan, Ying He, Guozhu Hao

    Published 2025-01-01
    “…To this end, we propose a novel nighttime person Re-ID method, termed Feature Discovery Transformer (FDT), explicitly capturing the pedestrian identity information hidden in darkness at night. …”
    Get full text
    Article
  13. 73

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  14. 74

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  15. 75
  16. 76
  17. 77

    Interpreting Covid-19 Tests and the Uncertainty by Bayesian Methodology by Tomáš Karel

    Published 2025-06-01
    “…Employing Bayesian simulations for posterior predictive values can reduce diagnostic errors and improve public health outcomes by upgrading the performance of RATs and explicitly propagating posterior uncertainty in clinical diagnosis, as described in this study.…”
    Get full text
    Article
  18. 78

    Multi-pulse Fourier codes for bit transmission at the quantum limit by Matteo Rosati

    Published 2025-01-01
    “…Bit-transmission can be enhanced by the use of quantum detection techniques, realizing a joint-detection receiver (JDR) that is able to decode transmitted signals via a collective operation and achieve the Holevo channel capacity. Explicit JDR designs proposed so far employ the Hadamard or Fourier transform to perform a phase-to-intensity translation of the information encoding, effectively falling in the class of on-off-keying (OOK) modulation techniques; they improve over classical decoders but fall short of the Holevo capacity, particularly at large signal mean photon number $n\gtrsim1$ . …”
    Get full text
    Article
  19. 79

    Estimation of genetic admixture proportions via haplotypes by Seyoon Ko, Eric M. Sobel, Hua Zhou, Kenneth Lange

    Published 2024-12-01
    “…The present paper explores the option of explicitly incorporating haplotypes in ancestry estimation. …”
    Get full text
    Article
  20. 80

    MHOE-DETR: A Ship Detection Method for Small and Fuzzy Targets Based on Satellite Remote Sensing Image Data by Zhuhua Hu, Xiyu Fan, Yaochi Zhao, Wei Wu, Jie Liu

    Published 2025-01-01
    “…In order to address these issues, we propose the following solutions. A hybrid explicit spatial prior MH-Net network based on Manhattan distance is designed. …”
    Get full text
    Article