-
8361
Automatic Player Face Detection and Recognition for Players in Cricket Games
Published 2024-01-01“…The system utilizes the AdaBoost algorithm for player and player face detection, employing a PAL based face recognition model to recognize the faces of players on the field. …”
Get full text
Article -
8362
Control of Magnetic Manipulator Using Reinforcement Learning Based on Incrementally Adapted Local Linear Models
Published 2021-01-01“…We have introduced modifications to the RFWR algorithm to better suit the low-dimensional continuous-time systems we are mostly dealing with. …”
Get full text
Article -
8363
Reentry Capsule Reachable Tube Boundary Prediction via Evolutionary Multiobjective Optimization
Published 2024-01-01“…Ultimately, the multiobjective evolutionary algorithm based on decomposition was employed to solve the multiobjective optimization model, and the geometric boundary of the tube corresponds to the Pareto front of the multiobjective optimization. …”
Get full text
Article -
8364
Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience
Published 2024-03-01“…The formation of a basic threat model for critical infrastructure facilities, which should include related models of the facility, situation and intruder, is currently an important element of the algorithm for solving this problem. The basic model of threats to critical infrastructure is the framework on which the state determines who and what it needs to protect itself from at the national level. …”
Get full text
Article -
8365
Efficiency and Reliability Analysis of Self-Adaptive Two-Stage Fuzzy Control System in Complex Traffic Environment
Published 2022-01-01“…Aiming at the problems of the parameters of membership functions empirical settings and insufficient response to the real-time fluctuation in traffic flow, the controller introduces an improved hybrid genetic algorithm to solve it and enable the controller to self-learn. …”
Get full text
Article -
8366
Identifying urban, transportation, and socioeconomic characteristics across US zip codes affecting CO2 emissions: A decision tree analysis
Published 2025-06-01“…The dataset was carefully prepared to ensure accuracy and relevance, considering temporal, geographical, and socioeconomic heterogeneity. The Decision Tree algorithm was applied iteratively to evaluate variable interactions and identify critical thresholds that influence carbon emissions. …”
Get full text
Article -
8367
Log-Based Analysis of Creativity in the Context of Computational Thinking
Published 2024-12-01“…We developed a Python algorithm to automatically analyze the logged solutions across four creativity measures. …”
Get full text
Article -
8368
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Published 2022-01-01“…As shown in the experimental results, the proposed HTs are hardly detected even by the novel HT detection approach based on machine learning algorithm. These HTs have small footprints on the design in terms of area and power to resist the side‐channel effect analysis. …”
Get full text
Article -
8369
Haptic Manipulation of Deformable Objects in Hybrid Bilateral Teleoperation System
Published 2007-01-01“…The virtual environment of this hybrid bilateral teleoperation system combines collision detection algorithms, dynamical, kinematical and geometrical models with a position–position and/or force–position bilateral control algorithm, to produce on the operator side the reflected forces corresponding to the virtual mechanical interactions, through a haptic device. …”
Get full text
Article -
8370
Adaptive Model Predictive Vibration Control of a Cantilever Beam with Real-Time Parameter Estimation
Published 2014-01-01“…The model predictive control algorithm generates state predictions and dual-mode quadratic cost prediction matrices based on the updated discrete state-space models. …”
Get full text
Article -
8371
Multiple programmed cell death patterns predict the prognosis and drug sensitivity in gastric cancer
Published 2025-02-01“…Immune cell infiltration, immune checkpoint expression, Tumor Immune Dysfunction and Exclusion (TIDE) algorithm and drug sensitivity analysis were used to explore immunotherapy response. …”
Get full text
Article -
8372
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Furthermore, by integrating the algorithm with the high‐performance RL framework, sample factory, EPPTA significantly reduces convergence time compared to existing pen‐testing methods, resulting in an approximately 20‐fold acceleration. …”
Get full text
Article -
8373
Deadlock Prevention Policy with Behavioral Optimality or Suboptimality Achieved by the Redundancy Identification of Constraints and the Rearrangement of Monitors
Published 2015-01-01“…For the possible existence of new siphons generated after the first phase, we add monitors with their output arcs first pointed to source transitions at the second phase to avoid new siphons generating and then rearrange the output arcs step by step on condition that liveness is preserved. In addition, an algorithm is proposed to remove the redundant constraints of the MIP problem in this paper. …”
Get full text
Article -
8374
Multi-objective optimization of the heating oil circuit inside the calendering roller for the lithium battery pole piece
Published 2025-01-01“…Then, the improved NSGA-II algorithm is selected to execute the optimization loop. …”
Get full text
Article -
8375
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…Due to the fact that the signature size and the concrete security are closely related to the Gaussian parameter of the sampling algorithm, this technique provides a tradeoff between them. …”
Get full text
Article -
8376
Numerical characterization of hemodynamics conditions near aortic valve after implantation of left ventricular assist device
Published 2011-05-01“…The use of LVADs has been associated with thrombus formation next to the aortic valve and close to the anastomosis region,especially in patients in which the native cardiac function isnegligible and the aortic valve remains closed.Stagnation points and recirculation zones have been implicated as the main fluid dynamics factors contributing to thrombus formation.The purpose of the present study was to develop and use computer simulations based on afluid-structure interaction (FSI) solver to study flow conditions corresponding to different strategies inLVAD ascending aortic anastomosis providing a scenario with the lowest likelihood of thrombus formation.A novel FSI algorithm was developed to dealwith the presence of multiple structures corresponding to different elastic properties ofthe native aorta and of the LVAD cannula.A sensitivity analysis of different variables was performed to assess their impact of flow conditionspotentially leading to thrombus formation.It was found that the location of the anastomosis closest to the aortic valve(within 4 cm away from the valve)and at the angle of 30$^\circ$ minimizes the likelihood of thrombus formation.Furthermore, it was shownthat the rigidity of the dacron anastomosis cannula plays almost no role in generating pathologicalconditions downstream from the anastomosis.Additionally, the flow analysis presented in this manuscriptindicates that compliance of the cardiovascular tissue acts as a natural inhibitor of pathological flow conditions conducive to thrombus formationand should not be neglected in computer simulations.…”
Get full text
Article -
8377
Improved Support Vector Machine and Image Processing Enabled Methodology for Detection and Classification of Grape Leaf Disease
Published 2022-01-01“…Image denoising is conducted using the mean function, image enhancement is performed using the CLAHE method, pictures are segmented using the fuzzy C Means algorithm, features are retrieved using PCA, and images are eventually classed using the PSO SVM, BPNN, and random forest algorithms. …”
Get full text
Article -
8378
Targeted Advertising in Social Media Platforms Using Hybrid Convolutional Learning Method besides Efficient Feature Weights
Published 2022-01-01“…Using accuracy, recall, F-measure, and precision metrics, we compared our algorithm to standard techniques such as SVM, Logistic regression, Naïve Bayes, and CNN. …”
Get full text
Article -
8379
Randomized and Efficient Time Synchronization in Dynamic Wireless Sensor Networks: A Gossip-Consensus-Based Approach
Published 2018-01-01“…This paper proposes novel randomized gossip-consensus-based sync (RGCS) algorithms to realize efficient time calibration in dynamic wireless sensor networks (WSNs). …”
Get full text
Article -
8380
A Parameter Estimation Method for Nonlinear Systems Based on Improved Boundary Chicken Swarm Optimization
Published 2016-01-01“…As a novel swarm intelligence algorithm, chicken swarm optimization (CSO) has attracted much attention owing to its good global convergence and robustness. …”
Get full text
Article