-
1421
EMD-based local matching for occluded person re-identification
Published 2025-06-01“…To evaluate the proposed method, FAPR dataset (Fully Automated Person ReID) is used. …”
Get full text
Article -
1422
CRITERIA FOR TOBACCO IDENTIFICATION FOR HOOKAH AND NON-TOBACCO MIXTURE FOR HEATING
Published 2022-11-01Get full text
Article -
1423
Generation and Identification of Ordinary Differential Equations of Maximal Symmetry Algebra
Published 2016-01-01“…An effective method for generating linear ordinary differential equations of maximal symmetry in their most general form is found, and an explicit expression for the point transformation reducing the equation to its canonical form is obtained. …”
Get full text
Article -
1424
Application of Identification to the Determination of Design Model Parameters of Bridge Structures
Published 1991-12-01“… The paper presents the identification analysis of static and geometric characteristics of bridge structures. …”
Get full text
Article -
1425
On the Accurate Identification of Network Paths Having a Common Bottleneck
Published 2013-01-01Get full text
Article -
1426
On the Identification of Mobile and Stationary Zone Mass Transfer Resistances in Chromatography
Published 2025-02-01Get full text
Article -
1427
Identification of ketamine and norketamine in dried bloodstains on crime-scene surfaces
Published 2025-01-01“…However, literature on the identification of ketamine and its metabolites in DBS is limited and is mostly focussed on the analysis of bloodstains collected on paper cards. …”
Get full text
Article -
1428
Research on Spectrum Feature Identification of Indoor Multimodal Communication Signal
Published 2021-01-01“…Then, after data training and identification, the signal source is input into the system in random mode for identification. …”
Get full text
Article -
1429
The effect of chosen parameters of a telephone channel on voice identification
Published 2016-03-01“…The method and results of investigations aimed at the evaluation of the effect of chosen parameters of a telephone channel on the masking of the individual voice features are presented. …”
Get full text
Article -
1430
Parameter Identification of Running Tire for Straddle-type Monorail Vehicle
Published 2017-01-01Get full text
Article -
1431
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01“…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
Get full text
Article -
1432
IDENTIFICATIONS PEAK HOURS ON INTERSECTIONS SET IN BIELSKO-BIAŁA CITY
Published 2016-03-01Get full text
Article -
1433
Improved ResNet algorithm based intelligent interference identification
Published 2022-10-01“…The labor cost of the current network operation and maintenance is high and the efficiency is low.How to quickly and accurately identify the type of network interference, and improve the work efficiency of the maintenance personnel has become an urgent problem to be solved.An intelligent interference identification method of improved deep residual network (ResNet) was studied.The interference data was collected and preprocessedby connecting with the communication interference data interface of the operator's northbound network management.The type of itwaslabelled and corrected by the current network experts to form an offline interference data set.Then the interference frequency domain information was used to generate the interference spectrum waveform image, and performed image processing and data processing for different interference types.After that, the traditional Res Net algorithm was improved according to the business characteristics to extract the features of single interference type.The features were weighted in the compound interference type to identify any type of interference.Finally, the interference data was identified online by importing the trained model, which effectively improved the accuracy and efficiency of interference identification.…”
Get full text
Article -
1434
GAN-based unsupervised domain adaptive person re-identification
Published 2021-02-01“…Aiming at the problem that the inaccurate clustering in the unsupervised domain adaptive pedestrian re-recognition results in low network recognition accuracy, an unsupervised domain adaptive pedestrian re-recognition method based on generative confrontation network was proposed.Firstly, the CNN model was optimized by using the batch normalization layer after the pooling layer, deleting a fully connected layer and adopting the Adam optimizer.Secondly, the cluster error was analyzed and the important parameter in the cluster was decided based on minimum error rate Bayesian decision theory.Finally, the generative adversarial network was utilized to adjust the cluster.These steps effectively improved the recognition accuracy of unsupervised domain adaptive person re-identification.In the case of the source domain Market-1501 and the target domain DukeMTMC-reID, experimental results show that mAP and Rank-1 can reach 53.7% and 71.6%, respectively.…”
Get full text
Article -
1435
Network-assisted target identification for haploinsufficiency and homozygous profiling screens.
Published 2017-06-01“…Here, we present GIT (Genetic Interaction Network-Assisted Target Identification), a network analysis method for drug target identification in haploinsufficiency profiling (HIP) and homozygous profiling (HOP) screens. …”
Get full text
Article -
1436
Identification of nonlinear systems with periodic external actions (Part II)
Published 2024-12-01“…The article shows that the previously proposed method is applicable when the periods of external actions in the same differential equation may differ. …”
Get full text
Article -
1437
Research on the Identification and Risk Prevention System of Alien Species Invasion
Published 2025-01-01“…The invasion of alien species poses a great threat to biodiversity, human health and economic development, so the identification of alien species invasion and the construction of risk prevention system are particularly important. …”
Get full text
Article -
1438
Bias Identification and Attribution in NLP Models With Regression and Effect Sizes
Published 2022-08-01Get full text
Article -
1439
Identification of Grass Weed Species Using YOLO5 Algorithm
Published 2025-05-01Get full text
Article -
1440
Information-extremе machine learning for object identification on the terrain
Published 2016-06-01Get full text
Article