-
6521
Evolutionary game-based cooperative strategy for effective capacity of multiple-input-multiple-output communications
Published 2017-10-01“…Numerical results show that the proposed algorithm can effectively improve the quality of service for mobile two-dimensional multiple-input-multiple-output communication networks.…”
Get full text
Article -
6522
Module Partition of Mechatronic Products Based on Core Part Hierarchical Clustering and Non-Core Part Association Analysis
Published 2025-02-01“…Then, based on the core parts, the corresponding product design structural matrix (DSM) model is established. Secondly, the hierarchical clustering algorithm is used to obtain the module division scheme of different levels of mechatronic products, and the optimal modular scheme is obtained through an evaluation of modularity and a rationality analysis of module structure. …”
Get full text
Article -
6523
City-scale industrial tank detection using multi-source spatial data fusion
Published 2024-12-01“…To address this, high-resolution remote sensing images and deep learning algorithms are used to improve the accuracy of industrial storage tank detection at the city scale. …”
Get full text
Article -
6524
Preliminary analysis of wave retrieval from Chinese Gaofen-3 SAR imagery in the Arctic Ocean
Published 2022-12-01“…Although the analysis concludes that GF-3 SAR has the capability for wave monitoring in Arctic Ocean due to the high spatial resolution of SAR-derived wave spectra, an optimal wave retrieval algorithm needs to be developed for improving the retrieval accuracy.…”
Get full text
Article -
6525
Analysis of injured-skin SS-OCT images based on combined attention UNet.
Published 2025-01-01“…To enhance image clarity, we applied noise reduction using the BM3D algorithm. We employed an improved UNet network model that incorporates SimAM and PSA modules, forming three attention mechanisms: TandemAT-UNet, ParallelAT-UNet, and NestedAT-UNet. …”
Get full text
Article -
6526
Deep coal fluidization mining ropeless hoisting system and its cooperative driving control strategy
Published 2025-06-01“…The research results show that the fuzzy PI loop coupling control algorithm can optimize the motor response characteristics and improve the following and synchronization performance among multiple motors. …”
Get full text
Article -
6527
Deep learning methods for clinical workflow phase-based prediction of procedure duration: a benchmark study
Published 2025-12-01“…Future research should validate these findings across different procedural contexts and explore ways to optimize training times without losing accuracy. Integrating these models into clinical scheduling systems could improve efficiency in cath labs. …”
Get full text
Article -
6528
GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection
Published 2025-06-01“…According to the characteristics of space missions, an annotated dataset containing 8000 satellite and space station images is constructed, covering a variety of lighting, attitude and scale scenes, and providing benchmark support for model training and verification. Experimental results on the space object dataset reveal that the enhanced algorithm achieves a mean average precision (mAP) of 97.2%, representing a 2.1% improvement over the original YOLOv8_L. …”
Get full text
Article -
6529
Fish Detection Using Deep Learning
Published 2020-01-01“…Authors of this article have learned the necessity of platform upgrade from a previous AUV design project, and would like to share the experience of one task extension in the area of fish detection. Because most of the embedded systems have been improved by fast growing computing and sensing technologies, which makes them possible to incorporate more and more complicated algorithms. …”
Get full text
Article -
6530
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
6531
Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding
Published 2014-01-01“…The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. …”
Get full text
Article -
6532
Integrating Tiny Machine Learning and Edge Computing for Real-Time Object Recognition in Industrial Robotic Arms
Published 2025-05-01“…By utilizing the Edge Impulse platform for data collection, model training, and optimization, edge devices and models for use in resource-limited environments were successfully generated. …”
Get full text
Article -
6533
Tire-road friction estimation and traction control strategy for motorized electric vehicle.
Published 2017-01-01“…Thirdly, an ideal vehicle simulation model is proposed to verify the algorithm with simulation, and we find that the slip ratio corresponds to the detection of the adhesion limit in real time. …”
Get full text
Article -
6534
To accurately predict lymph node metastasis in patients with mass-forming intrahepatic cholangiocarcinoma by using CT radiomics features of tumor habitat subregions
Published 2025-02-01“…This model is expected to provide personalized decision support to clinicians and help to optimize treatment plans and improve patient outcomes.…”
Get full text
Article -
6535
Sparse Convolution FPGA Accelerator Based on Multi-Bank Hash Selection
Published 2024-12-01“…However, many computing devices that claim high computational power still struggle to execute neural network algorithms with optimal efficiency, low latency, and minimal power consumption. …”
Get full text
Article -
6536
Damage prediction of rear plate in Whipple shields based on machine learning method
Published 2025-08-01“…This study establishes an expandable new dataset that accommodates additional parameters to improve the prediction accuracy. Results demonstrate the model's ability to overcome data imbalance limitations through debris cloud features, enabling rapid and accurate rear plate damage prediction across wider scenarios with minimal data requirements.…”
Get full text
Article -
6537
Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran)
Published 2019-06-01“…Timing framework associated with catastrophes is one of the most important issues in crisis management. In such cases, being immediate has a considerable importance and web based real-time routing service as an important tool has a significant role in relief operations improvement. …”
Get full text
Article -
6538
The Inversion of SPAD Value in Pear Tree Leaves by Integrating Unmanned Aerial Vehicle Spectral Information and Textural Features
Published 2025-01-01“…Finally, four machine learning methods, namely XGBoost, random forest (RF), back-propagation neural network (BPNN), and optimized integration algorithm (OIA), were used to construct inversion models of the SPAD value of pear trees, with different feature inputs based on vegetation indices, textural features, and their combinations, respectively. …”
Get full text
Article -
6539
Enhancing high pressure pulsation test bench performance: a machine learning approach to failure condition tracking
Published 2025-05-01“…Decision tree (DT), gradient boosting tree (GBT), Naïve Bayes (NB), and random forest (RF) algorithms are used to determine the best model. The comparative analysis of ML algorithms revealed that the GBT algorithm exhibits superior predictive capabilities regarding HPPT bench failure predictions. …”
Get full text
Article -
6540
Machine learning enables legal risk assessment in internet healthcare using HIPAA data
Published 2025-08-01“…DNN demonstrates strong capabilities in handling complex nonlinear relationships, and XGBoost further improves classification accuracy by optimizing decision tree models through gradient boosting. …”
Get full text
Article