The artificial immune danger theory is introduced into the analysis of user behavior characteristics to effectively identify the dormant member users of pharmacies. Take pharmacy members as an example, analyze the beh...
详细信息
ISBN:
(数字)9781728190044
ISBN:
(纸本)9781728190051
The artificial immune danger theory is introduced into the analysis of user behavior characteristics to effectively identify the dormant member users of pharmacies. Take pharmacy members as an example, analyze the behavior characteristics of pharmacy members, select characteristic attributes such as purchasing behavior, medical history, gender and age, payment method, activity level, membership card points, *** the attribute analysis result as the characteristic signal to distinguish between quasi-sleeping member users and normal users, and based on Dendritic Cells Algorithm(DCA) to realize the identification of quasi-sleeping members of *** effectiveness of the algorithm is verified and compared with the real data of pharmacy member users. The results show that the method can effectively detect users who may become sleeping members among pharmacy members, and has a high detection accuracy rate.
Automatically understanding pixel-level semantic relation in urban area from very high resolution (VHR) aerial images is the kernel way of urbanization development and planning. However, due to aerial images covering ...
详细信息
It is imperative to select key genes from tumor gene expressive data for genotype prediction. In this paper, a supervised gene selection method is proposed. Firstly, all the genes are sorted as their descending F-scor...
详细信息
DNA computing is a parallel computing model based on DNA molecules. High-quality DNA sequences can prevent unwanted hybridization errors in the computation process. The design of DNA molecules can be regarded as a mul...
详细信息
Prediction the mechanical properties is very important in many real-life industry fields. In this paper, we proposed an efficient convolutional neural network (CNN) to predict the mechanical properties of hot roll ste...
详细信息
In this study, a single channel pipelined variable-length fast Fourier transformation (FFT) processor design is presented. With the development of science and technology, digital signal processing has been widely used...
详细信息
The fast Fourier transform FFT processor is an important part of the space real-time signal processing system based on field programmable gate array (FPGA). Since occupying a large amount of logical resources and stor...
详细信息
Object detection networks require large storage space and high computational cost, it is difficult to deploy deep neural networks on embedded devices with limited memory and computing resources in actual object detect...
详细信息
ISBN:
(数字)9781728142722
ISBN:
(纸本)9781728142739
Object detection networks require large storage space and high computational cost, it is difficult to deploy deep neural networks on embedded devices with limited memory and computing resources in actual object detection tasks. In order to solve these challenges, we propose an efficient object detection framework by pruning channels of the feature extraction layer of the network. First, we apply the L1 regularization to the channel scale factor in the BN layer to obtain the object detection network with sparse structure. Then we trim the channel with less information to get the object detection framework. Based on this method, we obtained Slim-SSD with less trainable parameters and test time. Our experiments on benchmarks show that, on the basis of approximate accuracy with the original network, we have reduced the number of model parameters by 3x, and reduced the testing time by 2x. Our compression method helps to deploy complex object detection networks on resource-constrained embedded platform.
For the real-time SAR imaging systems, aiming at the problems of low real-time performance and high power consumption of traditional computing platforms, an implementation method was studied for embedded GPU. In order...
详细信息
Nowadays, the QR code is often used in many popular fields, such as payment and social networking. Therefore, it is particularly important to quickly and accurately detect the position of QR code in real complex scene...
详细信息
暂无评论