-
2581
Sparse support path generation for multi-axis curved layer fused filament fabrication
Published 2025-08-01“…Firstly, the overhang regions are detected by identifying the overhang points given a multi-axis nozzle path. Then, an optimization framework for the support guide curve is proposed to minimize its total length while ensuring that overhang filaments can be stably supported. …”
Get full text
Article -
2582
A trade-off between line hardening and dynamic line rating by a new convex optimization model for resilient micro-grid-oriented expansion planning of reconfigurable smart distribut...
Published 2025-07-01“…The simulation results demonstrate the efficacy of the conducted model. According to the optimal Pareto algorithm solution, the resiliency index is guaranteed to be more than 92% in the face of LPHI disasters. …”
Get full text
Article -
2583
Evolutionary search algorithm for learning activation function of an artificial neural network
Published 2025-01-01“…The proposed method aims to enhance the efficiency of the search process for optimal activation functions. Our algorithm employs genetic programming to evolve the general form of activation functions, while gradient descent optimizes their parameters during network training. …”
Get full text
Article -
2584
Use of schedule theory algorithms for task planning and time management tasks
Published 2024-10-01“…At the moment, there are many algorithms for solving such tasks, but the algorithms must be customized to specific conditions, while ensuring the quality of the task and performance. …”
Get full text
Article -
2585
Co‐Creation in Automated Public Space Lighting Design: Enhancing Safety and Reducing Light Pollution
Published 2025-05-01“…The article presents an algorithm that iteratively determines the optimal number and placement of lamps based on expected lighting levels. …”
Get full text
Article -
2586
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
2587
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
2588
Packet-loss robust scalable authentication algorithm for compressed image streaming
Published 2014-04-01“…To construct the authentication algorithm by hash chaining and error-correction coding, the proposed approach can realize optimizing bit-rate allocations and unequal authentication protection. …”
Get full text
Article -
2589
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. …”
Get full text
Article -
2590
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
2591
Novel virtual topology configuration algorithm for IP over WDM network
Published 2007-01-01“…The load balancing for the whole network was chosen as the optimal objective and a novel virtual topology configuration algorithm was proposed.In the proposed algorithm,the load distribution variance was chosen as a key criterion for judging the load balancing.And the definition and the computing method of the load distribution variance were introduced.In addition,the blocking probability was chosen as the main performance parameter for comparing with other algorithms.In the optical layer,the algorithm proposed was compared with the routing with load balancing heuristics(RLBH) algorithm.Similarly,in IP layer,the algorithm was compared with the fixed-path least-congestion(FPLC) algorithm.Moreover,the numerical results of the algorithm comparison were shown and discussed.The simulation results show that the performance of the algorithm is better than RLBH algorithm and FPLC algorithm on the blocking probability.…”
Get full text
Article -
2592
Qualitative Simulation Algorithm for Resource Scheduling in Enterprise Management Cloud Mode
Published 2021-01-01“…Aiming at the problem of resource scheduling optimization in enterprise management cloud mode, a customizable fuzzy clustering cloud resource scheduling algorithm based on trust sensitivity is proposed. …”
Get full text
Article -
2593
Fault Detection of Aircraft Control System Based on Negative Selection Algorithm
Published 2020-01-01“…Afterward, the hypothesis test is introduced to evaluate the detector coverage more efficiently, and the detector cover area is optimized by applying geometric mathematics in the optimization of the detector center position and radius. …”
Get full text
Article -
2594
Solving synchromodal container transportation problem using a genetic algorithm
Published 2025-12-01“…This paper proposes a Genetic Algorithm(GA) to solve the synchromodal transportation problem. …”
Get full text
Article -
2595
Model for virtual corporations partner selection based on adaptive genetic algorithm
Published 2009-01-01“…To enhance the efficiency of corporation partner selection and optimization process in virtual corporations, an partner selection process and optimizations model for virtual corporations based on adaptive genetic algorithm were pre-sented. …”
Get full text
Article -
2596
A Review on Automated Detection and Identification Algorithms for Highway Pavement Distress
Published 2025-05-01Get full text
Article -
2597
Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay
Published 2021-08-01“…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
Get full text
Article -
2598
Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset
Published 2012-12-01“…<span>Many real world problems involve the simultaneous optimization of various and often conflicting objectives. …”
Get full text
Article -
2599
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Published 2023-12-01“…In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing genetic algorithms (GAs). GAs have proven effective in solving optimization problems by mimicking the principles of natural selection and genetics. …”
Get full text
Article -
2600
Quantum Circuit Synthesis Using Fuzzy-Logic-Assisted Genetic Algorithms
Published 2025-03-01“…Therefore, interest has grown towards heuristics-based synthesis techniques, which are able to produce approximations of the desired algorithm, while optimizing depth and gate-count. In this work, we investigate using genetic algorithms (GA)—a proven gradient-free optimization technique based on natural selection—for circuit synthesis. …”
Get full text
Article