-
541
ARABIC-THE GLIMPSES OF CONTEMPORARY INTERPRETATION AND ITS PROBLEMS
Published 2021-12-01“…However, in the modern era, it has taken on a variety of features, with trends differing in a way that was more pronounced than in other earlier phases. …”
Get full text
Article -
542
Diagnosis of abnormal sound in loudspeakers by integrated attention mechanism convolutional neural network
Published 2024-04-01“…Secondly, the feature data was input into the 1DCNN-BiLSTM network for initial feature extraction. …”
Get full text
Article -
543
Rolling Bearing Life Prediction Based on Improved Transformer Encoding Layer and Multi-Scale Convolution
Published 2025-06-01“…Experimental results show that, even under conditions with interference features, the TransCN model outperforms mainstream advantage model in terms of prediction accuracy and generalizability. …”
Get full text
Article -
544
Exploring a multi-path U-net with probability distribution attention and cascade dilated convolution for precise retinal vessel segmentation in fundus images
Published 2025-04-01“…A CDCM is integrated to gather multi-scale vessel features, enhancing the model’s ability to extract deep semantic features. …”
Get full text
Article -
545
Wavelength Switchable Mode-Locked Fiber Laser With Tapered Two-Mode Fiber
Published 2019-01-01“…The TTMF based filter constructed with single-mode fiber-TTMF-single-mode fiber configuration, features smooth interference spectrum. It is attributed to that only two modes are involved into the interference in the specially designed TTMF, which is confirmed by both simulations and experiments. …”
Get full text
Article -
546
Experimental evaluation methods of multi-frequency electromagnetic radiation effects
Published 2025-03-01“…Objective evaluation of equipment immunity to electromagnetic interference is central to studying complex electromagnetic environmental effects. …”
Get full text
Article -
547
Remote Sensing Monitoring and Ecological Risk Assessment of Landscape Patterning in the Agro-Pastoral Ecotone of Northeast China
Published 2021-01-01“…The agro-pastoral ecotone, an ecological transition zone connecting adjacent areas of agricultural planting area and grassland animal husbandry, has three features: a complex natural condition, relatively pronounced population pressure, and a fragile ecological environment. …”
Get full text
Article -
548
Multimodal depression detection based on an attention graph convolution and transformer
Published 2025-02-01“…Traditional depression detection methods typically rely on single-modal data, but these approaches are limited by individual differences, noise interference, and emotional fluctuations. To address the low accuracy in single-modal depression detection and the poor fusion of multimodal features from electroencephalogram (EEG) and speech signals, we have proposed a multimodal depression detection model based on EEG and speech signals, named the multi-head attention-GCN_ViT (MHA-GCN_ViT). …”
Get full text
Article -
549
DGFEG: Dynamic Gate Fusion and Edge Graph Perception Network for Remote Sensing Change Detection
Published 2025-01-01“…Finally, an edge graph perception module integrates edge information with the fused features, leveraging the spatial similarity of graph structures and the interaction of edge features to suppress irrelevant edge interference, thereby improving the model's sensitivity and accuracy in detecting subtle building changes. …”
Get full text
Article -
550
A Combined Frame Difference and Convolution Method for Moving Vehicle Detection in Satellite Videos
Published 2025-01-01“…Additionally, shallow large-scale feature maps, which use smaller receptive fields to focus on small targets and reduce background interference, are fed into the detection head. …”
Get full text
Article -
551
Collaborative probability based multimodel target identification in wireless sensor networks
Published 2011-01-01“…A collaborative probability based multimodel target identification method for the applications in wireless sen-sor networks was proposed.Wavelet package was used to extract the features of the target information sample,and in or-der to decrease the computing complexity and reserve the key information as well,feature compaction,which achieved by principal components analysis,was carried out before learning.Different types of Gaussian classifier were developed for classifier learning.To gain global optimal results,committee decision was employed to select and combine individual decisions with dynamically adjusted weights.The experiment results verified that the method introduced can adapt to the interference factor of the environment and can implement target identification accurately and stably.…”
Get full text
Article -
552
Application of tensor CSAMT with high-power orthogonal signal sources in Jiama porphyry copper deposit, South Tibet
Published 2023-01-01“…The Jiama porphyry copper deposit in Tibet is one of the proven supergiant copper deposits in the Qinghai-Tibet Plateau at present, with the reserves of geological resources equivalent to nearly 20×106 t. However, it features wavy and steep terrain, leading to extremely difficult field operation and heavy interference. …”
Get full text
Article -
553
CNN-Based End-to-End CPU-AP-UE Power Allocation for Spectral Efficiency Enhancement in Cell-Free Massive MIMO Networks
Published 2025-04-01“…The proposed model learns the optimal power allocation strategy by utilizing the channel state information, AP-UE distance, interference levels, and signal-to-interference-plus-noise ratio as input features. …”
Get full text
Article -
554
The Application of Kernel Ridge Regression for the Improvement of a Sensing Interferometric System
Published 2025-02-01“…Here, these features were the wavelength positions and maximum amplitudes of some peaks of the interference spectrum of the sensing system. …”
Get full text
Article -
555
Design of Automatic Scoring System for Oral English Test Based on Sequence Matching and Big Data Analysis
Published 2021-01-01“…Aiming at the reliability of the automatic scoring system, based on the principle of sequence matching, this paper adopts the spoken speech feature extraction method to extract the features of spoken English test pronunciation and establishes a dynamic optimized spoken English pronunciation signal model based on sequence matching, which could maintain good dynamic selection and clustering ability in a strong interference environment. …”
Get full text
Article -
556
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
557
A Method of Abnormal Behavior Detection for Safety Site Surveillance
Published 2025-01-01“…For the complex background in the image, a multiframe differential superposition algorithm is proposed to denoise the target image; a feature extraction method is given to extract features for the target image, and then a more complete image with target features is obtained after filtering; a normal behavior model is established to extract the motion information of the target from a single frame of the image; an abnormal detection method is proposed to determine whether it belongs to abnormal behavior. …”
Get full text
Article -
558
Vaccines against Covid-19: Comparison, Limitations, the Decrease of Pandemic and the Perspective of Viral Respiratory
Published 2021-03-01“…The aim is to compare their features for objective substantiation of their application. …”
Get full text
Article -
559
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
560
River Surface Space–Time Image Velocimetry Based on Dual-Channel Residual Network
Published 2025-05-01“…However, environmental interference often blurs weak tracer textures in STIs, limiting the accuracy of traditional MOT detection algorithms based on shallow features like images’ gray gradient. …”
Get full text
Article