-
6901
Research on Hyperspectral Inversion of Soil Organic Carbon in Agricultural Fields of the Southern Shaanxi Mountain Area
Published 2025-02-01“…The results indicate that (1) the Spectral Space Transformation (SST) algorithm effectively eliminates environmental interference on image spectra, enhancing SOC prediction accuracy; (2) continuous wavelet transform significantly reduces data noise compared to other spectral processing methods, further improving SOC prediction accuracy; and (3) among feature band selection methods, the CARS algorithm demonstrated the best performance, achieving the highest SOC prediction accuracy when combined with the random forest model. …”
Get full text
Article -
6902
Efficiency Design of Traction Inverters Based on Deep Learning and TRIZ
Published 2022-12-01“…In addition, this paper designs human-computer interaction software based on TRIZ-CRNN to improve the operation intelligence of computer aided innovation system and optimize the application feasibility of TRIZ-CRNN algorithm.…”
Get full text
Article -
6903
CPFD Simulation of Operation Characteristics of a 10t/d Sludge and Biomass Co-incineration Fluidized Bed Reactor
Published 2025-01-01“…ObjectiveThis research aims to comprehensively investigate the operational dynamics of a 10t/d sludge and biomass co-incineration fluidized bed reactor through Computational Particle Fluid Dynamics (CPFD) modeling, addressing critical gaps in industrial-scale waste valorization. …”
Get full text
Article -
6904
Fully automated multicolour structured illumination module for super-resolution microscopy with two excitation colours
Published 2025-03-01“…To optimize DMD diffraction, we developed a model for tilt and roll pixel configurations, enabling use with various low-cost projectors in SIM setups. …”
Get full text
Article -
6905
VR interactive input system based on INS and binocular vision fusion
Published 2024-12-01“…This study explores the application of inertial measurement units and binocular vision fusion technology in virtual reality interactive input systems, with the aim of improving the tracking accuracy of the system through optimized pose models and visual algorithms. …”
Get full text
Article -
6906
Machine learning based assessment of hoarseness severity: a multi-sensor approach centered on high-speed videoendoscopy
Published 2025-06-01“…Subjects were classified into two hoarseness groups based on auditory-perceptual ratings, with predicted scores serving as continuous hoarseness severity ratings. A videoendoscopic model was developed by selecting a suitable classification algorithm and a minimal-optimal subset of glottal parameters. …”
Get full text
Article -
6907
Mixed Gas Detection and Temperature Compensation Based on Photoacoustic Spectroscopy
Published 2024-01-01“…It determines the weight ratio of each algorithm through experiments to improve the accuracy of gas category discrimination. …”
Get full text
Article -
6908
A neighborhood search-based heuristic for the dynamic vehicle routing problem
Published 2025-05-01“…The DSNR achieved improvements of 15% to 17% in terms of distance and final delivery costs.…”
Get full text
Article -
6909
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
6910
Design of Low-Power, High-Precision, and Lightweight Image Recognition System for Multiple Scenes
Published 2025-01-01“…Aiming at the existing handwritten digit recognition systems with low recognition accuracy, high system power consumption, and high hardware resource consumption, this paper proposes a low-power, high-precision, and lightweight handwritten digit recognition hardware acceleration scheme for multiscenario based on FPGA. By optimizing the network structure of a convolutional neural network (CNN) and the number of parameters of the model, this scheme proposes a high-precision and lightweight network model, simplified CNN, and by optimizing the data access mode and memory usage, and by adopting the strategies of time-sharing and multiplexing, weights sharing, and parallel processing for the hardware acceleration of the algorithm, it effectively reduces the consumption of hardware resources and improves the performance of the system. …”
Get full text
Article -
6911
Research on Status Assessment and Operation and Maintenance of Electric Vehicle DC Charging Stations Based on XGboost
Published 2024-10-01“…The training sample data are established using historical data, online monitoring data, and external environmental data, and the charging station status evaluation model is trained using the XGBoost algorithm. Based on the condition assessment results, a risk assessment model is established in combination with fault parameters. …”
Get full text
Article -
6912
Overhead line path planning based on deep reinforcement learning and geographical information system
Published 2025-04-01“…Experimental verification of real data shows that compared with existing algorithms, the DSOP method is not only more consistent with the manual line selection effect (improved by more than 3%), but also has a high success rate. …”
Get full text
Article -
6913
A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication
Published 2025-05-01“…To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. …”
Get full text
Article -
6914
Fish Detection Using Deep Learning
Published 2020-01-01“…Because most of the embedded systems have been improved by fast growing computing and sensing technologies, which makes them possible to incorporate more and more complicated algorithms. …”
Get full text
Article -
6915
Artificial intelligence tools for engagement prediction in neuromotor disorder patients during rehabilitation
Published 2024-12-01“…Conclusion The study displayed the effectiveness of psychophysiology-based AI models in predicting rehabilitation engagement, thus promoting their practical application for personalized care and improved clinical health outcomes.…”
Get full text
Article -
6916
City-scale industrial tank detection using multi-source spatial data fusion
Published 2024-12-01“…To address this, high-resolution remote sensing images and deep learning algorithms are used to improve the accuracy of industrial storage tank detection at the city scale. …”
Get full text
Article -
6917
Boosting skin cancer diagnosis accuracy with ensemble approach
Published 2025-01-01“…Moreover, feature vectors that were optimally produced from image data by a Genetic Algorithm (GA) were given to the ML models. …”
Get full text
Article -
6918
Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy
Published 2025-01-01“…Unlike previous approaches, this system enables simultaneous charging and load powering and is specifically optimized for energy-harvesting WSN environments. Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
Get full text
Article -
6919
Travel Time Prediction of Urban Agglomeration Significance Channel: A Case Study on the Cross-Hangzhou Bay Channel
Published 2025-01-01“…The genetic algorithm enhances the segmentation of travel time across different road sections, ensuring refined input for the GA-LSTM model, which effectively captures spatiotemporal dependencies in travel patterns. …”
Get full text
Article -
6920
Space-time coding scheme for the paired weak user in MIMO-NOMA systems
Published 2018-06-01“…In view of the paired weak user’s poor outage performance in multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) systems,Alamouti code was adopted to encode for the weak user in order to improve its outage performance by means of diversity,and the closed-form expression of the strong user’s ergodic capacity as well as the boundary-form expressions of the weak user’s ergodic capacity and outage probability was derived in the proposed model.Moreover,a power allocation algorithm for optimizing the system’s throughput was proposed.Finally,the numerical results show the accuracy of the derived expressions,the efficacy of the proposed algorithm,and that the weak user’s outage performance in the proposed coding scheme is far superior to that in the current coding scheme only adopting vertical Bell lab layered space-time (V-BLAST) code.…”
Get full text
Article