-
541
Multi-Branch CNN-LSTM Fusion Network-Driven System With BERT Semantic Evaluator for Radiology Reporting in Emergency Head CTs
Published 2025-01-01“…Our model utilizes a pretrained VGG16, processing groups of five slices simultaneously, and features multiple end-to-end LSTM branches, each specialized in predicting one caption, subsequently combined to form the ordered reports after a BERT-based semantic evaluation. …”
Get full text
Article -
542
-
543
-
544
Comparative Evaluation of Modified Wasserstein GAN-GP and State-of-the-Art GAN Models for Synthesizing Agricultural Weed Images in RGB and Infrared Domain
Published 2025-06-01“…This study investigates the application of modified Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) to generate synthetic RGB and infrared (IR) datasets to meet the annotation requirements for wild radish (Raphanus raphanistrum). …”
Get full text
Article -
545
Improving Aerobics Posture Evaluation by Transfer Learning: Humanized Computational Application of BERT-PTA Domain Adaptive Methods
Published 2025-05-01“…Second, the BERT-PTA model was used to extract features from the preprocessed posture data. Next, a convolutional neural network was used to construct a key point localization model for aerobics poses, and transfer learning was used to train and fine-tune the model. …”
Get full text
Article -
546
Grading evaluation method for inter-turn short circuit of permanent magnet traction motor based on deep Gaussian processes
Published 2024-03-01“…The results show that the proposed method achieves an evaluation accuracy of over 95% under the condition of multi-feature fusion. …”
Get full text
Article -
547
Lightweight Dual-Stream SAR–ATR Framework Based on an Attention Mechanism-Guided Heterogeneous Graph Network
Published 2025-01-01“…Additionally, we include a convolutional neural network based feature extraction net to replenish intuitive visual features. …”
Get full text
Article -
548
Deriving structure from evolution: metazoan segmentation
Published 2007-12-01“…Abstract Segmentation is a common feature of disparate clades of metazoans, and its evolution is a central problem of evolutionary developmental biology. …”
Get full text
Article -
549
-
550
CFNN for Identifying Poisonous Plants
Published 2023-06-01“…Combination of shape features and statistical features are extracted from leaf then fed to cascade-forward neural network which used TRAINLM function for training. 500 samples of leaf images are used, 250 samples are poisonous, the remaining 250 samples are non-poisonous.300 samples used in training, 200 samples for testing. …”
Get full text
Article -
551
RMDNet: RNA-aware dung beetle optimization-based multi-branch integration network for RNA–protein binding sites prediction
Published 2025-07-01“…The graphs are processed using a graph neural network with DiffPool. To optimize feature integration, we incorporate an improved dung beetle optimization algorithm, which adaptively assigns fusion weights during inference. …”
Get full text
Article -
552
-
553
Human motion similarity evaluation based on deep metric learning
Published 2024-12-01“…Specifically, when extracting the action information feature vectors using the automatic encoder-decoder network model, a sliding window method is used to divide the key point sequences of each limb part into sequence patches, and the action information feature vectors independent of the camera viewpoint and skeleton structure are extracted in a smaller time unit, so as to obtain a more refined action similarity evaluation result. …”
Get full text
Article -
554
-
555
Enhanced Disc Herniation Classification Using Grey Wolf Optimization Based on Hybrid Feature Extraction and Deep Learning Methods
Published 2024-12-01“…The proposed approach begins with feature extraction using ResNet50, a deep convolutional neural network known for its robust feature representation capabilities. …”
Get full text
Article -
556
Deep Learning-Based Fingerprint–Vein Biometric Fusion: A Systematic Review with Empirical Evaluation
Published 2025-07-01Get full text
Article -
557
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
558
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
559
MedFuseNet: fusing local and global deep feature representations with hybrid attention mechanisms for medical image segmentation
Published 2025-02-01“…Although several impressive deep learning architectures based on convolutional neural networks (CNNs) and Transformers have recently demonstrated remarkable performance, there is still potential for further performance improvement due to their inherent limitations in capturing feature correlations of input data. …”
Get full text
Article -
560
Evaluating and Enhancing Face Anti-Spoofing Algorithms for Light Makeup: A General Detection Approach
Published 2024-12-01Get full text
Article