-
4241
Robotized 3D Scanning and Alignment Method for Dimensional Qualification of Big Parts Printed by Material Extrusion
Published 2024-12-01“…The complete system validates an in-house algorithm, which inspects the whole reconstructed part, acquiring several views from different poses, and makes the alignment with the theoretical model of the geometry of big parts manufactured by 3D printing. …”
Get full text
Article -
4242
Model Predictive Control Method for Autonomous Vehicles Using Time-Varying and Non-Uniformly Spaced Horizon
Published 2021-01-01“…This paper proposes an algorithm for path-following and collision avoidance of an autonomous vehicle based on model predictive control (MPC) using time-varying and non-uniformly spaced horizon. …”
Get full text
Article -
4243
Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill
Published 2018-01-01“…Traditional methods always characterize fault feature using a single fault vector, which may fail to reveal whole fault influences caused by complex process disturbances. …”
Get full text
Article -
4244
Low-complexity massive MIMO channel estimation for mmWave systems via matrix completion
Published 2020-04-01“…Due to the high computational complexity of mmWave massive MIMO systems realizing reliable channel estimation,a low-complexity mmWave beamspace channel estimation algorithm was proposed utilizing the inherent low-rank of the mmWave channel.The proposed algorithm jointly exploited the channel sparsity in the beamspace domain and its low-rank property in the antenna domain to provide more accurate recovery,especially for shorter training intervals.By regarding the channel estimation as matrix completion problem,the proposed algorithm was based on the alternating direction method of multipliers with fast convergence properties and exploited fast randomized singular value thresholding to significantly reduce the corresponding complexity.The simulation result shows that the proposed algorithm can achieve satisfactory channel estimation performance while maintaining low complexity.…”
Get full text
Article -
4245
Spectrum allocation with SINR guarantee for cognitive wireless multi-hop networks
Published 2011-11-01“…To solve the problems inherent in fixed spectrum allocation wireless multi-hop networks such as channel collision,a full distributed spectrum allocation algorithm in‘underlay’fashion was proposed by using dynamic spectrum allocation technology in cognition radio,which was designed for wireless multi-hop networks formed with secondary users (SUs).This algorithm modeled the spectrum allocation problem as a static non-cooperative game,proofed the existence of Nash equilibrium (NE),and proposed an iterative algorithm to solve the NE.Extensive numerical experiments demonstrated that this algorithm can achieve the joint allocation of channels and power,and guarantee SUs’ signal to interference plus noise ratio(SINR)request while satisfying primary users’interference power limit.…”
Get full text
Article -
4246
Dynamic spectrum allocation based on one-band multi-winner auction
Published 2012-02-01“…In order to improve the effectiveness of traditional auction in DSA (dynamic spectrum allocation) issue in cognitive radio networks,a new dynamic spectrum allocation algorithm based on one-band multi-winner auction was proposed.Compared with the original greedy algorithm,the new algorithm can achieve better spectrum allocation solutions with lower computational complexity by introducing the multiple greedy strategy.It increases the seller's revenue by improving the VCG (vickery-clarke-groves) mechanism,while retaining the dominant strategy incentive compatible property.In addition,it suppresses the occurrence of collusion effectively.Simulation results show that the algorithm proposed can get spectrum allocation efficiency close to the optimal solution and increase the auction revenue significantly.…”
Get full text
Article -
4247
Privacy-Oriented Successive Approximation Image Position Follower Processing
Published 2021-01-01“…The algorithm solves the problems of lack of scale estimation of KCF algorithm and low real-time rate of DSST algorithm and improves the tracking accuracy while ensuring the real-time performance of the algorithm.…”
Get full text
Article -
4248
Non-Fragile Sampled Control Design for an Interconnected Large-Scale System via Wirtinger Inequality
Published 2024-10-01“…The first example graphically illustrates the function of the proposed algorithm while the second one compares with a method for stabilizing a large-scale system obtained earlier, thus illustrating the improved capabilities of the presented algorithm.…”
Get full text
Article -
4249
Feasibility of Licensed Vocational Nurses Using a CDS App to Communicate Signs and Symptoms of a UTI
