Search alternatives:
method » methods (Expand Search)
Showing 461 - 480 results of 22,805 for search 'method of identification', query time: 0.19s Refine Results
  1. 461
  2. 462

    An Approach to Truck Driving Risk Identification: A Machine Learning Method Based on Optuna Optimization by Zhaofei Wang, Hao Li, Qiuping Wang

    Published 2025-01-01
    “…In order to provide safe development of road freight traffic, this paper proposes a truck driving risk identification method based on Optuna optimization of machine learning model. …”
    Get full text
    Article
  3. 463
  4. 464

    Identifying multidisciplinary problems from scientific publications based on a text generation method by Xu Ziyan, Han Hongqi, Li Linna, Zhang Junsheng, Zhou Zexu

    Published 2024-07-01
    “…A text generation based multidisciplinary problem identification method is proposed, which does not rely on a large amount of data annotation.…”
    Get full text
    Article
  5. 465
  6. 466
  7. 467

    Structural Identification Using Digital Image Correlation Technology by Samira Azizi, Kaveh Karami, Stefano Mariani

    Published 2023-11-01
    “…Displacement time histories were acquired, and a blind source identification technique was adopted to delve into the data and assess structural health. …”
    Get full text
    Article
  8. 468

    Comparison of Patterns Shapes and Patterns Texture for Identification of Malaria Parasites in Microscopic Image by Jani Kusanti, Yusuf Zain Santosa

    Published 2016-11-01
    “…The last step is to test the identification and classification of plasmodium falciparum parasite into 12 classes using methods Learning Vector Quantization (LVQ). …”
    Get full text
    Article
  9. 469

    Comparison of Patterns Shapes and Patterns Texture for Identification of Malaria Parasites in Microscopic Image by Jani Kusanti

    Published 2016-11-01
    “…The last step is to test the identification and classification of plasmodium falciparum parasite into 12 classes using methods Learning Vector Quantization (LVQ). …”
    Get full text
    Article
  10. 470
  11. 471
  12. 472
  13. 473
  14. 474

    Methods for tagging an ectoparasite, the salmon louse Lepeophtheirus salmonis by Folk, Alexius, Mennerat, Adèle

    Published 2024-01-01
    “…To address this gap, we describe here a method for attaching radio frequency identification (RFID) tags to individual adult females of a marine ectoparasite, the salmon louse Lepeophtheirus salmonis. …”
    Get full text
    Article
  15. 475

    Survey on community detection method based on random walk by Yang GAO, Hongli ZHANG

    Published 2023-06-01
    “…Random walk techniques achieve high accuracy and efficiency in community detection.To summarize and analyze community detection methods based on random walk, the random walk technique was classified into personalized PageRank, heat kernel diffusion and other random walk methods, and community detection was classified into tasks of local community detection and global community structure identification.A detailed overview of different techniques based on random walk and their application to the tasks of community detection was provided, problems in existing methods were analyzed, and future research directions were pointed out.Finally, evaluation metrics of community detection accuracy for different community detection tasks were summarized in terms of similarity and structure respectively to facilitate research in community detection.…”
    Get full text
    Article
  16. 476
  17. 477
  18. 478

    Model and Method of Solid Household Waste Sorting for Their Effective Thermal Disposal by Hanna Lysiuk, Oksana Maksymova

    Published 2023-07-01
    “…A method of classification of municipal solid waste (MSW) and a method of their identification was proposed, which made it possible to identify groups that produce acid gases. …”
    Get full text
    Article
  19. 479
  20. 480

    Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review by Shikah J. Alsunaidi, Abdullah M. Almuhaideb

    Published 2022-05-01
    “…Additionally, it introduces the factors to consider when choosing the technique of device identification. It provides a list of possible attacks on each technology used in device identification methods.…”
    Get full text
    Article