Search alternatives:
method » methods (Expand Search)
Showing 641 - 660 results of 22,805 for search 'method of identification', query time: 0.22s Refine Results
  1. 641
  2. 642
  3. 643
  4. 644

    Quality identification of Amomi fructus using E-nose, HS-GC-IMS, and intelligent data fusion methods by Pan-Pan Zhang, Xin-Jing Gui, Xin-Jing Gui, Xin-Jing Gui, Xue-Hua Fan, Han-Li, Hai-Yang Li, Xiao-Peng Li, Feng-Yu Dong, Yan-Li Wang, Jing-Yao, Jing-Yao, Jun-Han Shi, Jun-Han Shi, Rui-Xin Liu, Rui-Xin Liu, Rui-Xin Liu, Rui-Xin Liu, Rui-Xin Liu

    Published 2025-02-01
    “…The authenticity identification model achieved 100.00% accuracy after PCA analysis, while the origin identification model and the provenance identification model were 95.65% (HS-GC-IMS: PLS-DA) and 98.18% (HS-GC-IMS: PCA-DA/PLS-DA), respectively. …”
    Get full text
    Article
  5. 645
  6. 646

    A Review of Machine Learning and Deep Learning Methods for Person Detection, Tracking and Identification, and Face Recognition with Applications by Beibut Amirgaliyev, Miras Mussabek, Tomiris Rakhimzhanova, Ainur Zhumadillayeva

    Published 2025-02-01
    “…Our findings highlight essential methods of person detection, tracking and identification, and face recognition tasks, emphasizing current trends and illustrating a clear transition from classical to deep learning methods with existing datasets, divided by task and including statistics for each of them. …”
    Get full text
    Article
  7. 647
  8. 648
  9. 649

    An online and real-time adaptive operational modal parameter identification method based on fog computing in Internet of Things by Cheng Wang, Haiyang Huang, Jianwei Chen, Wei Wei, Tian Wang

    Published 2020-02-01
    “…Finally, the time-varying operational modal identification results from non-stationary random response signals of a cantilever beam whose density changes slowly indicate that the limited memory eigenvector recursive principal component analysis–based operational modal analysis method requires less memory and runtime and has higher stability and identification effect.…”
    Get full text
    Article
  10. 650

    Enhanced Domain Tuned Yolo-Driven Intelligent Fault Identification Method: Application in Selection and Construction of Gas Storage by BAI Xuefeng, ZHANG Fengyuan, ZOU Huanyu, HUANG Famu, LI Junlun, ZHAO Shijie, ZHANG Li, TANG Jizhou

    Published 2025-02-01
    “…Based on this, this paper proposes an intelligent fault identification method based on the enhanced domain data fine-tuning of the Yolo model. …”
    Get full text
    Article
  11. 651
  12. 652

    A Fast Identification Method for Seismic Responses of Bridge Structures by Integrating Digital Signal Features and Deep Learning by Zhaoxu Lv, Youliang Ding, Junxiao Guo

    Published 2025-01-01
    “…A method of bridge structure seismic response identification combining signal processing technology and deep learning technology is proposed. …”
    Get full text
    Article
  13. 653
  14. 654

    SDN control and forwarding method based on identity attribute by Xianwei ZHU, Chaowen CHANG, Zhiqiang ZHU, Xi QIN

    Published 2019-11-01
    “…Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and attribute signature were generated by device attributes and encapsulated in the group header.When the data flow left the network,the data was verified by the forwarding device to ensure the validity of the data flow.At the same time,attribute identification was defined as a match field of flow by the framework,and the network forwarding behavior was defined based on attributeidentification.A fine-grained access control was implemented by the proposed mechanism and attribute-based signature.The proposed mechanism and attribute-based signature implemented a fine-grained access control.Experimental results demonstrate that the method can effectively implement fine-grained forwarding and flow authentication,and the forwarding granularity is higher than that of similar schemes.…”
    Get full text
    Article
  15. 655
  16. 656
  17. 657

    A PCR-RFLP Method for Distinguishing Closely Related Common Quail <i>(Coturnix coturnix)</i> and Japanese Quail <i>(Coturnix japonica)</i>: Forensics and Conservation Implications by Prateek Dey, Kochiganti Venkata Hanumat Sastry, Ram Pratap Singh

    Published 2025-06-01
    “…This similarity poses challenges in species identification, leading to conservation issues such as the illegal trade of wild Common Quail in the name of farmed Japanese Quail. …”
    Get full text
    Article
  18. 658

    IDENTIFICATION OF KEY PERFORMANCE INDICATORS OF CONSTRUCTION COMPANIES BASED ON GUIDED INTERVIEWS by Nikola Sobotková, Aneta Oblouková, Vojtěch Bartoš, Eva Vítková

    Published 2025-07-01
    “…Therefore, for a more in-depth assessment of the performance of the firms in question, it is advisable that they start observing non-financial performance indicators to a greater extent or introducing the use of comprehensive methods to measure business performance in the firms in question. …”
    Article
  19. 659
  20. 660

    Molecular Identification and Determination of Antifungal Susceptibility Profile of Candida Species Isolated from AIDS Patients in Ahwaz City by Maryam Hatami, Maryam Erfaninejad, Akbar Hoseinnejad, Mahnaz Fatahinia

    Published 2025-01-01
    “…After microscopic and macroscopic identification, these samples were finally identified by PCR RFLP method. …”
    Get full text
    Article