Showing 1,601 - 1,620 results of 1,766 for search 'most convolutional', query time: 0.10s Refine Results
  1. 1601

    Application of DEO Method to Solving Fuzzy Multiobjective Optimal Control Problem by Latafat A. Gardashova

    Published 2014-01-01
    “…On the other hand, the number of the criteria is not small and most of them are integral criteria. Due to the above mentioned aspects, solving the considered problem by using convolution of criteria into one criterion would lead to loss of information and also would be counterintuitive and complex. …”
    Get full text
    Article
  2. 1602

    A new approach to the room impulse response simulation by H. Łopacz, R. Marczuk

    Published 2004-01-01
    “…The most important problem of room acoustics is the evaluation of the acoustic quality of projected and modernized rooms. …”
    Get full text
    Article
  3. 1603

    A Study on Energy Consumption in AI-Driven Medical Image Segmentation by R. Prajwal, S. J. Pawan, Shahin Nazarian, Nicholas Heller, Christopher J. Weight, Vinay Duddalwar, C.-C. Jay Kuo

    Published 2025-05-01
    “…While training is energy-intensive, the recurring nature of inference often results in significantly higher cumulative energy consumption over a model’s life cycle. Depthwise Convolution with Mixed Precision achieves the lowest energy consumption during training while maintaining strong performance, making it the most energy-efficient configuration among those tested. …”
    Get full text
    Article
  4. 1604

    An automatic modulation recognition network based on multi-channel lightweighting by WAN Jinhua, SHANG Junna, ZHANG Huadi

    Published 2025-02-01
    “…Existing automatic modulation recognition models perform well in recognition accuracy, but most methods have difficulty in achieving an ideal balance between the number of parameters and model performance. …”
    Get full text
    Article
  5. 1605

    HiCDiffusion - diffusion-enhanced, transformer-based prediction of chromatin interactions from DNA sequences by Mateusz Chiliński, Dariusz Plewczynski

    Published 2024-10-01
    “…Several solutions have been proposed, most of which are based on encoder-decoder architecture, where 1D sequence is convoluted, encoded into the latent representation, and then decoded using 2D convolutions into the Hi-C pairwise chromatin spatial proximity matrix. …”
    Get full text
    Article
  6. 1606

    University proceedings. Volga region. Technical sciences by V.I. Volchikhin, A.I. Ivanov, A.V. Bezyaev, I.A. Filipov

    Published 2024-12-01
    “…Replacing classical statistical criteria with their equivalent binary neurons provides significant redundancy of the output code of the neural network, which isconvolved with error elimination. The mechanism of convolution of code redundancy can be improved if the most informative part of the neuron response is not quantized. …”
    Article
  7. 1607

    Magma flow localisation during dyke propagation produces complex magma transport pathways by C. Allgood, E. W. Llewellin, R. J. Brown, A. Loisel

    Published 2025-07-01
    “…Abstract Basaltic fissure eruptions, the most common type of eruption on Earth, are fed by dykes, which are magma-filled cracks that propagate through the crust. …”
    Get full text
    Article
  8. 1608

    WSN intrusion detection method using improved spatiotemporal ResNet and GAN by Yang Jing

    Published 2024-12-01
    “…A network intrusion detection method that integrates improved spatiotemporal residual network and generative adversarial network (GAN) in a big data environment is proposed to address the issues of poor feature extraction and significant impact from data imbalance in most existing intrusion detection methods. First, GANs are used for wireless sensor network data resampling to generate new sample sets, thereby overcoming the impact of data imbalance. …”
    Get full text
    Article
  9. 1609

    Semi-supervised machine learning for primary user emulation attack detection and prevention through core-based analytics for cognitive radio networks by Sundar Srinivasan, KB Shivakumar, Muazzam Mohammad

    Published 2019-09-01
    “…Selfish attacks among other attacks are the most challenging, in which a secondary user or an unauthorized user with unlicensed spectrum pretends to be a primary user by altering the signal characteristics. …”
    Get full text
    Article
  10. 1610

    Load Reconstruction Technique Using D-Optimal Design and Markov Parameters by Deepak K. Gupta, Anoop K. Dhingra

