-
181
Micro-classification of orchards and agricultural croplands by applying object based image analysis and fuzzy algorithms for estimating the area under cultivation
Published 2018-03-01“…We also applied textures, geometric, NDVI, GLCM, brightness algorithms based on fuzzy operators and assign class algorithm. …”
Get full text
Article -
182
-
183
A method for determining the topology of swarm elements relative to the leader and an algorithm for constructing a spatial matrix of unmanned aerial vehicles placement
Published 2025-05-01“…In writing the article, a systematic analysis of the processes controlling unmanned systems and the synthesis of methods and algorithms for their functioning were employed. …”
Get full text
Article -
184
RAPO: An Automated Performance Optimization Tool for Redis Clusters in Distributed Storage Metadata Management
Published 2025-01-01“…By optimizing with the greedy and random iterative search algorithms, the cluster’s LBI was reduced by an average of 29.36% and 25.20% respectively during random read operations and by 24.98% and 24.03% respectively during imbalanced write operations. …”
Get full text
Article -
185
-
186
DEFINITION OF TYPOS IN ANSWER OF STUDENT IN KNOWN CORRECT ANSWER
Published 2016-05-01Get full text
Article -
187
Learning the Style via Mixed SN-Grams: An Evaluation in Authorship Attribution
Published 2025-05-01“…The study’s results suggest that mixed sn-grams constitute effective stylistic markers for building a reliable writing style model, which machine learning algorithms can learn.…”
Get full text
Article -
188
Detection of Sleep Posture via Humidity Fluctuation Analysis in a Sensor-Embedded Pillow
Published 2025-04-01“…To identify these transitions, we applied the Pruned Exact Linear Time (PELT) algorithm, which effectively segmented the time series based on abrupt changes in humidity. …”
Get full text
Article -
189
Entropy-Assisted Quality Pattern Identification in Finance
Published 2025-04-01“…Short-term patterns in financial time series form the cornerstone of many algorithmic trading strategies, yet extracting these patterns reliably from noisy market data remains a formidable challenge. …”
Get full text
Article -
190
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
191
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
192
Artificial Intelligence (AI) and the University. How AI Will Change Our Approach to Education
Published 2025-06-01“…Observers of technological changes may rightly ask whether AI development and its takeover of various human competences will not inevitably disavow all work based on reading, acquiring knowledge, inferring, discovering, writing and producing scientific or literary works? …”
Get full text
Article -
193
Improved RRT-Based Obstacle-Avoidance Path Planning for Dual-Arm Robots in Complex Environments
Published 2025-07-01Get full text
Article -
194
Adaptive Step RRT*-Based Method for Path Planning of Tea-Picking Robotic Arm
Published 2024-12-01“…The Adaptive Step RRT* (AS-RRT*) path planning algorithm for tea-picking robotic arms was proposed as a solution to the autonomy, safety, and efficiency problems inherent to tea-picking robots in tea plantations. …”
Get full text
Article -
195
An improved lightweight tiny-person detection network based on YOLOv8: IYFVMNet
Published 2025-04-01“…This operation also reduces the computational cost by decreasing the amount of required feature map channels, while maintaining the effectiveness of the feature representation. (3) he Minimum Point Distance Intersection over Union loss function is employed to optimize bounding box detection during model training. (4) to construct the overall network structure, the Layer-wise Adaptive Momentum Pruning algorithm is used for thinning.ResultsExperiments on the TinyPerson dataset demonstrate that IYFVMNet achieves a 46.3% precision, 30% recall, 29.3% mAP50, and 11.8% mAP50-95.DiscussionThe model exhibits higher performance in terms of accuracy and efficiency when compared to other benchmark models, which demonstrates the effectiveness of the improved algorithm (e.g., YOLO-SGF, Guo-Net, TRC-YOLO) in small-object detection and provides a reference for future research.…”
Get full text
Article -
196
Real-time Smartphone Usage Surveillance System Based on YOLOv5
Published 2023-02-01“…The supervision can be done by utilizing a camera to detect a smartphone. The YOLOv5 algorithm was used, which is known for its good speed and accuracy in object detection. …”
Get full text
Article -
197
(Re)thinking Body-Technology Relations with Michel Serres
Published 2021-09-01“…His notion of appropriation through pollution encompasses notions of information and data as forms of algorithmic appropriation, as much if not more, than physical pollution. …”
Get full text
Article -
198
Investigating performance of a multi-subcarrier free space optic using log-normal channel model
Published 2025-02-01“…The paper builds a computational model of a multi-subcarrier free space optic, a variant of the Subcarrier Intensity Modulation Free Space Optic (SIM-FSO), establishes algorithmic flowcharts, writes a computational program to investigate the system performance under various modulation methods, air turbulence levels and different numbers of subcarriers and data rates. …”
Get full text
Article -
199
Pembentukan Model Pohon Keputusan pada Database Car Evaluation Menggunakan Statistik Chi-Square
Published 2022-03-01“…This is possible because its formation is based on the statistical inferential method, so it does not require a separate pruning process as an addition step in the C4.5 algorithm, which actually this algorithm also considers aspects of the statistical significance.…”
Get full text
Article -
200
A novel method for encoding and decoding based on enhanced parity-check-concatenated polar codes
Published 2021-03-01Get full text
Article