Showing 761 - 780 results of 1,766 for search 'most (convolution OR convolutional)', query time: 0.11s Refine Results
  1. 761

    Semi-supervised machine learning for primary user emulation attack detection and prevention through core-based analytics for cognitive radio networks by Sundar Srinivasan, KB Shivakumar, Muazzam Mohammad

    Published 2019-09-01
    “…Selfish attacks among other attacks are the most challenging, in which a secondary user or an unauthorized user with unlicensed spectrum pretends to be a primary user by altering the signal characteristics. …”
    Get full text
    Article
  2. 762

    Load Reconstruction Technique Using D-Optimal Design and Markov Parameters by Deepak K. Gupta, Anoop K. Dhingra

    Published 2015-01-01
    “…It has been noted that the computation of inverse Markov parameters, like most other inverse problems, is ill-conditioned which causes their convolution with the measured response to become quite sensitive to errors in system modeling and response measurements. …”
    Get full text
    Article
  3. 763

    GNN for LoRa Device Fingerprint Identification by Bojun Zhang

    Published 2025-01-01
    “…The system employs GGC(Gated Graph Convolution) networks to extract feature representations from the graphs, which are then encoded by a time encoder, specifically an LSTM(Long Short-Term Memory) network, to obtain a coarse-grained temporal representation. …”
    Get full text
    Article
  4. 764

    Stationary Underdispersed INAR(1) Models based on the Backward Approach by Emad-Eldin A. A. Aly, Nadjib Bouzar

    Published 2025-05-01
    “… Most of the stationary first-order autoregressive integer-valued (INAR(1)) models in the literature have been developed using the idea of binomial thinning. …”
    Get full text
    Article
  5. 765

    EcoDetect-YOLOv2: A High-Performance Model for Multi-Scale Waste Detection in Complex Surveillance Environments by Jing Su, Ruihan Chen, Mingzhi Li, Shenlin Liu, Guobao Xu, Zanhong Zheng

    Published 2025-05-01
    “…To reduce computational overhead and inference latency without sacrificing detection accuracy, Ghost Convolution (GhostConv) replaces conventional convolution layers within the neck. …”
    Get full text
    Article
  6. 766

    Transformers for Neuroimage Segmentation: Scoping Review by Maya Iratni, Amira Abdullah, Mariam Aldhaheri, Omar Elharrouss, Alaa Abd-alrazaq, Zahiriddin Rustamov, Nazar Zaki, Rafat Damseh

    Published 2025-01-01
    “…The most developed were those of hybrid convolutional neural network-transformer architectures (n=57, 85.07%), where the vision transformer is the most frequently used type of transformer (n=37, 55.22%). …”
    Get full text
    Article
  7. 767

    Evaluation of the Effectiveness of the UNet Model with Different Backbones in the Semantic Segmentation of Tomato Leaves and Fruits by Juan Pablo Guerra Ibarra, Francisco Javier Cuevas de la Rosa, Julieta Raquel Hernandez Vidales

    Published 2025-05-01
    “…This task is accomplished through training various models of Convolutional Neural Networks. This paper presents a comparative analysis of semantic segmentation performance using a convolutional neural network model with different backbone architectures. …”
    Get full text
    Article
  8. 768

    Breath Detection from a Microphone Using Machine Learning by Tomasz Sankowski, Piotr Sulewski, Jan Walczak, Aleksandra Bruska

    Published 2025-01-01
    “…Spectrogram Classification Using Convolutional Neural Networks: This approach involves classifying spectrograms of half-second or quarter-second audio segments using a convolutional neural network adapted for image classification tasks. 3. …”
    Get full text
    Article
  9. 769

    A Framework for Breast Cancer Classification with Deep Features and Modified Grey Wolf Optimization by Fathimathul Rajeena P.P, Sara Tehsin

    Published 2025-04-01
    “…Breast cancer is the most common disease in women, with 287,800 new cases and 43,200 deaths in 2022 across United States. …”
    Get full text
    Article
  10. 770

