Search alternatives:
feature » features (Expand Search)
evolution » evaluation (Expand Search)
Showing 321 - 340 results of 492 for search 'feature network evolution', query time: 0.11s Refine Results
  1. 321

    Digital security risk identification and model construction of smart city based on deep learning by Zhilei Zhao

    Published 2025-07-01
    “…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
    Get full text
    Article
  2. 322

    Monitoring of an Electromechanical Prototype Material for Environmental Parameters Using IoT by P. Bharat Siva Varma, Kothapalli Phani Varma, V. Anjani Kranthi, Anusha Rudraraju, Nalla Nandakishore

    Published 2022-01-01
    “…The article’s research was focused on an IoT electronic device and a web platform. A major feature of this electronic device is that its Internet connectivity is achieved using the TCP/IP protocol, an integrated feature of the Shield Ethernet board stacked on top of the Arduino mega board.…”
    Get full text
    Article
  3. 323

    River floating object detection with transformer model in real time by Chong Zhang, Jie Yue, Jianglong Fu, Shouluan Wu

    Published 2025-03-01
    “…This model incorporates the High-level Screening-feature Path Aggregation Network (HS-PAN), which refines feature fusion through a novel bottom-up fusion path, significantly enhancing its expressive power. …”
    Get full text
    Article
  4. 324

    SEM Deep Learning Multiclass Noise Level Classification With Data Augmentation by Kai Liang Lew, Kok Swee Sim, Shing Chiang Tan

    Published 2025-01-01
    “…In this study, a deep learning network, the Gaussian Noise Level Classification Network (GNLCN), is proposed to Classify noise levels in SEM images from 0.0000 to 0.0100, incremented by 0.001. …”
    Get full text
    Article
  5. 325

    Research on Apple Recognition and Localization Method Based on Deep Learning by Zhipeng Zhao, Chengkai Yin, Ziliang Guo, Jian Zhang, Qing Chen, Ziyuan Gu

    Published 2025-02-01
    “…Firstly, the multi-scale feature fusion network is improved by adding a 160 × 160 feature scale layer in the backbone network, which is used to enhance the model’s sensitivity in the recognition of very small local features. …”
    Get full text
    Article
  6. 326

    An optimized spatial target trajectory prediction model for multi-sensor data fusion in air traffic management by Jian Dong, Yuan Xu, Rigeng Wu, Chengwang Xiao

    Published 2025-03-01
    “…We segment data from various sensors within the automatic dependent surveillance-broadcast system using a designed sliding window of equal time steps, inputting them into the feature extraction network to capture spatiotemporal features. …”
    Get full text
    Article
  7. 327

    Permeability selection of biologically relevant membranes matches the stereochemistry of life on Earth. by Olivia Goode, Urszula Łapińska, Juliano Morimoto, Georgina Glover, David S Milner, Alyson E Santoro, Stefano Pagliara, Thomas A Richards

    Published 2025-05-01
    “…Early in the evolution of life, a proto-metabolic network was encapsulated within a membrane compartment. …”
    Get full text
    Article
  8. 328

    An improve fraud detection framework via dynamic representations and adaptive frequency response filter by Juncheng Yang, Shuxia Li, Zijun Huang, Junhang Wu

    Published 2025-05-01
    “…Consequently, we introduce the Dynamic Pattern with Adaptive Filter Graph Learning framework for telecom fraud detection. With the sequential network, we capture users’ dynamic behavioral features for LSN input. …”
    Get full text
    Article
  9. 329

    Enhanced SVM-based model for predicting cyberspace vulnerabilities: Analyzing the role of user group dynamics and capital influx. by Yicheng Long

    Published 2025-01-01
    “…Amid substantial capital influx and the rapid evolution of online user groups, the increasing complexity of user behavior poses significant challenges to cybersecurity, particularly in the domain of vulnerability prediction. …”
    Get full text
    Article
  10. 330

    A bearing fault diagnosis method based on hybrid artificial intelligence models. by Lijie Sun, Xin Tao, Yanping Lu

    Published 2025-01-01
    “…Addressing the issue of that the difficulty of incipient weak signals feature extraction influences the rolling bearing diagnosis accuracy, an efficient bearing fault diagnostic technique, a proposition is forwarded for hybrid artificial intelligence models, which integrates Improved Harris Hawks Optimization (IHHO) into the optimization of Deep Belief Networks and Extreme Learning Machines (DBN-ELM). …”
    Get full text
    Article
  11. 331

    Research Progress and Technology Outlook of Deep Learning in Seepage Field Prediction During Oil and Gas Field Development by Tong Wu, Qingjie Liu, Yueyue Wang, Ying Xu, Jiale Shi, Yu Yao, Qiang Chen, Jianxun Liang, Shu Tang

