-
17201
PRIVATE SECURITY SURVEILLANCE SYSTEM
Published 2021-10-01“…A facial recognition algorithm is run on the face extracted from the image captured after the object that caused the motion is identified and classified as human. …”
Get full text
Article -
17202
Study on Optimization of Delay Method of Wedge Cut Blasting in Tunnel
Published 2021-01-01“…Relying on the entrance section of a high-speed railway tunnel blasting project, the fluid-solid coupling algorithm based on ANSYS/LS-DYNA was used to optimize the parameters of wedge cut blasting, and the vibration could be reduced on the basis of ensuring the blasting effect. …”
Get full text
Article -
17203
Development of an autonomous chess robot system using computer vision and deep learning
Published 2025-03-01“…The calculation of chess moves is performed using the minimax algorithm within the Stockfish chess engine. Results indicate that the computation time for a chess move is approximately 2 s per chess position, while the average time for the robot to execute a chess piece movement is from 20 to 90 s for one position, depending on the type of chess move. …”
Get full text
Article -
17204
Robust Optimization Design for Combined Tooth Surface Modification of Helical Gear Pair Considering Load Variation Domain
Published 2024-08-01“…And then, the non-dominated sorting genetic algorithm with elitist strategy is combined with the calculation model of transmission error, the Pareto frontier solutions of the combined modification parameters are solved, and the robust solution which makes the expectation and variance of transmission error fluctuations smaller is selected. …”
Get full text
Article -
17205
Classroom Expression Recognition Based on Deep Learning
Published 2024-12-01“…Experimental results show that the expression recognition accuracy of the MAF-ER algorithm reaches 88.34%, which is better than the baseline method. …”
Get full text
Article -
17206
Simulation Design of a Live Working Manipulator for Patrol Inspection in Power Grid
Published 2022-01-01“…Firstly, the traditional DDPG algorithm is improved to optimize the action value function of Q-learning to get a better control strategy, and the weighted sampling technique is used to add priority to each sample in the replay buffer, which improves the learning speed and accelerates the convergence speed. …”
Get full text
Article -
17207
Performance Evaluation of Car Cargo Scanner Systems for Determining Linear Attenuation Coefficients of Aluminum Metal Sheets: Modeling
Published 2024-12-01“…The obtained images were processed using the algorithm written with MATLAB. Linear attenuation coefficient histograms were obtained from the processed images. …”
Get full text
Article -
17208
Three-Dimensional in Vivo Imaging of Green Fluorescent Protein-Expressing T Cells in Mice with Noncontact Fluorescence Molecular Tomography
Published 2007-03-01“…In this article, we present a novel system that enables three-dimensional imaging of fluorescent probes in whole animals using a noncontact setup, in parallel with a three-dimensional surface reconstruction algorithm. This approach is directed toward the in vivo imaging of fluorophore or fluorescent protein concentration in small animals. …”
Get full text
Article -
17209
MSLp: Deep Superresolution for Meteorological Satellite Image
Published 2021-01-01“…For qualitative analysis, visual tests were performed by 7 meteorologists to confirm the utility of the proposed algorithm. The mean opinion score is 9.32 (the full score is 10). …”
Get full text
Article -
17210
A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks
Published 2014-06-01“…And Dempster-Shafer theory is used to filter out abnormal reports by combining the evidence collected from the spatial correlation algorithm in each sensing period. To mitigate the adverse effects caused by the SUs’ mobility pattern, a fusion scheme based on SUs’ reputation is proposed. …”
Get full text
Article -
17211
A Multistory Building Evacuation Model Based on Multiple-Factor Analysis
Published 2019-01-01“…Secondly, the cellular automata (CA) algorithm was applied to illustrate the effect of the bottleneck. …”
Get full text
Article -
17212
Raindrop Size Distribution Retrieval Using Joint Dual-Frequency and Dual-Polarization Microwave Links
