-
15121
Faster R-CNN and 3D reconstruction for handling tasks implementing a Scara robot
Published 2024-11-01“…This paper presents the design and results of using a deep learning algorithm for robotic manipulation in object handling tasks in a virtual industrial environment. …”
Get full text
Article -
15122
Using wavelet denoising and mathematical morphology in the segmentation technique applied to blood cells images
Published 2012-12-01“…Finally, theproposed algorithm made in MatLab environment is verified for a selected blood cells.…”
Get full text
Article -
15123
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01“…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
Get full text
Article -
15124
Information extraction from massive Web pages based on node property and text content
Published 2016-10-01“…To address the problem of extracting valuable information from massive Web pages in big data environments,a novel information extraction method based on node property and text content for massive Web pages was put forward.Web pages were converted into a document object model (DOM) tree,and a pruning and fusion algorithm was introduced to simplify the DOM tree.For each node in the DOM tree,both density property and vision property was defined and Web pages were pretreated based on these property values.A MapReduce framework was employed to realize parallel information extraction from massive Web pages.Simulation and experimental results demonstrate that the proposed extraction method can not only achieve better performance but also have higher scalability compared with other methods.…”
Get full text
Article -
15125
A Collocation Approach for the Nonlinear Fifth-Order KdV Equations Using Certain Shifted Horadam Polynomials
Published 2025-01-01“…This paper proposes a numerical algorithm for the nonlinear fifth-order Korteweg–de Vries equations. …”
Get full text
Article -
15126
ROTOR FAULT FEATURE EXTRACTION METHOD USING MVMD AND IEDPE (MT)
Published 2023-01-01“…The parameters of the variational mode decomposition(VMD) decomposition layer are determined using correlation threshold strategy and the MVMD algorithm is designed. Then, the acquired vibration signals are input into the MVMD for decomposition and the instantaneous energy distribution of each mode component is calculated. …”
Get full text
Article -
15127
Container intrusion detection method based on host system call frequency
Published 2021-08-01“…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
Get full text
Article -
15128
Human Body Model for Channel Characterization Based on Ray-Tracing
Published 2020-01-01“…In this paper, a realistic human body is modeled with the idea of greedy algorithm. Based on the RT simulation and measurement results of path loss (PL), we derive the approximate shapes of the torso, head, arms, and legs, and propose a reference human body model whose credibility and accuracy have been verified at 2.4 GHz and 60 GHz. …”
Get full text
Article -
15129
Optimization Research of the Hinge Position and Output Speed of Electromechanical Erection Device
Published 2021-08-01“…The relation between output speed and output power, the relation between output speed and output force, the relation between hinge position and output power, the relation between hinge position and output force are explored. The Genetic Algorithm is taken to optimize the output speed and the hinge position. …”
Get full text
Article -
15130
Imbalanced Data Sets Classification Based on SVM for Sand-Dust Storm Warning
Published 2015-01-01“…In view of the SVM classification for the imbalanced sand-dust storm data sets, this paper proposes a hybrid self-adaptive sampling method named SRU-AIBSMOTE algorithm. This method can adaptively adjust neighboring selection strategy based on the internal distribution of sample sets. …”
Get full text
Article -
15131
Dynamic Modeling and Parameters Optimization of Large Vibrating Screen with Full Degree of Freedom
Published 2019-01-01“…Further, the genetic algorithm is used to optimize the established neural network model, and the optimal design parameters are obtained.…”
Get full text
Article -
15132
State Companies as Claimants Under the 1965 Washington Convention on Investment Disputes Between States and Foreign Persons
Published 2023-03-01“…In addition, the author proposes an algorithm for determining whether a state-owned company, which is authorized to exercise elements of state power, has the right of action.…”
Get full text
Article -
15133
Refining instantaneous frequency estimation: Tackling abrupt transitions in aliased non-stationary signals
Published 2025-03-01“…The proposed Instantaneous Frequency estimation algorithm is further extended by adding a refinement mechanism where the crude estimates of Instantaneous Frequencies are further improved through the re-estimation stage. …”
Get full text
Article -
15134
Application of Autofluorescence Endoscopy for Colorectal Cancer Screening: Rationale and an Update
Published 2012-01-01“…While detecting faint autofluorescence intensity by conventional fiberoptic endoscopy remains challenging, the latest AFE system with high-resolution videoendoscope capabilities enables such detection by using a false-color display algorithm. To this end, the diagnostic benefits of AFE have been reported in several multicenter randomized controlled studies of colorectal cancer (CRC) screening and differential diagnosis. …”
Get full text
Article -
15135
Simultaneous Resource Accumulation and Payoff Allocation: A Cooperative Fuzzy Game Approach
Published 2018-01-01“…We develop a simultaneous resource accumulation and payoff allocation algorithm under the framework of a cooperative fuzzy game that builds on our earlier work on the role of satisfaction in resource accumulation and payoff allocation. …”
Get full text
Article -
15136
Dynamic spectrum access mechanism based on graphical evolutionary game in radio networks
Published 2015-07-01“…In order to realize efficient data transmission for users in radio networks,a dynamic spectrum access mechanism based on graphical evolutionary game was proposed for the bounded rationality characteristic of users,while graphical game can better reflect the actual game relationship among users.Meanwhile,a dynamic spectrum access algorithm and corresponding dynamic equation were designed for the mechanism to reduce the complexity of the game,and could converge to Nash equilibrium with faster speed and obtain higher system throughput and utility.Theoretical analysis showed that the dynamic equation was globally asymptotically stable,which illustrated that when user deviated because of bounded rationality and it was still able to guarantee faster converge and fewer performance deviation.Simulation comparison verifies the superiority above.…”
Get full text
Article -
15137
Gradient Based Multipath Reliable Transmission Strategy with Fault Tolerance for Wireless Sensor Networks
Published 2014-04-01“…Firstly nonuniform clustering topology is established in nonequal clustering probability based on twice K -means algorithm. Then it calculates the comprehensive measurements (CM) of cluster heads by the quality evaluation function and establishes the contour lines. …”
Get full text
Article -
15138
Robust strong tracking unscented Kalman filter for non‐linear systems with unknown inputs
Published 2022-05-01“…Singular value decomposition is performed on the error covariance matrix to improve the stability of the algorithm. Simulated results validate the effectiveness of the proposed method.…”
Get full text
Article -
15139
Pedestrian Detection and Tracking for Counting Applications in Metro Station
Published 2014-01-01“…A pedestrian counting method based on Haar-like detection and template-matching algorithm is presented. The aim of the method is to count pedestrians that are in a metro station automatically using video surveillance camera. …”
Get full text
Article -
15140
A Game-Theoretic Analysis of Bandwidth Allocation under a User-Grouping Constraint
Published 2013-01-01“…Under the assumption that each user’s utility function satisfies some continuity and concavity conditions, the existence, uniqueness, and fairness, in some appropriate sense, of the Nash equilibrium point in the allocation game are proved. An algorithm yielding a sequence converging to the equilibrium point is proposed. …”
Get full text
Article