-
4641
CFTformer: End-to-End Cross-Frame Multi-Object Tracking With Transformer
Published 2025-01-01“…However, the new transformer attention-based approach to MOT has removed the need for complex post-processing steps, such as graph optimization, allowing for end-to-end query tracking across frames. …”
Get full text
Article -
4642
Drilling Condition Identification Method for Imbalanced Datasets
Published 2025-03-01“…Secondly, a sliding-window-based Synthetic Minority Oversampling Technique (SMOTE) algorithm is developed, which generates new minority-class samples while preserving temporal dependencies, achieving balanced data distribution among classes. …”
Get full text
Article -
4643
Designing a Sustainable Supply Chain Network for Perishable Products Integrating Internet of Things and Mixed Fleets
Published 2025-06-01“…This study proposes a sustainable multi-period supply chain network for perishable products that integrates IoT technology and mixed fleets into an optimization framework. We develop a multi-objective location-inventory-routing model. …”
Get full text
Article -
4644
Efficient RANSAC in 4D Plane Space for Point Cloud Registration
Published 2025-09-01“…3D registration methods based on point-level information struggle in situations with noise, density variation, large-scale points, and small overlaps, while existing primitive-based methods are usually sensitive to tiny errors in the primitive extraction process. …”
Get full text
Article -
4645
A Machine Learning Approach for Predicting Particle Spatial, Velocity, and Temperature Distributions in Cold Spray Additive Manufacturing
Published 2025-06-01“…To bypass the high cost of purely CFD-driven optimization, we construct a two-stage machine learning (ML) framework trained on 48 high-fidelity CFD simulations. …”
Get full text
Article -
4646
Lightcone bounds for quantum circuit mapping via uncomplexity
Published 2024-11-01“…We also develop an initial placement algorithm based on graph similarity search, aiding us in optimally placing circuit qubits onto a device. 600 realistic benchmarks using the IBM Qiskit compiler and a brute-force method are then tested against the lightcone bound, with results unambiguously verifying the veracity of the bound, while permitting trustworthy estimations of minimal overhead in near-term realizations of quantum algorithms. …”
Get full text
Article -
4647
Enhancing the effectiveness of wireless sensor networks through consensus estimation and universal coverage
Published 2025-07-01“…Additionally, multi-hop routing optimizes data transmission to the base station by reducing transmission distances, further enhancing energy efficiency. …”
Get full text
Article -
4648
Trainable embedding quantum physics informed neural networks for solving nonlinear PDEs
Published 2025-05-01“…In direct comparison with classical PINNs, this approach showed an ability to achieve superior results while using the same number of parameters, highlighting their potential for more efficient optimization in high-dimensional parameter spaces, which could be transformative for future applications.…”
Get full text
Article -
4649
A Colored Traveling Salesman Problem with Varying City Colors
Published 2021-01-01“…A colored traveling salesman problem (CTSP) is a path optimization problem in which colors are used to characterize diverse matching relationship between cities and salesmen. …”
Get full text
Article -
4650
Building Equi-Width Histograms on Homomorphically Encrypted Data
Published 2025-06-01“…To overcome the challenges posed by homomorphic encryption, we redesign the traditional histogram construction algorithm, optimizing it for secure computation by addressing constraints related to nested loops and conditional statements. …”
Get full text
Article -
4651
Predictive analysis of solubility data with pressure and temperature in assessing nanomedicine preparation via supercritical carbon dioxide
Published 2025-08-01“…The ADABOOST ensemble technique was applied to strengthen the predictive capabilities of the models, while hyperparameter tuning was conducted using the Jellyfish Optimization (JO) algorithm. …”
Get full text
Article -
4652
Intelligent Counterforce Allocation Method Using Multi-Agent Reinforcement Learning for Ground Operations
Published 2025-01-01“…Designed for brigade-level and higher force optimization, ICAGO enables effective counterforce deployment in defensive, offensive, and simultaneous operations. …”
Get full text
Article -
4653
Regenerative Braking in PV-Mounted Electric Vehicle With Reduced Switch VSI-Driven BLDC Motor and HAP-FUP Controller
Published 2024-01-01“…Maximum energy is extracted from the PV module via employment of a particle swarm optimization (PSO)-based maximum power point tracking (MPPT) algorithm, while propulsion is provided through utilization of a brushless direct current (BLDC) motor driven by reduced switch voltage source inverter (VSI). …”
Get full text
Article -
4654
Block encoding bosons by signal processing
Published 2025-05-01“…Block Encoding (BE) is a crucial subroutine in many modern quantum algorithms, including those with near-optimal scaling for simulating quantum many-body systems, which often rely on Quantum Signal Processing (QSP). …”
Get full text
Article -
4655
Risk averse reproduction numbers improve resurgence detection.
Published 2023-07-01“…We find that this weighting can cause delayed detection of outbreak resurgence and premature signalling of epidemic control because it underrepresents the risks from highly transmissible groups. Applying E-optimal experimental design theory, we develop a weighting algorithm to minimise these issues, yielding the risk averse reproduction number E. …”
Get full text
Article -
4656
Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets
Published 2025-06-01“…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
Get full text
Article -
4657
Effect of crystal-to-detector distance shift on data processing in serial crystallography.
Published 2025-01-01“…Serial synchrotron crystallographic data of hen egg white lysozyme (HEWL) and glucose isomerase (GI) were processed at various CTDDs using three indexing algorithms. The CTDD that yielded the maximum number of indexed images differed from the optimized CTDD, and the resulting indexing trends varied depending on the algorithm used. …”
Get full text
Article -
4658
Design and Simulation of a Four-Legged Mobile Robot for Autonomous Navigation on a Spacecraft Hull
Published 2025-01-01“…The robot demonstrated the ability to follow the computed optimal path with a positional deviation of less than 0.5% by the third trial. …”
Get full text
Article -
4659
Building construction crack detection with BCCD YOLO enhanced feature fusion and attention mechanisms
Published 2025-07-01“…Abstract An effective algorithm for detecting cracks in bare concrete structures in building construction, capable of identifying small targets, is essential for safeguarding buildings. …”
Get full text
Article -
4660
Improving classifier decision boundaries and interpretability using nearest neighbors
Published 2025-07-01“…Abstract Neural networks often fail to learn optimal decision boundaries. In this study, we show that these boundaries are typically situated in regions with low training data density, making them highly sensitive to a small number of samples, which, in turn, increases the risk of overfitting. …”
Get full text
Article