-
4821
True 4D Image Denoising on the GPU
Published 2011-01-01“…One common application is to improve the image quality of low-dose (noisy) computed tomography (CT) data. While 3D image denoising previously has been applied to several volumes independently, there has not been much work done on true 4D image denoising, where the algorithm considers several volumes at the same time. …”
Get full text
Article -
4822
Active and Passive Integrated Lightning Localization and Imaging Technology Based on Very-High-Frequency Radar
Published 2025-05-01“…Experimental results show that the integrated positioning algorithm maintains accuracy while significantly increasing the number of positioning points, which supports subsequent imaging of lightning plasma channels. …”
Get full text
Article -
4823
Safety Decision-Making for Autonomous Vehicles Integrating Passenger Physiological States by fNIRS
Published 2025-01-01“…This algorithm is developed based on twin-delayed deep deterministic policy gradient (TD3), and it can overcome the functional insufficiencies of traditional TD3 and guide TD3 using passengers’ risk assessment by analyzing passenger physiological states online while confronting risky scenarios. …”
Get full text
Article -
4824
A COMPARISON OF RANDOM FOREST AND DOUBLE RANDOM FOREST: DROPOUT RATES OF MADRASAH STUDENTS IN INDONESIA
Published 2025-01-01“…From this study, the underfitting case can be overcome well using the double random forest algorithm, while in the fit case, the difference in the goodness-of-fit value of the model is relatively the same. …”
Get full text
Article -
4825
Track initialisation for multiple formations based on neutrosophic Hough transform
Published 2024-12-01“…To solve this problem, the authors propose a track initialisation algorithm. It uses characteristics of formation flight to find centroids of each formation with DBSCAN algorithm. …”
Get full text
Article -
4826
Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy
Published 2010-01-01“…The Hidden Anchor algorithm exploits the inherently noisy wireless channel and uses identity cloning of neighboring trusted nodes to make anchors unobservable to un-trusted nodes while providing complete information to trusted nodes. …”
Get full text
Article -
4827
Efficient AOA Estimation and NLOS Signal Utilization for LEO Constellation-Based Positioning Using Satellite Ephemeris Information
Published 2025-01-01“…The results show that the azimuth determination algorithm reduces computational complexity without sacrificing accuracy, while the NLOS virtual satellite construction method significantly enhances positioning accuracy in NLOS environments. …”
Get full text
Article -
4828
Environmental and Economic Dispatching of Fire-Wind Combined System Based on Improved MOPSO
Published 2025-01-01“…Then, an improved multi-objective particle swarm optimization algorithm, LRMOPSO, is proposed by combining multi-objective particle swarm optimization algorithm, Levy flight jamming strategy and reverse learning strategy. …”
Get full text
Article -
4829
Scalable Precision Psychiatry With an Objective Measure of Psychological Stress: Prospective Real-World Study
Published 2025-07-01“…As a final insight, self-selected therapy sessions were overrepresented among the algorithmically recommended sessions, an effect most pronounced when the algorithm was trained with ∆OSL data (F1,14=30.94, P<.001). …”
Get full text
Article -
4830
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs
Published 2025-04-01“…The simulation results show that the proposed algorithms have higher generality and flexibility while effectively improving computational efficiency and reducing actual cleaning costs compared with other schemes.…”
Get full text
Article -
4831
Securing Electrical Drive Systems Against Man-in-the-Middle Attacks Using S-Box Optimized AES Encryption
Published 2025-01-01“…The optimization performance is evaluated using nonlinearity, avalanche effect, and bit independence metrics, while the AES algorithm’s performance is analyzed in terms of encryption throughput and latency. …”
Get full text
Article -
4832
Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques
Published 2025-03-01“…To solve this problem, various authors proposed different algorithms like the randomized algorithm, heuristic algorithm, meta heuristic algorithm, machine learning algorithm, and graph-based algorithm for finding the optimal placement. …”
Get full text
Article -
4833
Structural knowledge-driven meta-learning for task offloading in vehicular networks with integrated communications, sensing and computing
Published 2024-07-01“…By optimizing the computation mode and network resources, in this paper, we investigate an I-CSC-based task offloading problem to reduce the cost caused by resource consumption while guaranteeing the latency of each task. Although this non-convex problem can be handled by the alternating minimization (AM) algorithm that alternatively minimizes the divided four sub-problems, it leads to high computational complexity and local optimal solution. …”
Get full text
Article -
4834
Underground personnel detection and tracking using improved YOLOv7 and DeepSORT
Published 2024-12-01“…Compared with YOLOv7-DeepSORT algorithm, the number of network parameters of the improved algorithm is reduced by 36%, significantly improving the real-time performance of underground multi personnel target detection and tracking, and is expected to be deployed in the underground intelligent edge computing monitoring platform.…”
Get full text
Article -
4835
Identification of green leafhoppers (cicadellidae) in vineyards through an automatic image acquisition system from yellow sticky traps associated with deep-learning
Published 2025-01-01“…The results demonstrated the algorithm’s capability to accurately identify green leafhopper species, improving the speed of identification compared to conventional methods while maintaining a high level of precision (80%), and a harmonic mean of the precision and recall (F1) of 0.85. …”
Get full text
Article -
4836
Anderson impurity solver integrating tensor network methods with quantum computing
Published 2025-03-01“…The tensor network based ground state quantum circuit preparation algorithm can also be performed for up to 60 qubits with our available computing resources, while the state vector emulation of the quantum algorithm for time evolution is beyond what is accessible with such resources. …”
Get full text
Article -
4837
Strobing of Radar Marks for Trajectory Filtration in a Body-Fixed Frame
Published 2019-12-01“…Modern air targets, particularly drones, are becoming less noticeable, while their manoeuvrability continues to improve. …”
Get full text
Article -
4838
Multi-UAV assisted air-to-ground data collection for ground sensors with unknown positions
Published 2025-06-01“…Simulation results reveal that, compared to the existing algorithms, the proposed approach adeptly tackles the data collection challenge when sensor positions remain unknown while significantly enhancing task execution efficiency across diverse environmental conditions. …”
Get full text
Article -
4839
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy
Published 2025-08-01“…This algorithm uses Kepler Chaotic Optimisation Algorithm (CKOA) to select the most suitable chaotic maps, guaranteeing optimal diffusion and complex pixel confusion. …”
Get full text
Article -
4840
Optimizing energy and load management in island microgrids for enhancing resilience against resource interruptions
Published 2025-05-01“…To effectively solve this high-dimensional, nonlinear problem, we employ the Multi-objective Moth Flame Algorithm (MOMFA), an enhanced metaheuristic evolutionary algorithm designed to handle complex trade-offs between cost, reliability, and resilience. …”
Get full text
Article