-
601
Simulation-based review of classical, heuristic, and metaheuristic path planning algorithms
Published 2025-04-01“…This paper introduces and categorizes several notable path-planning algorithms used in robotics operations. We delve into their basic principles, key features, challenges, and real-world applications. …”
Get full text
Article -
602
Exploring Evolutionary Algorithms for Multi-Objective Optimization in Seismic Structural Design
Published 2024-10-01“…While genetic algorithms are used to improve both the cost and seismic performance of the structure, particle swarm optimization is used to optimize the vibration and displacement performance of structures. …”
Get full text
Article -
603
An Anomaly Detection Based on Data Fusion Algorithm in Wireless Sensor Networks
Published 2015-05-01“…Finally, relevant experiments on virtual and actual sensor databases show that our algorithm can achieve a high outlier detection rate while the false alarm rate is low. …”
Get full text
Article -
604
Hybrid Denoising Algorithm for Architectural Point Clouds Acquired with SLAM Systems
Published 2024-12-01“…This work presents the implementation of a denoising algorithm for point clouds acquired with LiDAR SLAM systems, aimed at optimizing data processing and the reconstruction of surveyed object geometries for graphical rendering and modeling. …”
Get full text
Article -
605
A Group Search Algorithm for Optimal Scheduling of Cascade Hydropower Stations
Published 2025-06-01“…These improvements balanced global search and local search, preventing premature convergence while accelerating the convergence speed. Simulation results for four cascade hydropower plants in a region in southwest China show that the difference between the results of CHIO and LCHIO and the dynamic programming POA-DDDP is less than 1%, and the variation coefficients are 0.13% and 0.11%, which verify the rationality and effectiveness of CHIO to solve the cascade reservoir group scheduling problem and the improvement effect of LCHIO algorithm on CHIO. …”
Get full text
Article -
606
Proxy caching algorithm based on segment popularity for mobile streaming media
Published 2007-01-01“…A novel dynamic scheduling algorithm P2CAS2M2(proxy caching algorithm based on segment popularity for mobile streaming media)based on segment popularity for mobile streaming media was proposed.Proxy caching admis-sion and replacement algorithm based on the object segment popularity for mobile streaming media was implemented.The principle was obeyed that the data cached for each mobile streaming media object were in proportion to their popu-larity at the proxy server.The cache window size was updated periodically according to the average access time of the clients.Simulation results show that this algorithm is more adaptive than A2LS(adaptive and lazy segmentation algorithm) for the variety of the proxy server cache.It can gain more average number of cached mobile streaming media objects and less delayed requested ratio while byte-hit ratio of P2CAS2M2 is close to or exceeds A2LS under the circumstance of the same proxy cache space.…”
Get full text
Article -
607
Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing
Published 2025-08-01Get full text
Article -
608
Comparative Study for Classification Algorithms Performance in Crop Yields Prediction Systems
Published 2021-05-01“…The comparison involves measuring the error values and accuracy. The SVM algorithm achieved the highest accuracy value with 76.82%. while the lowest is achieved by the KNN algorithm with 35.76%. …”
Get full text
Article -
609
Machine Learning in Evolving Art Styles: A Study of Algorithmic Creativity
Published 2025-04-01“…Machine learning (ML) has played an increasingly pivotal role in shaping and evolving artistic expression, leading to new forms of algorithmic creativity. In this study, we explore how ML models, particularly deep learning algorithms such as generative adversarial networks (GANs), have contributed to evolving art styles by learning from vast datasets of historical and contemporary artworks. …”
Get full text
Article -
610
Intelligent anti-jamming decision algorithm based on proximal policy optimization
Published 2024-08-01“…The simulation results demonstrate that the convergence speed of the proposed algorithm is increased by 37%, and the system capacity after convergence is increased by 25%, compared with the decision algorithms of policy gradient and deep Q-learning.…”
Get full text
Article -
611
YOLO-WWBi: An Optimized YOLO11 Algorithm for PCB Defect Detection
Published 2025-01-01Get full text
Article -
612
Identification for Active Vibration Control of Flexible Structure Based on Prony Algorithm
Published 2016-01-01“…The modal parameters and transfer function of the system are identified from the step response signal based on Prony algorithm, while the vibration is attenuated by using the input shaping technique designed according to the parameters identified from the Prony algorithm. …”
Get full text
Article -
613
Optimizing DVA placement using evolutionary algorithms for dynamic beam loading
Published 2025-05-01“…The loading is modeled using a filtered Poisson process, while the DVAs are modeled as single-degree-of-freedom (SDOF) systems. …”
Get full text
Article -
614
Overlapping Box Suppression and Merging Algorithms for Window-Based Object Detection
Published 2025-09-01“…In this manuscript, we extend the Overlapping Box Suppression (OBS) algorithm, a novel approach designed to enhance window-based object detection systems by reducing false-positive detections. …”
Get full text
Article -
615
Implementation of Haar Cascade and Adaboost Algorithms in Photo Classification on Social Networks
Published 2023-06-01“…Results: Two of her classification algorithms, Haar Cascade and Adaboost, were used in this study. …”
Get full text
Article -
616
Mine underground object detection algorithm based on TTFNet and anchor-free
Published 2024-11-01“…The results show that compared with the original algorithm, our proposed algorithm can still maintain similar accuracy while significantly reducing model parameters; compared with other anchor-based detection algorithms, it has achieved similar overall performance.…”
Get full text
Article -
617
Comparative Analysis of Supervised Machine Learning Algorithms for COVID-19 Prediction
Published 2024-04-01“…The human interface was faced with the dilemma of infection causing the health workers fall prey to the disease while identifying the presence of the disease among the patients. …”
Get full text
Article -
618
Blockchain data access control scheme based on CP-ABE algorithm
Published 2020-06-01“…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
Get full text
Article -
619
English Pronunciation Evaluation and Correction Algorithm Technology Based on Artificial Intelligence
Published 2025-05-01Get full text
Article -
620
Vessel Trajectory Data Compression Algorithm considering Critical Region Identification
Published 2023-01-01“…Experiments conducted on individual and multiple trajectories demonstrate that the VATDC_CCRI algorithm achieves higher compression rates and exhibits faster processing speeds compared to other classical vessel trajectory compression algorithms while preserving the shape of the vessel’s trajectory significantly.…”
Get full text
Article