    Analysis of Students’ Role Perceptions and their Tendencies in Classroom Education Based on Visual Inspection by Lanlan Jiang

    Published 2022-01-01
    “…A multi example learning student engagement assessment method based on a one-dimensional convolutional neural network is proposed. Based on the conceptual composition of student engagement, head posture, eye gaze, and eye-opening and closing states and the most used facial movement units are used as visual features. …”
    Get full text
    Article
  11. 771
  12. 772

    Tuberculosis detection with customized CNN and oversampling techniques: a deep learning approach by B. H. Shekar, Shazia Mannan

    Published 2025-06-01
    “…Tuberculosis has been with us since time immemorial, and although being treatable and curable, it remains one of the world’s most infectious malady, killing millions each year. …”
    Get full text
    Article
  13. 773

    Estimating Bandwidth and Analyzing Worst-Case Delay Bounds Using Network Calculus by Md Amirul Islam, Giovanni Stea

    Published 2025-01-01
    “…Our approach models available bandwidth as a service curve and employs min-plus algebra-specifically, convolution and deconvolution operations-to derive end-to-end predictions from individual link characteristics. …”
    Get full text
    Article
  14. 774

    Logatome and Sentence Recognition Related to Acoustic Parameters of Enclosures by Jedrzej KOCIŃSKI, Edward OZIMEK

    Published 2017-07-01
    “…On this base, the following objective parameters of the enclosure were determined: Reverberation Time (RT), Early Decay Time (EDT), Weighted Clarity (C50) and Speech Transmission Index (STI). A convolution of the IRs with logatome tests and the Polish Sentence Test (PST) was made. …”
    Get full text
    Article
  15. 775

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “…In addition to using statistics as a foundation, convolution neural networks (CNN), generative adversarial networks (GAN), coverless approaches, and machine learning are all used to construct steganographic methods. …”
    Get full text
    Article
  16. 776

    A YOLOv8 algorithm for safety helmet wearing detection in complex environment by Chunning Song, Yinzhong Li

    Published 2025-07-01
    “…Abstract Helmets are the most common protective equipment on construction sites and can effectively reduce head injuries caused by falling objects. …”
    Get full text
    Article
  17. 777

    A Combined Deep CNN: LSTM with a Random Forest Approach for Breast Cancer Diagnosis by Almas Begum, V. Dhilip Kumar, Junaid Asghar, D. Hemalatha, G. Arulkumaran

    Published 2022-01-01
    “…The most predominant kind of disease that is normal among ladies is breast cancer. …”
    Get full text
    Article
  18. 778

    Explore human parsing modality for action recognition by Jinfu Liu, Runwei Ding, Yuhang Wen, Nan Dai, Fanyang Meng, Fang‐Lue Zhang, Shen Zhao, Mengyuan Liu

    Published 2024-12-01
    “…The first human pose branch feeds robust skeletons in the graph convolutional network to model pose features, while the second human parsing branch also leverages depictive parsing feature maps to model parsing features via convolutional backbones. …”
    Get full text
    Article
  19. 779

    Development of Robust CNN Architecture for Grading and Classification of Renal Cell Carcinoma Histology Images by Amit Kumar Chanchal, Shyam Lal, Shilpa Suresh

    Published 2025-01-01
    “…Kidney cancer is a commonly diagnosed cancer disease in recent years, and Renal Cell Carcinoma (RCC) is the most common kidney cancer responsible for 80% to 85% of all renal tumors. …”
    Get full text
    Article
  20. 780

    Inference of Gene Regulatory Networks for Breast Cancer Based on Genetic Modules by Yihao Chen, Ling Guo, Yue Pan, Hui Cai, Zhitong Bing

    Published 2025-01-01
    “…This new method combining genetic modules and convolutional neural networks is presented to infer GRNs from the RNA sequencing data of breast cancer. …”
    Get full text
    Article