-
1461
Intelligent recognition technology of high speed moving target contour in dynamic visual scene
Published 2025-03-01“…The joint dynamic programming algorithm is used to analyze the similarity between shape features, achieve target matching recognition, and reduce target recognition bias. …”
Get full text
Article -
1462
Research on tracking strategy of manipulator based on fusion reward mechanism
Published 2025-02-01“…Sparse reward signals lead to blind exploration, affecting the efficiency of the manipulator during path planning for multi-axis systems at any given end-effector start and target position. To address the problem of tracking randomly located targets in three-dimensional space, this paper proposes a PPO (proximal policy optimization) algorithm with a fused reward mechanism, which enhances the tracking and guidance capabilities of the manipulator in multiple dimensions and reduces the blind randomness of the manipulator during the detection and sampling process. …”
Get full text
Article -
1463
Research on the Control Method of Force Servo System of Liquid Hydrostatic Guide Oil Film Thickness Test Bench for Machine Tools
Published 2022-01-01“…Finally, the test bench was built to complete the experiments, and the experimental results showed that the followability of the loading force and thickness detection accuracy of the test bench were better after adding the self-turbulence control algorithm and the stability of the oil film thickness was significantly improved by the test bench electro-hydraulic servo control system.…”
Get full text
Article -
1464
A generic multi-lidar data batching strategy on the sensor driver level
Published 2025-06-01“…Especially how to derive back the problem to having only a single lidar input, to which there are countless available algorithms solving odometry, mapping, object detection and tracking and many other tasks. …”
Get full text
Article -
1465
Research on the Improvement of the Signal Time Delay Estimation Method of Acoustic Positioning for Anti-Low Altitude UAVs
Published 2025-04-01“…Aiming at the problem of a large error in the time delay estimation algorithm under a low SNR, a time delay estimation algorithm based on an improved weighted function combined with a generalized cubic cross-correlation is introduced. …”
Get full text
Article -
1466
Lightweight CNN-Based Visual Perception Method for Assessing Local Environment Complexity of Unmanned Surface Vehicle
Published 2025-02-01“…Addressing the problem of inadequate environmental detection in the process of optimizing search for unmanned surface vehicles (USVs) by a heuristic algorithm, this paper proposes a comprehensive visual perception method that combines a lightweight convolutional neural network (CNN) with the USV’s real-time heading angle. …”
Get full text
Article -
1467
Using Partial Differential Equation Face Recognition Model to Evaluate Students’ Attention in a College Chinese Classroom
Published 2021-01-01“…In the evaluation of students’ concentration in class, this paper firstly uses the face detection algorithm in face recognition technology to detect the face and intercept the expression data, and calculates the rise rate. …”
Get full text
Article -
1468
An energy-balanced multi-sensor scheduling scheme for collaborative target tracking in wireless sensor networks
Published 2017-03-01“…This article incorporates this contradiction into a problem of multi-objective optimization in tracking networks where multiple sensor nodes are scheduled for collaborative target tracking by adopting the unscented Kalman filter algorithm. …”
Get full text
Article -
1469
Digits Recognition for Arabic Handwritten through Convolutional Neural Networks, Local Binary Patterns, and Histogram of Oriented Gradients
Published 2024-10-01“…One of these applications is the recognition of handwriting in official documents, historical scripts, bank checks, etc., which is a problem that might be considered relatively a security issue. …”
Get full text
Article -
1470
A Novel Sparse False Data Injection Attack Method in Smart Grids with Incomplete Power Network Information
Published 2018-01-01“…Finally, an effective sparse imperfect strategy is proposed by converting the choice of measurements into a subset selection problem, which is solved by the locally regularized fast recursive (LRFR) algorithm to effectively improve the sparsity of attack vectors. …”
Get full text
Article -
1471
Cooperative sensing method considering malicious nodes in cognitive radio networks
