Search alternatives:
feature » features (Expand Search)
Showing 541 - 560 results of 5,074 for search 'feature network (evolution OR evaluation)', query time: 0.23s Refine Results
  1. 541

    Multi-Branch CNN-LSTM Fusion Network-Driven System With BERT Semantic Evaluator for Radiology Reporting in Emergency Head CTs by Selene Tomassini, Damiano Duranti, Abdallah Zeggada, Carlo Cosimo Quattrocchi, Farid Melgani, Paolo Giorgini

    Published 2025-01-01
    “…Our model utilizes a pretrained VGG16, processing groups of five slices simultaneously, and features multiple end-to-end LSTM branches, each specialized in predicting one caption, subsequently combined to form the ordered reports after a BERT-based semantic evaluation. …”
    Get full text
    Article
  2. 542
  3. 543
  4. 544

    Comparative Evaluation of Modified Wasserstein GAN-GP and State-of-the-Art GAN Models for Synthesizing Agricultural Weed Images in RGB and Infrared Domain by Shubham Rana, Matteo Gatti

    Published 2025-06-01
    “…This study investigates the application of modified Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) to generate synthetic RGB and infrared (IR) datasets to meet the annotation requirements for wild radish (Raphanus raphanistrum). …”
    Get full text
    Article
  5. 545

    Improving Aerobics Posture Evaluation by Transfer Learning: Humanized Computational Application of BERT-PTA Domain Adaptive Methods by Wenting Zhou, Biao Guo, Feng Cao

    Published 2025-05-01
    “…Second, the BERT-PTA model was used to extract features from the preprocessed posture data. Next, a convolutional neural network was used to construct a key point localization model for aerobics poses, and transfer learning was used to train and fine-tune the model. …”
    Get full text
    Article
  6. 546

    Grading evaluation method for inter-turn short circuit of permanent magnet traction motor based on deep Gaussian processes by DAI Jisheng, HU Dean, XU Hailong, ZHU Wenlong, LIAO Qishu

    Published 2024-03-01
    “…The results show that the proposed method achieves an evaluation accuracy of over 95% under the condition of multi-feature fusion. …”
    Get full text
    Article
  7. 547

    Lightweight Dual-Stream SAR–ATR Framework Based on an Attention Mechanism-Guided Heterogeneous Graph Network by Xuying Xiong, Xinyu Zhang, Weidong Jiang, Tianpeng Liu, Yongxiang Liu, Li Liu

    Published 2025-01-01
    “…Additionally, we include a convolutional neural network based feature extraction net to replenish intuitive visual features. …”
    Get full text
    Article
  8. 548

    Deriving structure from evolution: metazoan segmentation by Paul François, Vincent Hakim, Eric D Siggia

    Published 2007-12-01
    “…Abstract Segmentation is a common feature of disparate clades of metazoans, and its evolution is a central problem of evolutionary developmental biology. …”
    Get full text
    Article
  9. 549
  10. 550

    CFNN for Identifying Poisonous Plants by Israa Mohammed Hassoon, Shaymaa Akram Hantoosh

    Published 2023-06-01
    “…Combination of shape features and statistical features are extracted from leaf then fed to cascade-forward neural network which used TRAINLM function for training. 500 samples of leaf images are used, 250 samples are poisonous, the remaining 250 samples are non-poisonous.300 samples used in training, 200 samples for testing. …”
    Get full text
    Article
  11. 551

    RMDNet: RNA-aware dung beetle optimization-based multi-branch integration network for RNA–protein binding sites prediction by Jiangbo Zhang, Yunhui Peng, Feifei Cui, Zilong Zhang, Shankai Yan, Qingchen Zhang

    Published 2025-07-01
    “…The graphs are processed using a graph neural network with DiffPool. To optimize feature integration, we incorporate an improved dung beetle optimization algorithm, which adaptively assigns fusion weights during inference. …”
    Get full text
    Article
  12. 552
  13. 553

    Human motion similarity evaluation based on deep metric learning by Yidan Zhang, Lei Nie

    Published 2024-12-01
    “…Specifically, when extracting the action information feature vectors using the automatic encoder-decoder network model, a sliding window method is used to divide the key point sequences of each limb part into sequence patches, and the action information feature vectors independent of the camera viewpoint and skeleton structure are extracted in a smaller time unit, so as to obtain a more refined action similarity evaluation result. …”
    Get full text
    Article
  14. 554
  15. 555

    Enhanced Disc Herniation Classification Using Grey Wolf Optimization Based on Hybrid Feature Extraction and Deep Learning Methods by Yasemin Sarı, Nesrin Aydın Atasoy

    Published 2024-12-01
    “…The proposed approach begins with feature extraction using ResNet50, a deep convolutional neural network known for its robust feature representation capabilities. …”
    Get full text
    Article
  16. 556
  17. 557

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  18. 558

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  19. 559

    MedFuseNet: fusing local and global deep feature representations with hybrid attention mechanisms for medical image segmentation by Ruiyuan Chen, Saiqi He, Junjie Xie, Tao Wang, Yingying Xu, Jiangxiong Fang, Xiaoming Zhao, Shiqing Zhang, Guoyu Wang, Hongsheng Lu, Zhaohui Yang

    Published 2025-02-01
    “…Although several impressive deep learning architectures based on convolutional neural networks (CNNs) and Transformers have recently demonstrated remarkable performance, there is still potential for further performance improvement due to their inherent limitations in capturing feature correlations of input data. …”
    Get full text
    Article
  20. 560