-
6641
A longan-picking sequence planning method for UAV system based on multi-target tracking
Published 2025-12-01“…First, a specialized lightweight target detection algorithm, YOLOv8s-Longan, is developed to achieve high-precision target localization and facilitate lightweight model deployment. …”
Get full text
Article -
6642
Overhead line path planning based on deep reinforcement learning and geographical information system
Published 2025-04-01“…Experimental verification of real data shows that compared with existing algorithms, the DSOP method is not only more consistent with the manual line selection effect (improved by more than 3%), but also has a high success rate. …”
Get full text
Article -
6643
An Adaptive Weight Physics-Informed Neural Network for Vortex-Induced Vibration Problems
Published 2025-05-01“…In this study, a VIV dataset of a cylindrical body with different degrees of freedom is used to compare the performance of the PINN and three PINN optimization algorithms. The findings suggest that, compared to a standard PINN, the AW-PINN lowers the mean squared error (MSE) on the test set by 50%, significantly improving the prediction accuracy. …”
Get full text
Article -
6644
Intelligent Data Reduction for IoT: A Context-Driven Framework
Published 2025-01-01“…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
Get full text
Article -
6645
Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems
Published 2020-01-01“…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
Get full text
Article -
6646
DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions
Published 2025-01-01“…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
Get full text
Article -
6647
Intelligent resource allocation in internet of things using random forest and clustering techniques
Published 2025-08-01“…A Random Forest model is then trained to accurately predict the resource needs of each cluster, enabling optimal allocation. …”
Get full text
Article -
6648
High precision water quality retrieval in Dianchi Lake using Gaofen 5 data and machine learning methods
Published 2025-02-01“…The Back Propagation Nondominated Sorting Genetic Algorithm-II (BP-NGA) model consistently yielded positive results for most WQI. (2) Water quality in Dianchi varied significantly by region and season. (3) It was recommended to build wetlands and ecological parks on the southwest side of Dianchi and improve sewage interception pipelines on the northeast side to lessen the risk of eutrophication by reducing the inflow of nitrogen and phosphorus.…”
Get full text
Article -
6649
Performance and emission analysis of CI engine fueled with Dunaliella salina biodiesel and TiO₂ nanoparticle additives: Experimental and ANN-based Predictive Approach
Published 2025-09-01“…An Artificial Neural Network (ANN) model was developed using the Levenberg-Marquardt algorithm, incorporating 27 datasets generated through a Response Surface Methodology (RSM)-based d-optimal design to predict engine performance and emission characteristics. …”
Get full text
Article -
6650
City-scale industrial tank detection using multi-source spatial data fusion
Published 2024-12-01“…To address this, high-resolution remote sensing images and deep learning algorithms are used to improve the accuracy of industrial storage tank detection at the city scale. …”
Get full text
Article -
6651
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
6652
Enhanced engine misfire diagnosis through integration of vibration and acoustic emission signals using artificial neural networks
Published 2025-08-01“…After all the features were put into a complete matrix, the selection algorithms chose the most essential ones for classifying the data. …”
Get full text
Article -
6653
Space-time coding scheme for the paired weak user in MIMO-NOMA systems
Published 2018-06-01“…In view of the paired weak user’s poor outage performance in multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) systems,Alamouti code was adopted to encode for the weak user in order to improve its outage performance by means of diversity,and the closed-form expression of the strong user’s ergodic capacity as well as the boundary-form expressions of the weak user’s ergodic capacity and outage probability was derived in the proposed model.Moreover,a power allocation algorithm for optimizing the system’s throughput was proposed.Finally,the numerical results show the accuracy of the derived expressions,the efficacy of the proposed algorithm,and that the weak user’s outage performance in the proposed coding scheme is far superior to that in the current coding scheme only adopting vertical Bell lab layered space-time (V-BLAST) code.…”
Get full text
Article -
6654
Dynamic-budget superpixel active learning for semantic segmentation
Published 2025-01-01“…A static budget could result in over- or under-labeling images as the number of high-impact regions in each image can vary.MethodsIn this paper, we present a novel dynamic-budget superpixel querying strategy that can query the optimal numbers of high-uncertainty superpixels in an image to improve the querying efficiency of regional active learning algorithms designed for semantic segmentation.ResultsFor two distinct datasets, we show that by allowing a dynamic budget for each image, the active learning algorithm is more effective compared to static-budget querying at the same low total labeling budget. …”
Get full text
Article -
6655
Heuristic thermal sensor allocation methods for overheating detection of real microprocessors
Published 2017-11-01“…On this basis, a heuristic method based on genetic algorithm is proposed to find a near‐optimal thermal sensor allocation solution, which can make overheating detection probability significantly improved with a greatly reduced execution time. …”
Get full text
Article -
6656
Monitoring of Transformer Hotspot Temperature Using Support Vector Regression Combined with Wireless Mesh Networks
Published 2024-12-01“…Subsequently, this study employed a Support Vector Regression (SVR) algorithm to train the sample dataset, optimizing the SVR model using a grid search and cross-validation to enhance the predictive accuracy. …”
Get full text
Article -
6657
Combining Software-Defined and Delay-Tolerant Networking Concepts With Deep Reinforcement Learning Technology to Enhance Vehicular Networks
Published 2024-01-01“…The study assesses the performance of the multi-protocol approach using metrics: TTL, buffer management,link quality, delivery ratio, Latency and overhead scores for optimal network performance. Comparative analysis with single-protocol VANETs (simulated using the Opportunistic Network Environment (ONE)), demonstrate an improved performance of the proposed algorithm in all VANET scenarios.…”
Get full text
Article -
6658
RRBM-YOLO: Research on Efficient and Lightweight Convolutional Neural Networks for Underground Coal Gangue Identification
Published 2024-10-01“…The lightweight module RepGhost, the repeated weighted bi-directional feature extraction module BiFPN, and the multi-dimensional attention mechanism MCA were integrated, and different datasets were replaced to enhance the adaptability of the model and improve its generalization ability. The findings from the experiment indicate that the precision of the proposed model is as high as 0.988, the mAP@0.5(%) value and mAP@0.5:0.95(%) values increased by 10.49% and 36.62% compared to the original YOLOv8 model, and the inference speed reached 8.1GFLOPS. …”
Get full text
Article -
6659
Comparative Analysis of Machine Learning Techniques for Fault Diagnosis of Rolling Element Bearing with Wear Defects
Published 2025-03-01“…This optimization of the signal enhancement methodology significantly improved the fault diagnosis accuracy. …”
Get full text
Article -
6660
Predicting weather-related power outages in large scale distribution grids with deep learning ensembles
Published 2025-09-01“…This approach not only enhances prediction accuracy compared to individual learners but also improves the generalization ability and robustness of standalone DL models. …”
Get full text
Article