Published 2015-06-01“…Based on a more practical cognitive radio network with malicious users,the spectrum sharing network model based on the cooperative spectrum sensing was studied that the secondary user can dynamically adjust its transmit power based on cooperative sensing results.To avoid significant reduction in performance of spectrum sensing system caused by malicious nodes,it is aimed to study how to improve the performance of cooperative sensing.By introducing the convex optimization problem,the secondary network throughput is maximized under the certain detection probability conditions and the corresponding power constraints.Simulation results show that whether or not there are malicious nodes,the algorithm is efficient in calculating optimal sensing time and the optimal transmit powers,and the secondary network throughput is increased when the maximum interference power limits and the maximum transmit power restrictions are decreased.…”
Get full text
Article -
1472
Multi-class fault diagnosis of BF based on global optimization LS-SVM
Published 2017-01-01“…Aiming at the requirement of high speed and precision in blast furnace fault diagnosis systems, a new strategy based on global optimization least-squares support vector machines (LS-SVM) was proposed to solve this problem. Firstly, the variable metric discrete particle swarm optimization algorithm was employed to optimize the feature selection and LS-SVM parameters. …”
Get full text
Article -
1473
OTFS-ISAC system channel estimation based on GAN-LSTM network in urban rail train-infrastructure scenario
Published 2025-02-01“…In order to solve the problem of integrated sensing and communication (ISAC) signal transmission channel estimation in commercial B5G/6G urban rail train-infrastructure scenario, a channel estimation method based on deep learning was proposed. …”
Get full text
Article -
1474
Research on fusion model based on deep learning for text content security enhancement
Published 2020-05-01“…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
Get full text
Article -
1475
Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures
Published 2021-09-01“…The emergence of counterfeit integrated circuits, problems of piracy, overproduction, unauthorized interference in the design of microcircuit, hardware Trojans require the development of methods and means of their timely detection. …”
Get full text
Article -
1476
Fault Prediction of Hydropower Station Based on CNN-LSTM-GAN with Biased Data
Published 2025-07-01“…Then, the CNN-LSTM network is used to predict time series data, and the GAN is used to expand fault data samples to solve the problem of an unbalanced data distribution. Meanwhile, a multi-scale feature extraction network with time–frequency information is designed to improve the accuracy of fault detection. …”
Get full text
Article -
1477
Method for Automatic Path Planning of Underwater Vehicles Considering Ambient Noise Fields
Published 2025-05-01“…The result is subsequently incorporated into the sonar equation to develop a noise-considerate concealment effectiveness model, which serves as input for a noise-considerate A* path planning algorithm. Comparative analyses of path planning results demonstrate that, within the studied maritime domain, the noise-prioritized path exhibits a statistically significant reduction in the median detection range by approximately 17%, a 50% reduction in the minimum detection range, and a 20% reduction in the maximum detection range, relative to alternative paths planned with a fixed noise level assumption.…”
Get full text
Article -
1478
THE USE OF NEURAL NETWORKS FOR THE AUTOMATIC ANALYSIS OF ELECTROCARDIOGRAMS IN DIAGNOSIS OF CARDIOVASCULAR DISEASES
Published 2018-12-01“…The elaboration of existing and development of new methods for processing electrocardiographic data allow the problem of timely diagnosis and prevention of cardiovascular diseases to be solvedat early stages of their detection.ConclusionThe accuracy of detection and extraction of the ECG signal components shows that the developed neural network model can be used to detect heart diseases among patients.…”
Get full text
Article -
1479
Reconstruction for Scanning LiDAR with Array GM-APD on Mobile Platform
Published 2025-02-01“…Array Geiger-mode avalanche photodiode (GM-APD) Light Detection and Ranging (LiDAR) has the advantages of high sensitivity and long imaging range. …”
Get full text
Article -
1480
Low Signal-to-Noise Ratio Optoelectronic Signal Reconstruction Based on Zero-Phase Multi-Stage Collaborative Filtering
Published 2025-04-01“…Traditional signal processing algorithms fail to effectively suppress phase distortion and boundary effects under extremely low SNR conditions, creating a technical bottleneck that severely constrains system detection performance. …”
Get full text
Article