    Published 2015-01-01
    “…It has been noted that the computation of inverse Markov parameters, like most other inverse problems, is ill-conditioned which causes their convolution with the measured response to become quite sensitive to errors in system modeling and response measurements. …”
    Get full text
    Article
  11. 1611

    GNN for LoRa Device Fingerprint Identification by Bojun Zhang

    Published 2025-01-01
    “…It calculates the similarity between signals using the Wasserstein distance and selects the top K most similar signals for each as first-order neighbors through heap sorting, constructing phase and RSSI(Received Signal Strength Indicator) graphs and transforming the signal classification problem into a graph-based node classification problem. …”
    Get full text
    Article
  12. 1612

    Stationary Underdispersed INAR(1) Models based on the Backward Approach by Emad-Eldin A. A. Aly, Nadjib Bouzar

    Published 2025-05-01
    “… Most of the stationary first-order autoregressive integer-valued (INAR(1)) models in the literature have been developed using the idea of binomial thinning. …”
    Get full text
    Article
  13. 1613

    Two-stage Detection Method for Abnormal Cluster Cervical Cells by LIANG Yi-qin, ZHAO Si-qi, WANG Hai-tao, HE Yong-jun

    Published 2022-04-01
    “…In the first stage, we use YOLO-v5 target detection network. The standard convolution in the network is replaced by deformable convolution. …”
    Get full text
    Article
  14. 1614

    An Approach for Detecting Tomato Under a Complicated Environment by Chen-Feng Long, Yu-Juan Yang, Hong-Mei Liu, Feng Su, Yang-Jun Deng

    Published 2025-03-01
    “…Tomato is one of the most popular and widely cultivated fruits and vegetables in the world. …”
    Get full text
    Article
  15. 1615
  16. 1616

    Airport Clearance Detection Based on Vision Transformer and Multi-Scale Feature Fusion by Yutong Chen, Yufen Liu, Zhixiong Guo, Qiang Gao

    Published 2025-01-01
    “…Secondly, to improve the feature extraction ability, partial convolution is replaced with dynamic convolution, and attention is introduced to the convolution kernel from four dimensions. …”
    Get full text
    Article
  17. 1617

    Collective cell migration drives morphogenesis of the kidney nephron. by Aleksandr Vasilyev, Yan Liu, Sudha Mudumana, Steve Mangos, Pui-Ying Lam, Arindam Majumdar, Jinhua Zhao, Kar-Lai Poon, Igor Kondrychyn, Vladimir Korzh, Iain A Drummond

    Published 2009-01-01
    “…Complete blockade of pronephric fluid flow prevented cell migration and proximal nephron convolution. Selective blockade of proximal, filtration-driven fluid flow shifted the position of tubule convolution distally and revealed a role for cilia-driven fluid flow in persistent migration of distal nephron cells. …”
    Get full text
    Article
  18. 1618

    Historicizing National Socialism and Mehmet Genç by Ahmet Okumuş

    Published 2023-12-01
    “…National Socialism, more than just a political ideology, signifies one of the most convoluted historical events of the twentieth century. …”
    Get full text
    Article
  19. 1619

    Study the effect of obesity on the liver and kidney of the white rats embryos followed by using of grape seed oil to treat it. (morphological and histological study) by Rashid Khamees Shaaban, Aziz Khalid Hameed

    Published 2023-01-01
    “…After the treatment with grape seeds oil observed most of the embryos appeared normal in size and number without any lesions in the liver and kidney tissue of embryos. …”
    Get full text
    Article
  20. 1620

    Estimating Bandwidth and Analyzing Worst-Case Delay Bounds Using Network Calculus by Md Amirul Islam, Giovanni Stea

    Published 2025-01-01
    “…This paper proposes a bandwidth estimation framework for Network-on-Chip systems using network calculus, addressing the challenges due to nonlinear behavior and dynamic traffic. However, most existing approaches struggle to predict bandwidth effectively when network traffic packets are affected by possible nonlinearity in the network infrastructure. …”
    Get full text
    Article