Search alternatives:
method » methods (Expand Search)
Showing 1,421 - 1,440 results of 22,805 for search 'method of identification', query time: 0.28s Refine Results
  1. 1421

    EMD-based local matching for occluded person re-identification by Hoang-Anh Nguyen, Thuy-Binh Nguyen, Hong-Quan Nguyen, Thi-Lan Le

    Published 2025-06-01
    “…To evaluate the proposed method, FAPR dataset (Fully Automated Person ReID) is used. …”
    Get full text
    Article
  2. 1422
  3. 1423

    Generation and Identification of Ordinary Differential Equations of Maximal Symmetry Algebra by J. C. Ndogmo

    Published 2016-01-01
    “…An effective method for generating linear ordinary differential equations of maximal symmetry in their most general form is found, and an explicit expression for the point transformation reducing the equation to its canonical form is obtained. …”
    Get full text
    Article
  4. 1424

    Application of Identification to the Determination of Design Model Parameters of Bridge Structures by J. Dorobczyński, J. Niczyj, W.M. Paczkowski

    Published 1991-12-01
    “… The paper presents the identification analysis of static and geometric characteristics of bridge structures. …”
    Get full text
    Article
  5. 1425
  6. 1426
  7. 1427

    Identification of ketamine and norketamine in dried bloodstains on crime-scene surfaces by Risha Jasmine Nathan, Babajide Okeleye, Rabiu Abdullahi, Waliyu Oyebode

    Published 2025-01-01
    “…However, literature on the identification of ketamine and its metabolites in DBS is limited and is mostly focussed on the analysis of bloodstains collected on paper cards. …”
    Get full text
    Article
  8. 1428

    Research on Spectrum Feature Identification of Indoor Multimodal Communication Signal by Yunfei Chen, Yang Liu, Xintao Fan

    Published 2021-01-01
    “…Then, after data training and identification, the signal source is input into the system in random mode for identification. …”
    Get full text
    Article
  9. 1429

    The effect of chosen parameters of a telephone channel on voice identification by Czesław BASZTURA, Wojciech MAJEWSKI

    Published 2016-03-01
    “…The method and results of investigations aimed at the evaluation of the effect of chosen parameters of a telephone channel on the masking of the individual voice features are presented. …”
    Get full text
    Article
  10. 1430
  11. 1431

    Exploit detection based on illegal control flow transfers identification by Ming-hua WANG, Ling-yun YING, Deng-guo FENG

    Published 2014-09-01
    “…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
    Get full text
    Article
  12. 1432
  13. 1433

    Improved ResNet algorithm based intelligent interference identification by Jian MA, Guangjin ZHANG, Lei ZHANG, Jingwei DAI

    Published 2022-10-01
    “…The labor cost of the current network operation and maintenance is high and the efficiency is low.How to quickly and accurately identify the type of network interference, and improve the work efficiency of the maintenance personnel has become an urgent problem to be solved.An intelligent interference identification method of improved deep residual network (ResNet) was studied.The interference data was collected and preprocessedby connecting with the communication interference data interface of the operator's northbound network management.The type of itwaslabelled and corrected by the current network experts to form an offline interference data set.Then the interference frequency domain information was used to generate the interference spectrum waveform image, and performed image processing and data processing for different interference types.After that, the traditional Res Net algorithm was improved according to the business characteristics to extract the features of single interference type.The features were weighted in the compound interference type to identify any type of interference.Finally, the interference data was identified online by importing the trained model, which effectively improved the accuracy and efficiency of interference identification.…”
    Get full text
    Article
  14. 1434

    GAN-based unsupervised domain adaptive person re-identification by Shengsheng ZHENG, Haibing YIN, Xiaofeng HUANG, Tianjie ZHANG

    Published 2021-02-01
    “…Aiming at the problem that the inaccurate clustering in the unsupervised domain adaptive pedestrian re-recognition results in low network recognition accuracy, an unsupervised domain adaptive pedestrian re-recognition method based on generative confrontation network was proposed.Firstly, the CNN model was optimized by using the batch normalization layer after the pooling layer, deleting a fully connected layer and adopting the Adam optimizer.Secondly, the cluster error was analyzed and the important parameter in the cluster was decided based on minimum error rate Bayesian decision theory.Finally, the generative adversarial network was utilized to adjust the cluster.These steps effectively improved the recognition accuracy of unsupervised domain adaptive person re-identification.In the case of the source domain Market-1501 and the target domain DukeMTMC-reID, experimental results show that mAP and Rank-1 can reach 53.7% and 71.6%, respectively.…”
    Get full text
    Article
  15. 1435

    Network-assisted target identification for haploinsufficiency and homozygous profiling screens. by Sheng Wang, Jian Peng

    Published 2017-06-01
    “…Here, we present GIT (Genetic Interaction Network-Assisted Target Identification), a network analysis method for drug target identification in haploinsufficiency profiling (HIP) and homozygous profiling (HOP) screens. …”
    Get full text
    Article
  16. 1436

    Identification of nonlinear systems with periodic external actions (Part II) by Viktor Gorodetskyi

    Published 2024-12-01
    “…The article shows that the previously proposed method is applicable when the periods of external actions in the same differential equation may differ. …”
    Get full text
    Article
  17. 1437

    Research on the Identification and Risk Prevention System of Alien Species Invasion by Zhang Weidong, Wang Yatong, Luo Wenjing, Meng Yuanyuan

    Published 2025-01-01
    “…The invasion of alien species poses a great threat to biodiversity, human health and economic development, so the identification of alien species invasion and the construction of risk prevention system are particularly important. …”
    Get full text
    Article
  18. 1438
  19. 1439
  20. 1440