Showing 15,121 - 15,140 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 15121

    Faster R-CNN and 3D reconstruction for handling tasks implementing a Scara robot by Julian Herrera-Benavidez, Cesar Pachón-Suescún, Robinson Jimenez-Moreno

    Published 2024-11-01
    “…This paper presents the design and results of using a deep learning algorithm for robotic manipulation in object handling tasks in a virtual industrial environment. …”
    Get full text
    Article
  2. 15122

    Using wavelet denoising and mathematical morphology in the segmentation technique applied to blood cells images by Macarena Boix, Begoña Cantó

    Published 2012-12-01
    “…Finally, theproposed algorithm made in MatLab environment is verified for a selected blood cells.…”
    Get full text
    Article
  3. 15123

    Multi-authority attribute-based encryption access control model for cloud storage by Zhi-tao GUAN, Ting-ting YANG, Ru-zhi XU, Zhu-xiao WANG

    Published 2015-06-01
    “…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
    Get full text
    Article
  4. 15124

    Information extraction from massive Web pages based on node property and text content by Hai-yan WANG, Pan CAO

    Published 2016-10-01
    “…To address the problem of extracting valuable information from massive Web pages in big data environments,a novel information extraction method based on node property and text content for massive Web pages was put forward.Web pages were converted into a document object model (DOM) tree,and a pruning and fusion algorithm was introduced to simplify the DOM tree.For each node in the DOM tree,both density property and vision property was defined and Web pages were pretreated based on these property values.A MapReduce framework was employed to realize parallel information extraction from massive Web pages.Simulation and experimental results demonstrate that the proposed extraction method can not only achieve better performance but also have higher scalability compared with other methods.…”
    Get full text
    Article
  5. 15125

    A Collocation Approach for the Nonlinear Fifth-Order KdV Equations Using Certain Shifted Horadam Polynomials by Waleed Mohamed Abd-Elhameed, Omar Mazen Alqubori, Ahmed Gamal Atta

    Published 2025-01-01
    “…This paper proposes a numerical algorithm for the nonlinear fifth-order Korteweg–de Vries equations. …”
    Get full text
    Article
  6. 15126

    ROTOR FAULT FEATURE EXTRACTION METHOD USING MVMD AND IEDPE (MT) by WU YaoChun, GUO XiaoBo, DU ShaoHua, JU Hai, ZHAO Yan, WU Jie, JIA XiaoFeng

    Published 2023-01-01
    “…The parameters of the variational mode decomposition(VMD) decomposition layer are determined using correlation threshold strategy and the MVMD algorithm is designed. Then, the acquired vibration signals are input into the MVMD for decomposition and the instantaneous energy distribution of each mode component is calculated. …”
    Get full text
    Article
  7. 15127

    Container intrusion detection method based on host system call frequency by Yimu JI, Weidong YANG, Kui LI, Shangdong LIU, Qiang LIU, Sisi SHAO, Shuai YOU, Naijiao HUANG

    Published 2021-08-01
    “…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
    Get full text
    Article
  8. 15128

    Human Body Model for Channel Characterization Based on Ray-Tracing by Lei Xiong, Haiyang Miao, Zhiyi Yao

    Published 2020-01-01
    “…In this paper, a realistic human body is modeled with the idea of greedy algorithm. Based on the RT simulation and measurement results of path loss (PL), we derive the approximate shapes of the torso, head, arms, and legs, and propose a reference human body model whose credibility and accuracy have been verified at 2.4 GHz and 60 GHz. …”
    Get full text
    Article
  9. 15129

    Optimization Research of the Hinge Position and Output Speed of Electromechanical Erection Device by Wei Cai, Shangjun Ma, Jianxin Zhang, Yong Zhou, Xiang Chen, Geng Liu

    Published 2021-08-01
    “…The relation between output speed and output power, the relation between output speed and output force, the relation between hinge position and output power, the relation between hinge position and output force are explored. The Genetic Algorithm is taken to optimize the output speed and the hinge position. …”
    Get full text
    Article
  10. 15130

    Imbalanced Data Sets Classification Based on SVM for Sand-Dust Storm Warning by Yonghua Xie, Yurong Liu, Qingqiu Fu

    Published 2015-01-01
    “…In view of the SVM classification for the imbalanced sand-dust storm data sets, this paper proposes a hybrid self-adaptive sampling method named SRU-AIBSMOTE algorithm. This method can adaptively adjust neighboring selection strategy based on the internal distribution of sample sets. …”
    Get full text
    Article
  11. 15131

    Dynamic Modeling and Parameters Optimization of Large Vibrating Screen with Full Degree of Freedom by Xiaodong Yang, Jida Wu, Haishen Jiang, Wenqiang Qiu, Chusheng Liu