Published 2025-01-01“…Results showed LVNs found the algorithm easy or very easy to use, their behaviors demonstrated high levels of engagement with the simulation while using the algorithm, and interviews supported the positive value LVNs placed on using an algorithmic approach for UTI assessment. …”
Get full text
Article -
4250
Integrating Confidence Maps and Visual Servoing for Needle Tracking in Robotic US-Guided Percutaneous Nephrolithotomy
Published 2025-01-01“…Unlike previous methods, where confidence maps were used for probe positioning with static targets, this article introduces the first unified algorithm that optimizes image quality while tracking a moving tool. …”
Get full text
Article -
4251
Text Multilevel Encryption Using New Key Exchange Protocol
Published 2022-06-01“…It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. …”
Get full text
Article -
4252
Optimizing high-speed train tracking intervals with an improved multi-objective grey wolf
Published 2025-06-01“…The optimized speed profile of the MOGWO algorithm is smoother and more stable and meets the target requirements of energy saving, punctuality and comfort while maximally respecting the speed limit profile. …”
Get full text
Article -
4253
High-Speed Robust Dynamic Positioning and Tracking Method Based on Visual Visible Light Communication Using Optical Flow Detection and Bayesian Forecast
Published 2018-01-01“…The proposed optical flow method is used for real-time detection, and solves the problem of blur effect caused by the fast relative movement between the LED and positioning terminal, which would result in location failure in the traditional VLP system with pixel intensity detection. While the proposed Bayesian forecast algorithm is used for forecasting the possible location of the LED in the next frame image according to the previous frames as empirical data, which drastically solve the problem of shielded effect caused by the light link between the LED and the positioning terminal is shielded or broken. …”
Get full text
Article -
4254
An accurate trajectory tracking method for low-speed unmanned vehicles based on model predictive control
Published 2024-05-01“…Abstract Trajectory tracking on a low-speed vehicle using the model predictive control (MPC) algorithm usually assumes a simple road terrain. This assumption does not correspond to the actual road situation, leading to low tracking accuracy. …”
Get full text
Article -
4255
Two-Sided Matching on Comprehensive Transportation Network Emergency Vehicles’ Allocation
Published 2021-01-01“…In emergency rescue, the allocation of comprehensive transportation network emergency vehicles often affects the efficiency of the whole rescue process. In the context of disasters, this paper researches the one-to-many two-sided matching problem between the emergency vehicles and the materials to be transported. …”
Get full text
Article -
4256
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01“…Existing intrusion path studies based on attack graph lack consideration of factors other than basic network environment information when calculating the state transition probability.In order to analyze the security of target network comprehensively and reasonably, a network attack analysis method based on attack graph of absorbing Markov chain was proposed.Firstly, a state transition probability normalization algorithm based on vulnerability life cycle was proposed based on attack graph.Secondly, the attack graph was mapped to the absorbing Markov chain and the state transition probability matrix was given.Finally, the state transition probability matrix was calculated to comprehensively analyze the node threat degree, attack path length and expected impact of the target network.The results show that the proposed method can effectively analyze the expected influence of node threat degree, attack path length and vulnerability life cycle on the whole network, which is helpful for security research personnel to better understand the security state of the network.…”
Get full text
Article -
4257
Regulation of replication timing in Saccharomyces cerevisiae.
Published 2025-06-01“…Here, we present a high (1-kilobase) resolution stochastic model of Saccharomyces cerevisiae whole-genome replication in which origins compete to associate with limited firing factors. …”
Get full text
Article -
4258
Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks
Published 2011-01-01“…Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs).…”
Get full text
Article -
4259
Application of 3D Scanning Technology for Evaluation of Virtual Model of Gun Geometry
Published 2018-03-01“…The paper presents the results of reconstruction of selected gun elements with application of 3D scanning technology. Algorithm of under investigation process, the way of preparing object for scanning and measuring process were also presented. …”
Get full text
Article -
4260
A Traffic Restriction Scheme for Enhancing Carpooling
Published 2017-01-01“…However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.…”
Get full text
Article