    Published 2025-05-01
    “…Key processes based on Deep Learning, such as feature engineering, network structure design, and physical constraint integration mechanisms, are further explored. …”
    Get full text
    Article
  12. 332

    Investigating the diversity and stylization of contemporary user generated visual arts in the complexity entropy plane by Seunghwan Kim, Byunghwee Lee, Wonjae Lee

    Published 2025-07-01
    “…Informatizing 149,780 images curated on the DeviantArt and Bēhance platforms from 2010 to 2020, we analyze the relationship between local information in the C-H space and multi-level image features generated by a deep neural network and a feature extraction algorithm. …”
    Get full text
    Article
  13. 333

    Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat, Bernardi Pranggono

    Published 2025-07-01
    “…Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. …”
    Get full text
    Article
  14. 334

    Algorithmic Shadow Spectroscopy by Hans Hon Sang Chan, Richard Meister, Matthew L. Goh, Bálint Koczor

    Published 2025-03-01
    “…We present shadow spectroscopy as a simulator-agnostic quantum algorithm for estimating energy gaps using very few circuit repetitions (shots) and no extra resources (ancilla qubits) beyond performing time evolution and measurements. The approach builds on the fundamental feature that every observable property of a quantum system must evolve according to the same harmonic components: we can reveal them by postprocessing classical shadows of time-evolved quantum states to extract a large number of time-periodic signals N_{o}∝10^{8}, whose frequencies correspond to Hamiltonian energy differences with precision limited as ϵ∝1/T for simulation time T. …”
    Get full text
    Article
  15. 335

    A New Method for Identifying Key and Common Themes Based on Text Mining: An Example in the Field of Urban Expansion by Yanwei Zhang, Xinhai Lu, Chaoran Lin, Feng Wu, Jinqiu Li

    Published 2021-01-01
    “…Second, the key degree of the thematic node in the thematic evolution transfer network is used to represent the key feature of a theme, and the PageRank algorithm is employed to measure the critical score of this theme. …”
    Get full text
    Article
  16. 336

    Generation of diverse biological forms through combinatorial interactions between tissue polarity and growth. by Richard Kennaway, Enrico Coen, Amelia Green, Andrew Bangham

    Published 2011-06-01
    “…This constraint leads to the emergence of features such as curvature that were not directly specified by the regulatory networks. …”
    Get full text
    Article
  17. 337

    Hymyc1 downregulation promotes stem cell proliferation in Hydra vulgaris. by Alfredo Ambrosone, Valentina Marchesano, Angela Tino, Bert Hobmayer, Claudia Tortiglione

    Published 2012-01-01
    “…Our results show the involvement of Hymyc1 in the control of interstitial stem cell dynamics, provide new clues to decipher the molecular control of the cell and tissue plasticity in Hydra, and also provide further insights into the complex myc network in higher organisms. The ability of Hydra cells to uptake double stranded RNA and to trigger a RNAi response lays the foundations of a comprehensive analysis of the RNAi response in Hydra allowing us to track back in the evolution and the origin of this process.…”
    Get full text
    Article
  18. 338

    Trends in the sustainable use of artificial intelligence: a bibliometric approach by Alejandro Valencia-Arias, Jesus Alberto Jimenez Garcia, Toño Eldrin Alvites Adan, Ezequiel Martínez Rojas, Jackeline Valencia, Erica Agudelo-Ceballos, Hernán Uribe Bedoya, Gustavo Adolfo Moreno López

    Published 2025-05-01
    “…China, the United States, and India were the leading countries in terms of scientific production. Thematic evolution revealed a shift toward SDG and artificial neural network. …”
    Get full text
    Article
  19. 339

    EXPLORING A NOVEL HEXACO PERSONALITY TRAITS ON TWITTER: AN ENSEMBLE-BASED NLP METHODOLOGY by Tanvi Desai, Divyakant Meva

    Published 2025-01-01
    “…Our approach integrates advanced NLP techniques across key phases: preprocessing, feature extraction, feature selection, and final detection. …”
    Get full text
    Article
  20. 340

    Mobile Apps to Prevent Violence Against Women and Girls (VAWG): Systematic App Research and Content Analysis by Md Hafizur Rahman, Nasimul Ghani Usmani, Pradip Chandra, Ridwana Maher Manna, Anisuddin Ahmed, Mohammad Sohel Shomik, Shams El Arifeen, Aniqa Tasnim Hossain, Ahmed Ehsanur Rahman

    Published 2025-06-01
    “…ObjectiveTherefore, we aimed to systematically evaluate the trends, geographical distribution, functional categories, available features, and feature evolution of mobile apps designed to prevent violence against women and girls (VAWG). …”
    Get full text
    Article