Published 2019-01-01“…Then, the method is proposed to retrieve propagation path DSD parameters based on Levenberg–Marquardt optimization algorithm. The numerical simulation for path-averaged DSD retrieval shows that the RMSEs of three gamma DSD parameters are 0.34 mm−1, 0.81, and 3.21×103 m−3·mm−1, respectively, in rainfall intensity above 30 mm/h. …”
Get full text
Article -
17213
Passive indoor human daily behavior detection method based on channel state information
Published 2019-04-01“…The daily behavior detection of indoor human based on CSI is developing rapidly in the field of WSN.At present,most of the research is still in the environment of 2.4 GHz,so the detection rate,robustness and overall performance still need to be improved.In order to solve this problem,a passive indoor human behavior detection method HDFi (Human Detection with Wi-Fi) based on CSI signal was proposed.The method was used to detect the indoor human daily behavior in a 5 GHz band environment,which was divided into three steps:data acquisition,data processing,feature extraction,online detection.Firstly,the experiment collected typical daily behavioral data in complex laboratory and relatively empty meeting room.Secondly,the amplitude and phase data with more obvious features were extracted and processed by low-pass filtering to obtain a set of stable and noise-free data,and then the fingerprint database was established effectively.Finally,in the real-time detection stage,the collected data features were classified by SVM algorithm to extract more stable eigenvalues,and a classification model of indoor human daily behavior detection was established,and then matched the data in the fingerprint database.The experimental results show that the proposed method has the characteristics of high efficiency,high precision and good robustness,and the method does not need any testing personnel to carry any electronic equipment,so it has high practicability.…”
Get full text
Article -
17214
Stock Market Temporal Complex Networks Construction, Robustness Analysis, and Systematic Risk Identification: A Case of CSI 300 Index
Published 2020-01-01“…On this basis, temporal networks were constructed and the algorithm to test robustness was designed. In addition, quantitative indexes of robustness and evaluation standards of network robustness were introduced and the systematic risks of the stock market were analyzed. …”
Get full text
Article -
17215
Energy Efficient Cluster Based Scheduling Scheme for Wireless Sensor Networks
Published 2015-01-01“…In the second phase, scheduling algorithm is presented to allocate time slots to cluster member data packets. …”
Get full text
Article -
17216
A Novel Robust Fuzzy Rough Set Model for Feature Selection
Published 2021-01-01“…On this basis, the related properties of RS-FRS model are studied, and the sample pair selection algorithm (SPS) based on RS-FRS is used for feature selection. …”
Get full text
Article -
17217
Enhancing climate action evaluation using artificial neural networks: An analysis of SDG 13
Published 2025-06-01“…A key component of the research is the application of Garson's algorithm, which identifies the relative importance of each of the seven indexes in influencing climate outcomes. …”
Get full text
Article -
17218
Challenges of logistic processing of the transport package selected by suppliers for international carriage of construction goods by road
Published 2019-03-01“…The author suggests the algorithm of coordinated actions of suppliers, buyers, local carriers from countries of consignment and logistics operators, which could be applied for reducing of the quantity of the incidents during the logistics handling connected with packing.…”
Get full text
Article -
17219
Clinical Controversy Surrounding the Differential Diagnosis of Branchiogenic Carcinoma
Published 2022-01-01“…Histopathological findings suggested the diagnosis of lymph node infiltration by squamous cell carcinoma of an unknown primary site, but differential diagnosis also included branchiogenic carcinoma arising in a branchial cleft cyst. A diagnostic algorithm for metastatic squamous cell carcinoma of an unknown primary site was followed, including positron emission tomography with computed tomography. …”
Get full text
Article -
17220
Fuzzy Sliding Mode Control with Moving Sliding Surface of Rotary Inverted Pendulum
Published 2022-09-01“…The boundary values of the membership functions in the fuzzy logic structure have been optimized using genetic algorithm codes in Matlab program. The sum of the squares of the errors is preferred as the objective function. …”
Get full text
Article