    Published 2019-01-01
    “…Further, the genetic algorithm is used to optimize the established neural network model, and the optimal design parameters are obtained.…”
    Get full text
    Article
  12. 15132

    State Companies as Claimants Under the 1965 Washington Convention on Investment Disputes Between States and Foreign Persons by N. S. Andreeva

    Published 2023-03-01
    “…In addition, the author proposes an algorithm for determining whether a state-owned company, which is authorized to exercise elements of state power, has the right of action.…”
    Get full text
    Article
  13. 15133

    Refining instantaneous frequency estimation: Tackling abrupt transitions in aliased non-stationary signals by Sadiq Ali, Nabeel Ali Khan

    Published 2025-03-01
    “…The proposed Instantaneous Frequency estimation algorithm is further extended by adding a refinement mechanism where the crude estimates of Instantaneous Frequencies are further improved through the re-estimation stage. …”
    Get full text
    Article
  14. 15134

    Application of Autofluorescence Endoscopy for Colorectal Cancer Screening: Rationale and an Update by Hiroyuki Aihara, Hisao Tajiri, Takeshi Suzuki

    Published 2012-01-01
    “…While detecting faint autofluorescence intensity by conventional fiberoptic endoscopy remains challenging, the latest AFE system with high-resolution videoendoscope capabilities enables such detection by using a false-color display algorithm. To this end, the diagnostic benefits of AFE have been reported in several multicenter randomized controlled studies of colorectal cancer (CRC) screening and differential diagnosis. …”
    Get full text
    Article
  15. 15135

    Simultaneous Resource Accumulation and Payoff Allocation: A Cooperative Fuzzy Game Approach by Surajit Borkotokey, Rupok Neog, Qiang Zhang

    Published 2018-01-01
    “…We develop a simultaneous resource accumulation and payoff allocation algorithm under the framework of a cooperative fuzzy game that builds on our earlier work on the role of satisfaction in resource accumulation and payoff allocation. …”
    Get full text
    Article
  16. 15136

    Dynamic spectrum access mechanism based on graphical evolutionary game in radio networks by Fang-wei LI, Ying-hui YUAN, Jiang ZHU

    Published 2015-07-01
    “…In order to realize efficient data transmission for users in radio networks,a dynamic spectrum access mechanism based on graphical evolutionary game was proposed for the bounded rationality characteristic of users,while graphical game can better reflect the actual game relationship among users.Meanwhile,a dynamic spectrum access algorithm and corresponding dynamic equation were designed for the mechanism to reduce the complexity of the game,and could converge to Nash equilibrium with faster speed and obtain higher system throughput and utility.Theoretical analysis showed that the dynamic equation was globally asymptotically stable,which illustrated that when user deviated because of bounded rationality and it was still able to guarantee faster converge and fewer performance deviation.Simulation comparison verifies the superiority above.…”
    Get full text
    Article
  17. 15137

    Gradient Based Multipath Reliable Transmission Strategy with Fault Tolerance for Wireless Sensor Networks by Hongbing Li, Qingyu Xiong, Weiren Shi, Cheng Zeng, Min Fan

    Published 2014-04-01
    “…Firstly nonuniform clustering topology is established in nonequal clustering probability based on twice K -means algorithm. Then it calculates the comprehensive measurements (CM) of cluster heads by the quality evaluation function and establishes the contour lines. …”
    Get full text
    Article
  18. 15138

    Robust strong tracking unscented Kalman filter for non‐linear systems with unknown inputs by Xinghua Liu, Jianwei Guan, Rui Jiang, Xiang Gao, Badong Chen, Shuzhi Sam Ge

    Published 2022-05-01
    “…Singular value decomposition is performed on the error covariance matrix to improve the stability of the algorithm. Simulated results validate the effectiveness of the proposed method.…”
    Get full text
    Article
  19. 15139

    Pedestrian Detection and Tracking for Counting Applications in Metro Station by Chen Yan-yan, Chen Ning, Zhou Yu-yang, Wu Ke-han, Zhang Wei-wei

    Published 2014-01-01
    “…A pedestrian counting method based on Haar-like detection and template-matching algorithm is presented. The aim of the method is to count pedestrians that are in a metro station automatically using video surveillance camera. …”
    Get full text
    Article
  20. 15140

    A Game-Theoretic Analysis of Bandwidth Allocation under a User-Grouping Constraint by Shun-Pin Hsu, Shun-Liang Hsu, Alan Shenghan Tsai

    Published 2013-01-01
    “…Under the assumption that each user’s utility function satisfies some continuity and concavity conditions, the existence, uniqueness, and fairness, in some appropriate sense, of the Nash equilibrium point in the allocation game are proved. An algorithm yielding a sequence converging to the equilibrium point is proposed. …”
    Get full text
    Article