Suggested Topics within your search.
Suggested Topics within your search.
-
1121
New low storage VM-algorithm for constrained optimization
Published 2009-09-01“…In this paper a new low-storage VM-algorithm for constrained optimization is investigated both theoretically and experimentally. …”
Get full text
Article -
1122
The Art of Randomness: Sampling and Chance in the Age of Algorithmic Reproduction
Published 2024-10-01Get full text
Article -
1123
Chaos-based scramble self-embedding watermarking algorithm
Published 2006-01-01“…A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the wa- termarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effec- tively locate tamper block. …”
Get full text
Article -
1124
A Bat Algorithm with Mutation for UCAV Path Planning
Published 2012-01-01“…Furthermore, a new bat algorithm with mutation (BAM) is proposed to solve the UCAV path planning problem, and a modification is applied to mutate between bats during the process of the new solutions updating. …”
Get full text
Article -
1125
Research on prioritization algorithm for multi-hazard warning dissemination
Published 2025-06-01Subjects: Get full text
Article -
1126
A topology optimization algorithm for electroelasticity coupled problems
Published 2024-09-01“…A topology optimization algorithm was formulated and implemented (as program code in Python) for bodies under the action of the coupled electric and mechanical fields. …”
Get full text
Article -
1127
ALGORITHM FOR MANAGEMENT OF HYPERTENSIVE PATIENTS UNDERWENT UROLOGY INTERVENTIONS
Published 2015-09-01“…The elaborated management algorithm for patients with concomitant hypertension is recommended to reduce the cardiovascular complications in the early postoperative period.…”
Get full text
Article -
1128
Skeletonization algorithm FOR OBJECTS ON THREE-DIMENSIONAL RASTER IMAGES
Published 2019-06-01“…A skeleton building algorithm in case of lack of memory is presented. Built skeleton is topologically equivalent to the original object. …”
Get full text
Article -
1129
Treatment algorithm for robotic transplant ureteral stricture repair
Published 2025-03-01“…Here, we describe our treatment algorithm for robotic reconstruction of transplant ureteral strictures. …”
Get full text
Article -
1130
Camparison of Numerically Stability of Two Algorithms for the Calculation of Variance
Published 2010-09-01“…In descriptive statistics, there are two computational algorithms for determining the variance S2, of a set of observations : Algorithm 1: S2= - , Algorithm 2: S2= , where . …”
Get full text
Article -
1131
Distributed Voronoi coverage algorithm in wireless sensor networks
Published 2010-01-01“…On the hypothesis conditions that wireless sensor networks only covered partial target region and the commu-nication radius was no less than twice of the sensing radius,a coverage-preserved and connected distributed Voronoi cov-erage algorithm was presented.Firstly,a method of detecting coverage redundancy sensors based on the local Voronoi re-gions was proposed,whose computational complexity was unconcerned with the density of sensors.Then,an en-ergy-prior self-scheduling strategy based on local Voronoi neighbors was proposed,where those sensors that were com-munication neighbors but not local Voronoi neighbors could synchronously execute self-scheduling,which improved the astringency of distributed scheduling.The simulation results show that the average number and coverage-degree of active sensors produced by the proposed algorithm are close to the centralized algorithm and smaller than the general distributed algorithm,while the proposed algorithm has more advantages in terms of active sensors’ average energy,scheduling as-tringency and runtime.…”
Get full text
Article -
1132
A survey of 3D object detection algorithms
Published 2023-03-01“…3D object detection is a fundamental problem in autonomous driving,virtual reality,robotics,and other applications.Its goal is to extract the most accurate 3D box characterizing interested targets from the disordered point clouds,such as the closest 3D box surrounding the pedestrians or vehicles.The target 3D box's location,size,and orientation are also output.Currently,there are two primary approaches for 3D object detection: (1) pure point cloud based 3D object detection,in which the point clouds are created by binocular vision,RGB-D camera,and lidar; (2) fusion-based 3D object detection based on the fusion of image and point cloud.The various representations of 3D point clouds were introduced.Then representative methods were introduced from three aspects: traditional machine learning techniques; non-fusion deep learning based algorithms; and multimodal fusion-based deep learning algorithms in progressive relation.The algorithms within and across each category were examined and compared,and the differences and connections between the various methods were analyzed thoroughly.Finally,remaining challenges of 3D object detection were discussed and explored.And the primary datasets and metrics used in 3D object detection studies were summarized.…”
Get full text
Article -
1133
Neuromorphic computing for robotic vision: algorithms to hardware advances
Published 2025-08-01“…., event-based cameras), brain-inspired algorithms (SNNs and SNN-ANN hybrids), and dedicated neuromorphic hardware. …”
Get full text
Article -
1134
Improved tree structure anti-collision algorithm of RFID
Published 2015-07-01“…The whole big query tree is divided into several branches,and the work of tag recognition is executed in each branch,thus reducing the probability of tag collision.The proposed algorithm can be divided into prefix determination and branch query two phases.In the prefix determination phase,the prefix of every tag is identified,and each prefix denotes a branch.Traverse each branch by turns to recognize tags; in the branch query phase,backward search strategy and dynamic search method are used.Theoretical analysis and simulation experiment show that when the improved algorithm can improved the overall performance of RFID system from the aspects of the number of queries,time delay,and throughput.…”
Get full text
Article -
1135
Plug-and-Play PRNU Enhancement Algorithm with Guided Filtering
Published 2024-12-01“…Based on this finding, we propose a guided-filtering PRNU enhancement algorithm. This algorithm can function as a plug-and-play module, seamlessly integrating with existing mainstream enhancement techniques to further boost PRNU performance. …”
Get full text
Article -
1136
On precise path planning algorithm in wireless sensor network
Published 2018-07-01“…The analysis of simulation results concludes that random way point has higher performance efficiency compared to rest of the static path planning algorithms concerning location error ratio (accuracy), energy consumption, and number of references in medium and dense node density scenarios. …”
Get full text
Article -
1137
Flood the Zone with Shit: Algorithmic Domination in the Modern Republic
Published 2025-06-01Subjects: Get full text
Article -
1138
Introduction: Data Communication and Topology Algorithms for Sensor Networks
Published 2005-01-01Get full text
Article -
1139
ALGORITHM OF AIR TRAFFIC PRE-TACTICAL PLANNING SYSTEM
Published 2016-11-01“…This algorithm was tested using the simulator tower type “Sintez-TC-V”. …”
Get full text
Article -
1140
Computational Algorithms and Aesthetic Impact in Animated Visual Effects
Published 2024-01-01Subjects: “…Computational algorithms…”
Get full text
Article