-
241
An Algorithm for Correcting Levels of Useful Signals on Interpretation of Eddy-Current Defectograms
Published 2021-03-01“…To ensure traffic safety of railway transport, non-destructive tests of rails are regularly carried out by using various approaches and methods, including eddy-current flaw detection methods. An automatic analysis of large data sets (defectograms) that come from the corresponding equipment is an actual problem. …”
Get full text
Article -
242
Tackling the Optimal Phasor Measurement Unit Placement and Attack Detection Problems in Smart Grids by Incorporating Machine Learning
Published 2025-01-01“…Existing research primarily addresses cybersecurity by focusing on the optimal placement of phasor measurement units (PMUs) to ensure topological observability and minimize system costs, followed by developing AI-based attack detection algorithms. However, these studies fail to simultaneously consider system cost, loss in system observability, and false data injection attack (FDIA) detection performance. …”
Get full text
Article -
243
METHOD OF IMAGE PROCESSING IN THE PROBLEM OF DETECTING MOVING OBJECTS IN OPTICAL-ELECTRONIC SURVEILLANCE SYSTEMS OF THERMAL IMAGING TYPE
Published 2020-03-01“…Moving objects on the observed scene are subject to investigation, so it is advisable to use algorithms based on background subtraction methods to solve the detection problem. …”
Get full text
Article -
244
Development of a Deep-Learning-Based Computerized Scoring Algorithm
Published 2025-04-01Get full text
Article -
245
The Detection of Fake Text News using a Dense-based 1D-CNN Deep Learning Algorithm
Published 2024-04-01Get full text
Article -
246
Genetic algorithm solving the scheduling problem of large-scale power grid material quality inspection bases under multiple constraints
Published 2025-01-01“…Based on the characteristics of the problem, a genetic algorithm is proposed as a tool for solving, and the encoding and decoding in the algorithm are specially designed for the detection base to ensure the generation of feasible solutions; Introducing roulette wheel to select populations, combining the characteristics of the problem to randomly mutate chromosomes, and using POX for chromosome crossover, in order to obtain the optimal solution to the problem. …”
Get full text
Article -
247
SLAM Algorithm for Mobile Robots Based on Improved LVI-SAM in Complex Environments
Published 2024-11-01“…First of all, the state-of-the-art feature detection algorithm SuperPoint is used to extract the feature points from a visual-inertial system, enhancing the detection ability of feature points in complex scenarios. …”
Get full text
Article -
248
Detecting Anomalies in CPU Behavior Using Clustering Algorithms from the Scikit-Learn Library in Python Programming Language
Published 2024-03-01“…This article examines the problem of detecting anomalies in central processing unit (CPU) operation using time series clustering algorithms. …”
Get full text
Article -
249
Detection Method for Bolts with Mission Pins on Transmission Lines Based on DBSCAN-FPN
Published 2021-03-01“…As the bolt with missing pins are small targets, their positioning is difficult and their features are hard to extract. Aim at this problem, a detection method for bolts with missing pins is proposed based on the DBSCAN algorithm and FPN model. …”
Get full text
Article -
250
Solving the 3D Multi-Objective Dynamic AUV Path Planning Problem Based on the Improved Morphin-Altruistic NSGAII Algorithm
Published 2025-09-01“…However, current dynamic path planning faces several challenges such as three-dimensional environments and multi-objective problems, resulting in impractical solutions. To address these challenges, this paper proposes improved Morphin-Altruistic Nondominated Sorting Genetic Algorithm II (ANSGAII). …”
Get full text
Article -
251
Enhanced Community Detection via Convolutional Neural Network: A Modified Approach Based on MRFasGCN Algorithm
Published 2024-01-01“…Researchers are proposing new algorithms to detect the communities having better performance as compared to the existing techniques. …”
Get full text
Article -
252
-
253
UAV Real-Time Target Detection and Tracking Algorithm Based on Improved KCF and YOLOv5s_MSES
Published 2025-04-01“…Thirdly, aiming at the problem of tracking loss due to occlusion or out-of-view situations, this work proposes a fusion strategy based on the YOLOv5s_MSES target detection algorithm. …”
Get full text
Article -
254
Algorithmic support of the system of external observation and routing of autonomous mobile robots
Published 2021-06-01Get full text
Article -
255
An adaptive differential evolution algorithm based on adaptive evolution strategy and diversity enhancement
Published 2025-09-01“…Finally, we validate our algorithm on multiple benchmarks of varying dimensionalities from the CEC 2013, 2014, and 2017 test suites as well as on real-world application problems, and all results undergo rigorous statistical significance testing. …”
Get full text
Article -
256
-
257
HashTrie:a space-efficient multiple string matching algorithm
Published 2015-10-01Get full text
Article -
258
Two-stage Community Discovery Algorithm for Multi-point Seed Prepartition
Published 2021-08-01“…The community detection algorithm based on seed expansion has the characteristics of low time complexity,high recognition accuracy,and is not restricted by the shape of the community. …”
Get full text
Article -
259
An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm
Published 2025-05-01“…Visually impaired persons (VIPs) can utilize the OD approach for detecting problems and recognizing services to offer secure and informative navigation. …”
Get full text
Article -
260
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…In this study, after collecting and preparing data, the improved support vector machine with grasshopper optimization algorithm is used as a proposed method to detect anomaly-based intrusion in the Internet of Things. …”
Get full text
Article