-
1421
Use of schedule theory algorithms for task planning and time management tasks
Published 2024-10-01“…At the moment, there are many algorithms for solving such tasks, but the algorithms must be customized to specific conditions, while ensuring the quality of the task and performance. …”
Get full text
Article -
1422
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1423
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1424
DATA DRIVEN RULE-BASED PEAK SHAVING ALGORITHM FOR SCHEDULING REFRIGERATORS
Published 2024-12-01“…This approach aims to minimize energy consumption while maintaining thermal comfort. The algorithm’s performance was evaluated using real-world data from the Spanish Transmission Service Operators (TSO). …”
Get full text
Article -
1425
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. …”
Get full text
Article -
1426
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
1427
3D animation design image detail enhancement based on intelligent fuzzy algorithm
Published 2025-01-01“…The image was divided into superpixel regions using SLIC (Simple Linear Iterative Clustering) algorithm, and local features such as texture, contrast, and edge intensity were extracted; in the SRGAN model, the generator improved image resolution through deep residual blocks and Convolutional Neural Network (CNN), while the discriminator optimized the generated image quality through adversarial training; at the same time, a Fuzzy Logic System (FLS) was constructed to dynamically adjust the image fuzzy degree; channel and spatial attention modules in the generator were integrated to enhance key area details. …”
Get full text
Article -
1428
Nonlinear Narrowband Active Noise Control for Tractors Based on a Momentum-Enhanced Volterra Filter
Published 2025-08-01“…The proposed approach integrates the nonlinear representation power of the Volterra filter with a momentum optimization mechanism to enhance convergence speed while maintaining robust steady-state accuracy. …”
Get full text
Article -
1429
-
1430
Study on Trajectory Planning for Polishing Free-Form Surfaces of XY-3-RPS Hybrid Robot
Published 2025-05-01“…Additionally, a hybrid optimization framework combining a genetic algorithm (GA) and local search (LS) is proposed to address the challenges of balancing global optimization with local fine-tuning in traditional trajectory planning methods. …”
Get full text
Article -
1431
Two-Stage Uncertain UAV Combat Mission Assignment Problem Based on Uncertainty Theory
Published 2025-06-01“…The proposed modified PSO exhibits superior performance compared with the ant colony optimization algorithm, enabling the acquisition of an optimal allocation scheme with greater benefits. …”
Get full text
Article -
1432
Minimization of total costs for distribution systems with battery energy storage systems and renewable energy sources
Published 2025-05-01“…Besides, this work also suggests an open-source simulator (OpenDSS) for addressing the power flow problem and develops a co-simulation between two active software (OpenDSS and MATLAB) through the component object model (COM) interface for addressing the continuous optimization problems. The proposed solution by MCOA has demonstrated superiority over other methods through total cost savings of up to 24.13% and 27.46% in IEEE 123-bus UDS and 55-bus BDS, while the values are only 23.11% and 26.50% for salp swarm algorithm (SSA) and 23.76% and 26.78% for coyote optimization algorithm (COA), respectively, as compared to the original cases. …”
Get full text
Article -
1433
Revolutionizing RPAS logistics and reducing CO2 emissions with advanced RPAS technology for delivery systems
Published 2024-09-01“…These integrations significantly decrease battery consumption in Remotely Piloted Aircraft Systems (RPAS) and lower transportation costs, while also optimizing delivery times, reducing operational risks, and minimizing CO2 emissions. …”
Get full text
Article -
1434
Optimization of spline parameters in approximation of multivalued functions
Published 2023-04-01“…The spline parameters were optimized using a new mathematical model in the form of a modified Lagrange function and a special nonlinear programming algorithm. …”
Get full text
Article -
1435
Solving synchromodal container transportation problem using a genetic algorithm
Published 2025-12-01“…This paper proposes a Genetic Algorithm(GA) to solve the synchromodal transportation problem. …”
Get full text
Article -
1436
A Review on Automated Detection and Identification Algorithms for Highway Pavement Distress
Published 2025-05-01Get full text
Article -
1437
Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset
Published 2012-12-01“…<span>Many real world problems involve the simultaneous optimization of various and often conflicting objectives. …”
Get full text
Article -
1438
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Published 2023-12-01“…In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing genetic algorithms (GAs). GAs have proven effective in solving optimization problems by mimicking the principles of natural selection and genetics. …”
Get full text
Article -
1439
Model for virtual corporations partner selection based on adaptive genetic algorithm
Published 2009-01-01“…To enhance the efficiency of corporation partner selection and optimization process in virtual corporations, an partner selection process and optimizations model for virtual corporations based on adaptive genetic algorithm were pre-sented. …”
Get full text
Article -
1440
Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay
Published 2021-08-01“…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
Get full text
Article