-
1541
Point Data Registration With the Multi-Object, Cardinalized Optimal Linear Assignment Metric
Published 2024-01-01“…The Iterative Closest Point (ICP) algorithm and its variants were initially used to solve such problems and since then, various global methods have been proposed to improve registration when data outliers exist. …”
Get full text
Article -
1542
Stress triggering mechanism of strong mine earthquake in huge thick strata revealed by inversion of joint source rupture information
Published 2025-04-01“…In order to solve the problem of inaccurate source information and unclear stress triggering mechanism, which makes it difficult to prevent and control SME, the working face of a mine in the area where SME occurred frequently is used as a background for the study, based on preliminary detection of stratigraphic rock movement characteristics, the principal component analysis (PCA) was applied to extract the effective components of waveforms, the hybrid moment tensor inversion (HMTI) are used to solve focal mechanism of SME, stress inversion model modified, and stress inversion algorithm optimised, based on the algorithm, solved the distribution characteristics of the stress field before and after the occurrence of SME, introduced instability coefficients to evaluate the stability of the overburden, and analysed the stress triggering mechanism of SME. …”
Get full text
Article -
1543
Deep Unified Model For Face Recognition Based on Convolution Neural Network and Edge Computing
Published 2019-01-01“…This paper proposes an algorithm for face detection and recognition based on convolution neural networks (CNN), which outperform the traditional techniques. …”
Get full text
Article -
1544
Predicting soil organic carbon with ensemble learning techniques by using satellite images for precision farming
Published 2025-08-01“…For testing dataset, RMSE ranged between 0.15 and 0.16 while sMAPE recorded as 0.19–0.20 and R2 was recorded as 0.12 for Random Forest and 0.03 for XGBoost algorithm. Stacking method proved its significance prominently in overcoming the problem of overfitting as compared to other two methods. …”
Get full text
Article -
1545
Direction-of-Arrival Estimation for Wideband Chirps via Multi-Line Fitting in the Fractional Fourier Domain
Published 2025-01-01“…For the multi-target scenario, this operation can be generalized as a multi-line fitting problem. In this context, two approaches are considered: piecewise slope fitting and line detection in the Hough space. …”
Get full text
Article -
1546
Next-Gen Video Watermarking with Augmented Payload: Integrating KAZE and DWT for Superior Robustness and High Transparency
Published 2025-05-01“…Utilizing the 2D-DWT along with the KAZE feature detection algorithm, which incorporates the Accelerated Segment Test with Zero Eigenvalue, scrutinize and pinpoint data points that exhibit circular symmetry. …”
Get full text
Article -
1547
Adaptive neuro-fuzzy inference systems for improved mastitis classification and diagnosis
Published 2025-07-01“…The dataset exhibited a problem of class imbalance, with the majority class (non-mastitis cases) being over-represented. …”
Get full text
Article -
1548
A Systematic Study on the Extraction and Image Reproduction of Ceramic Sculpture Artworks
Published 2022-01-01“…In order to solve the research on the extraction of ceramic sculpture artwork patterns, and, in the process of image reproduction, the problem of too few feature points in the object image, the author proposes an image stitching algorithm that combines SIFT and MSER algorithms. …”
Get full text
Article -
1549
Fast fault diagnosis of smart grid equipment based on deep neural network model based on knowledge graph.
Published 2025-01-01“…Experiments show that compared with the existing fault detection algorithms, the YOLOv4 algorithm constructed in this paper is more accurate, faster and easier to operate.…”
Get full text
Article -
1550
Deep Learning-Based Multi-Floor Indoor Localization Using Smartphone IMU Sensors With 3D Location Initialization
Published 2025-01-01“…In this paper, we explain conventional IMU sensor-based PDR methods and describe the problems of PDR as well as the limitations of barometer-based floor transition detection techniques. …”
Get full text
Article -
1551
TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain.
Published 2020-01-01“…Secondly, consensus algorithm is used to filter malicious recommendation trust value and prevent colluding attacks. …”
Get full text
Article -
1552
Occlusion Vehicle Target Recognition Method Based on Component Model
Published 2024-11-01“…By labeling the public data set and the collected data set, six types of vehicle component data sets are constructed for training, as well as design ablation experiments and comparison experiments to verify the trained network, which prove the superiority of the recognition algorithm. The experimental results show that the proposed recognition method effectively solves the problem of misrecognition and missing recognition caused by interference and occlusion in vehicle recognition.…”
Get full text
Article -
1553
Measures of Dependence for α-Stable Distributed Processes and Its Application to Diagnostics of Local Damage in Presence of Impulsive Noise
Published 2017-01-01“…Local damage detection in rotating machinery is simply searching for cyclic impulsive signal in noisy observation. …”
Get full text
Article -
1554
Learning in presence of class imbalance and class overlapping by using one-class SVM and undersampling technique
Published 2019-04-01“…A data level approach is adapted with one-class SVM-based anomaly detection to detect the cases of data overlapping while an adapted Tomek-link undersampling algorithm is defined to treat both overlapped and imbalanced cases. …”
Get full text
Article -
1555
Personalized Influential Community Search in Large Networks: A K-ECC-Based Model
Published 2021-01-01“…To solve the problem, a baseline method is first proposed. To scale for large networks, a dichotomy-based algorithm is developed. …”
Get full text
Article -
1556
Improved YOLOv8 Network of Aircraft Target Recognition Based on Synthetic Aperture Radar Imaging Feature
Published 2025-05-01“…First, we employed the Shi–Tomasi corner detection algorithm and the Enhanced Lee filtering algorithm to convert grayscale images into RGB images, thereby improving detection accuracy and efficiency. …”
Get full text
Article -
1557
Assessment of Blind-Spots and Multi-Path Effects at Indoor Positioning by Multilateration
Published 2025-05-01“…The algorithm detected 31 multipath cases among the 35 multipath situations and significantly improved the resultant positioning accuracy. …”
Get full text
Article -
1558
The Least Limiting Water Range to Estimate Soil Water Content Using Random Forest Integrated with GIS and Geostatistical Approaches
Published 2023-11-01“…For the 20-40 cm depth, an aeration problem in 5.88%, a compaction problem in 28.57%, and both an aeration and a compaction problem in 2.52% of the points were detected. …”
Get full text
Article -
1559
Camera Pose Generation Based on Unity3D
Published 2025-04-01“…Aiming at the problems regarding the capacity of cameras to comprehensively capture scene objects, this study presents an enhanced algorithm based on rapidly exploring random tree star (RRT*) for the generation of camera poses in a 3D indoor scene. …”
Get full text
Article -
1560
Multi-user physical layer authentication mechanism based on lightweight CNN and channel feature assistance
Published 2023-11-01“…To address the problems of poor robustness and high complexity of current physical layer user authentication algorithms, a lightweight convolutional neural network (CNN) channel feature extraction algorithm was proposed to reduce the channel state response required for training by changing the form of network input, and a multi-user physical layer channel feature-assisted authentication mechanism was established based on this algorithm to design a detailed process from user registration to authentication, and multi-user authentication and network parameter update online were completed.Simulation results show that the proposed algorithm can complete multi-user authentication, obtain good detection performance with smaller training rounds, and require fewer training samples than existing multi-user authentication algorithms.…”
Get full text
Article