Suggested Topics within your search.
Search alternatives:
feature » features (Expand Search)
Showing 301 - 320 results of 8,639 for search 'feature patterns', query time: 0.13s Refine Results
  1. 301

    Saliency Detection Using Sparse and Nonlinear Feature Representation by Shahzad Anwar, Qingjie Zhao, Muhammad Farhan Manzoor, Saqib Ishaq Khan

    Published 2014-01-01
    “…An important aspect of visual saliency detection is how features that form an input image are represented. …”
    Get full text
    Article
  2. 302

    Macroscale-area patterning of three-dimensional DNA-programmable frameworks by Feiyue Teng, Honghu Zhang, Dmytro Nykypanchuk, Ruipeng Li, Lin Yang, Nikhil Tiwale, Zhaoyi Xi, Mingzhao Liu, Mingxin He, Shuai Zhang, Oleg Gang

    Published 2025-04-01
    “…We achieve the selective growth of DNA origami superlattices into customized surface patterns with feature sizes in the tens of microns across macroscale areas using polymer templates patterned by electron-beam lithography. …”
    Get full text
    Article
  3. 303
  4. 304

    A sparse tensor generator with efficient feature extraction by Tugba Torun, Ameer Taweel, Didem Unat

    Published 2025-07-01
    “…Another challenge lies in analyzing sparse tensor features, which are essential not only for understanding the nonzero pattern but also for selecting the most suitable storage format, decomposition algorithm, and reordering methods. …”
    Get full text
    Article
  5. 305

    Enhanced Feature Selection via Hierarchical Concept Modeling by Jarunee Saelee, Patsita Wetchapram, Apirat Wanichsombat, Arthit Intarasit, Jirapond Muangprathub, Laor Boongasame, Boonyarit Choopradit

    Published 2024-11-01
    “…With big data, it also allows us to reduce computational time, improve prediction performance, and better understand the data in machine learning or pattern recognition applications. In this study, we present a new feature selection approach based on hierarchical concept models using formal concept analysis (FCA) and a decision tree (DT) for selecting a subset of attributes. …”
    Get full text
    Article
  6. 306

    A traffic pattern detection algorithm based on multimodal sensing by Yanjun Qin, Haiyong Luo, Fang Zhao, Zhongliang Zhao, Mengling Jiang

    Published 2018-10-01
    “…These sensors are commonly embedded in commodity smartphones. All the extracted features are then fed into a convolutional neural network to infer traffic patterns. …”
    Get full text
    Article
  7. 307

    Recognition of building group patterns using GCN and knowledge graph by Tao Liu, Ziqiang Zhang, Ping Du, Wenning Wang, Haowen Yan, Bo Qiang, Shenglu Xu

    Published 2025-12-01
    “…First, the features of individual buildings are acquired, then the graph structure of building is constructed, and finally, by means of GCN and knowledge embedding, the features of buildings are efficiently learned on the basis of the graph structure of building patterns, and the pattern features of building are extracted, so as to realize the recognition of building patterns. …”
    Get full text
    Article
  8. 308

    Postresuscitation Changes in the Brain at the Level of Neuronal Populations: Patterns and Mechanisms by M. Sh. Avrushchenko, V. V. Moroz, I. V. Ostrova

    Published 2012-08-01
    “…Key words: postresuscitation period; neuronal populations; general patterns of neuronal morphological changes; individual, typological, and sex features.…”
    Get full text
    Article
  9. 309
  10. 310

    Automatic diagnosis of lower back pain using gait patterns by Chandrasen Pandey, Neeraj Baghel, Malay Kishore-Dutta, Carlos M. Travieso González

    Published 2022-11-01
    “…The features alone resulted in higher leave-one-out classification accuracy (LOOCV) 92%. …”
    Get full text
    Article
  11. 311

    Prevailing patterns of the sound speed distributions in the environment of the Southern Baltic by G. GRELOWSKA

    Published 2000-01-01
    “…The paper contains the results of experimental and theoretical research aimed at elaborating characteristic features of the acoustic conditions in the Southern Baltic. …”
    Get full text
    Article
  12. 312
  13. 313

    EFFECT OF LANDSCAPE FEATURES AND FRAGMENTATION ON WILD TURKEY DISPERSAL by Kathleen K. Fleming, William F. Porter

    Published 2005-01-01
    “…First, we simulated the effect of landscape features and landscape fragmentation (measured by edge/area) on dispersal patterns in a wild turkey population in New York State using land‐cover data derived from satellite imagery. …”
    Get full text
    Article
  14. 314
  15. 315
  16. 316
  17. 317
  18. 318

    Manufacture of consumable patterns using additive sheet lamination technology by N. K. Tolochko, P. V. Avramenko, V. B. Kravtsov, A. M. Khartanovich, D. I. Kopchik

    Published 2025-01-01
    “…The advantages and disadvantages of different types of additive technologies used for direct and indirect manufacturing of investment patterns are considered. The features of producing wax and paraffin investment patterns using steel molds manufactured using the additive technology of sheet lamination are experimentally studied. …”
    Get full text
    Article
  19. 319

    Capacitively Loaded Loop-Based Antennas with Reconfigurable Radiation Patterns by Saber Dakhli, Hatem Rmili, Jean-marie Floc’h, Muntasir Sheikh, Kourosh Mahdjoubi, Fethi Choubani, Richard W. Ziolkowski

    Published 2015-01-01
    “…The measured impedance mismatch and radiation pattern results are presented and compared to the corresponding simulated values.…”
    Get full text
    Article
  20. 320

    Mining behavior pattern of mobile malware with convolutional neural network by Xin ZHANG, Weizhong QIANG, Yueming WU, Deqing ZOU, Hai JIN

    Published 2020-12-01
    “…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
    Get full text
    Article