-
701
Deep learning-based time series prediction in multispectral and hyperspectral imaging for cancer detection
Published 2025-07-01“…Traditional approaches for cancer detection rely on handcrafted features and conventional machine learning algorithms, which struggle with high-dimensional spectral data, noise interference, and domain adaptation challenges. …”
Get full text
Article -
702
An improved YOLOv5s-based method for detecting rice leaves in the field
Published 2025-05-01“…Second, we introduced a coordinate attention mechanism (CA) to strengthen focus on leaf tip features under weed interference and leaf occlusion conditions. …”
Get full text
Article -
703
Stable descriptors in image recognition tasks
Published 2020-10-01“…In general, the proposed approach allows developing an effective image recognition system in the presence of various types of interference on the recognized images.…”
Get full text
Article -
704
Prediction of Bus Arrival Time Based on Gated Recurrent Unit Neural Networks
Published 2020-06-01“…Furthermore, combining more than 50 million pieces of raw data, the model uses Spark elastic distributed data set in distributed Hadoop cluster to clean data and site matching algorithm to match source data, Lasso algorithm to optimize feature options and remove interference. The simulation results reveal that the R-square fitting degree of the improved GRU model is 94.547% and the prediction efficiency is nearly 14% higher than that of traditional long short-term(LSTM) model. …”
Get full text
Article -
705
Arcing detection method of metro pantograph based on improved yolov4-tiny
Published 2023-07-01“…For the problem of strong light interference and variable background in pantograph arcing detection for metro vehicles, an arcing detection method based on an improved yolov4-tiny model is proposed. …”
Get full text
Article -
706
A Stochastic Learning Algorithm for Machine Fault Diagnosis
Published 2022-01-01“…The proposed method consists of three steps: firstly, to increase the computational efficiency of the model, the dimension of the high-dimensional data is reduced by establishing a random matrix; secondly, for enhancing the clustering influence of the sample, the input data are enhanced by feature processing; thirdly, to make the clustering effects more pronounced, the noise and interference of the data need to be processed, and the singularity value denoising method is used to denoise training data and test data. …”
Get full text
Article -
707
Wheel Tread Dynamic Detection Benchmark Positioning Method Based on Iterative Reweighted Least-squares Line Fitting
Published 2022-02-01“…After extracting the point cloud data through structured light calibration, center-line extraction and other algorithms, reference feature points of the inner side are segmented combined with tread features, and an iterative re-weighted least squares line fitting (IRLS-LF) method is used to realize robust positioning of the inner side benchmark. …”
Get full text
Article -
708
Design of Automatic Scoring System for Oral English Test Based on Sequence Matching and Big Data Analysis
Published 2021-01-01“…Aiming at the reliability of the automatic scoring system, based on the principle of sequence matching, this paper adopts the spoken speech feature extraction method to extract the features of spoken English test pronunciation and establishes a dynamic optimized spoken English pronunciation signal model based on sequence matching, which could maintain good dynamic selection and clustering ability in a strong interference environment. …”
Get full text
Article -
709
Application of Improved LSTM Model in Runoff Simulation in Arid Region of Northwest China: A Case Study of the Zuli River
Published 2025-01-01“…In view of the scarcity of measured data in the Zuli River Basin, the upper reaches of the Yellow River, as well as the difficult hydrological simulation problems caused by the intense interference of human activities, this study focused on the Zuli River Basin in the upper reaches of the Yellow River. …”
Get full text
Article -
710
SE-WiGR: A WiFi Gesture Recognition Approach Incorporating the Squeeze–Excitation Mechanism and VGG16
Published 2025-06-01“…This improvement confirms that the SE module effectively enhances gesture feature extraction while suppressing background noise.…”
Get full text
Article -
711
Generative adversarial nets in laser-induced fluorescence spectrum image recognition of mine water inrush
Published 2019-10-01“…The fluorescence spectrum from the water sample is stimulated by 405-nm lasers and improved by recursive mean filtering method to alleviate interference and auto-correlation to enhance the feature difference. …”
Get full text
Article -
712
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
713
Research on the Application of Variational Mode Decomposition Optimized by Snake Optimization Algorithm in Rolling Bearing Fault Diagnosis
Published 2024-01-01“…However, the fault signal of rolling bearing is susceptible to noise interference, which makes it difficult to extract the fault characteristics of the rolling bearing and thus affects the accuracy of the diagnosis results. …”
Get full text
Article -
714
VARIOUS HISTORICAL CONNOTATIONS OF THE CONCEPT OF SOVEREIGNTY
Published 2018-05-01“…Sovereignty as a feature of state power, shall be expressed in terms of organizing and exercising, determining and resolving internal and external problems, freely and according to its will, without any interference, respecting the sovereignty of other states, as well as European and international law norms. …”
Get full text
Article -
715
Research on deception jamming of chaotic composite short-range detection system based on bispectral analysis and genetic algorithm–back propagation
Published 2019-05-01“…In order to analyze and extract the different characteristics between deceptive jamming and target echo signal, so as to realize the anti-deceptive jamming of chaotic compound short-range detection system, this article analyzes and simulates the mathematical model of deceptive jamming and target echo, and analyzes the bispectral characteristics of the simulated echo and jamming signal, and a set of anti-deception jamming feature parameters has been constructed. The identification of deceptive interference is realized by genetic algorithm–back propagation neural network, and the recognition accuracy is high and the real-time performance is good.…”
Get full text
Article -
716
Enhanced object detection in low-visibility haze conditions with YOLOv9s.
Published 2025-01-01“…Specifically, the framework incorporates Patchwise Contrastive Learning to fortify the correlation among positive samples within image patches, effectively reducing negative sample interference and enhancing the model's capability to discern subtle local features of haze-impacted images. …”
Get full text
Article -
717
Survey on Context-Aware Radio Frequency-Based Sensing
Published 2025-01-01“…Challenges like environmental interference, scalability, and regulatory constraints are addressed, with insights into real-world mitigation strategies. …”
Get full text
Article -
718
A Method of Abnormal Behavior Detection for Safety Site Surveillance
Published 2025-01-01“…For the complex background in the image, a multiframe differential superposition algorithm is proposed to denoise the target image; a feature extraction method is given to extract features for the target image, and then a more complete image with target features is obtained after filtering; a normal behavior model is established to extract the motion information of the target from a single frame of the image; an abnormal detection method is proposed to determine whether it belongs to abnormal behavior. …”
Get full text
Article -
719
Phrasal Verbs in Learner English: A Corpus-based Study of Lithuanian and Polish Learners of English
Published 2020-08-01“…Furthermore, it is noticed that learners face similar stylistic, semantic and syntactic difficulties in the use of this language feature. In particular, the analysis shows that such errors might be caused by native language interference, as well as the inherent complexity of phrasal verbs. …”
Get full text
Article -
720
Robust Model Predictive Control for AFE-Inverter Drives With Common Mode Voltage Elimination
Published 2022-01-01“…This paper proposes a novel and robust version of Model Predictive Control scheme for AC drives based on Voltage Source Inverter (VSI) with Active Front End (AFE). The main feature of the proposed MPC is elimination of Common Mode Voltage (CMV) without imposing a penalty on the corresponding term in the cost function, but rather by a smart utilisation of the restricted set of switching states in a computationally efficient algorithm. …”
Get full text
Article