-
1921
Feasibility of estimating the percentage of desert pavement using Tasseled Cap Transformation indices extracted from Landsat 8 images
Published 2024-08-01“…The principal component analysis algorithm in the factor analysis method detected the selected indicators of Greenness and Brightness by analyzing the input data output. …”
Get full text
Article -
1922
Unlocking the bottleneck in forward genetics using whole-genome sequencing and identity by descent to isolate causative mutations.
Published 2013-01-01“…Here we show how these problems can be efficiently overcome using whole-genome sequencing (WGS) to detect the ENU mutations and then identify regions that are identical by descent (IBD) in multiple affected mice. …”
Get full text
Article -
1923
A New Signal Processing Method for Time-of-Flight and Center Frequency Estimation
Published 2025-05-01“…There are many and various methods used to determine ToF, such as threshold detection, peak-based methods, cross-correlation, zero-crossing tracking algorithms, etc. …”
Get full text
Article -
1924
Analog Circuits Fault Diagnosis Using ISM Technique and a GA-SVM Classifier Approach
Published 2024-12-01“… This present work aims to contribute to the solution of the problems encountered in electronic circuits fault diagnosis. …”
Get full text
Article -
1925
Data traceability mechanism based on consortium chain
Published 2023-10-01“…With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow between different blockchains, new security issues arise.Cross-chain data transmission can lead to data leakage, and detecting data leakage caused by illegal access becomes challenging.To address these problems, a data traceability mechanism based on a consortium chain was proposed.A cross-blockchain data traceability model was designed, incorporating private data pipelines to ensure the security of cross-chain data transmission.User behaviors were recorded through authorization and access logs, ensuring the traceability of illegal unauthorized access.To improve the efficiency of data traceability and query, an on-chain and off-chain synchronous storage mechanism was adopted.The state of data flow before each transaction was encrypted and stored in the database, and its index was stored in the blockchain transaction.This enables a one-to-one correspondence between on-chain and off-chain data.Additionally, Merkle trees were introduced into the block body to store block summaries, enhancing the efficiency of block legitimacy verification.Based on the data storage form and cross-chain data interaction mechanism, a data traceability algorithm was designed.The traceability results were displayed in the form of an ordered tree.An experimental environment for consortium chain traceability was built using fabric, targeting the cross-domain data traceability scenario in the e-commerce industry.The GO language was used to simulate and test the data traceability performance with a large number of blocks and transactions.The results demonstrate that with the increasing number of blocks and transactions, the proposed data traceability mechanism maintains satisfactory performance.…”
Get full text
Article -
1926
3D Human Motion Capture Method Based on Computer Vision
Published 2023-09-01“…Therefore, the research objective is to increase the accuracy of determining the coordinates of the human body in three-dimensional coordinates through developing a motion capture method based on computer vision and triangulation algorithms.Materials and Methods. A method of motion capture was presented, including calibration of several cameras and formalization of procedures for detecting a person in a frame using a convolutional neural network. …”
Get full text
Article -
1927
Machine Learning Techniques for Kinship Verification: A Review
Published 2025-06-01“…Since the verifying of a kinship is the most challenging problem for many applications, where become beneficial in many fields such as investigation cases of missing people through war and natural disasters, biometric security and more. …”
Get full text
Article -
1928
Dual-verified secure localization method for unmanned intelligent vehicles
Published 2024-06-01“…Once an abnormal position was detected, an alert would be issued, ensuring the normal operation of the unmanned intelligent vehicles. …”
Get full text
Article -
1929
System architecture and key technologies of intelligent, safe and efficient mining for rockburst coal seams
Published 2024-12-01“…First of all, digital twin technology is used to build a fine digital model, deeply detect and analyze the geological structure of the area where the mine is located, accurately measure the characteristics of the regional geostress field and the physical and mechanical properties of coal and rock, and rely on advanced algorithms to carry out engineering distribution of formation change information to achieve “transparency” of geological information. …”
Get full text
Article -
1930
Nuevos modelos para la Caracterización, Detección y Diagnóstico de Fallas en Máquinas Eléctricas Rotativas
Published 2023-07-01“…Physical methods and vibration analysis are currently used to detect problems, although these approaches present limitations in both accuracy and efficiency due to the subjectivity of each case and the loss of information in each case. …”
Get full text
Article -
1931
Experimental Assessment of Linear Sampling and Factorization Methods for Microwave Imaging of Concealed Targets
Published 2015-01-01“…Accuracy and stability of the obtained results show that both the linear sampling and the factorization methods can be quite useful for various buried obstacle imaging problems.…”
Get full text
Article -
1932
Artificial Intelligence for Financial Accountability and Governance in the Public Sector: Strategic Opportunities and Challenges
Published 2025-02-01“…However, challenges such as algorithmic bias, data privacy issues, and the need for strong ethical guidelines still exist, and these could hinder the equitable use of AI. …”
Get full text
Article -
1933
Establishment of an IoT-based smart factory and data analysis model for the quality management of SMEs die-casting companies in Korea
Published 2019-10-01“…It is expected that a method of systematic implementation will be provided to die-casting companies that want to build smart factories in the future and that a plan for managing casting parameter by-product will be established. In addition, algorithms that can solve the problem of multi-collinearity among the casting parameters and aid in the development of new products are needed to detect optimum casting parameters.…”
Get full text
Article -
1934
Aircraft Sensor Fault Diagnosis Based on GraphSage and Attention Mechanism
Published 2025-01-01“…Experiments demonstrate that the proposed method outperforms baseline approaches, achieving better detection performance and faster computational speed. …”
Get full text
Article -
1935
Deep Learning-Based Pulmonary Nodule Screening: A Narrative Review
Published 2025-06-01“…Given its capacity to generate three-dimensional pictures, computed tomography is the most effective means of detecting lung nodules with more excellent resolution of detected nodules. …”
Get full text
Article -
1936
Proactive Complaint Management in Public Sector Informatics Using AI: A Semantic Pattern Recognition Framework
Published 2025-06-01“…Leveraging real-world interaction logs from a public sector agency, the system harmonizes heterogeneous complaint narratives, uncovers latent issue patterns, and enables early detection of technical and usability problems. The approach is deployed through a real-time dashboard, transforming complaint handling from a reactive to a proactive process. …”
Get full text
Article -
1937
Insights and caveats from mining local and global temporal motifs in cryptocurrency transaction networks
Published 2024-11-01“…This allows research into problems like anomaly detection, anti-money laundering, pattern mining and activity clustering (where data from traditional currencies is rarely available). …”
Get full text
Article -
1938
Explainability Feature Bands Adaptive Selection for Hyperspectral Image Classification
Published 2025-05-01“…Hyperspectral remote sensing images are widely used in resource exploration, urban planning, natural disaster assessment, and feature classification. Aiming at the problems of poor interpretability of feature classification algorithms for hyperspectral images, multiple feature dimensions, and difficulty in effectively improving classification accuracy, this paper proposes a feature band adaptive selection method for hyperspectral images. …”
Get full text
Article -
1939
An Efficient and Fast Model Reduced Kernel KNN for Human Activity Recognition
Published 2021-01-01“…Many classic machine learning algorithms, such as artificial neural network, feed forward neural network, K-nearest neighbors, and support vector machine, achieve good performance for detecting human activity. …”
Get full text
Article -
1940
Peran Artificial Intelligence terhadap Praktik Greenwashing dalam Sustainability Report: Systematic Literature Review
Published 2025-06-01“…Although AI is promising, challenges remain, such as algorithm ethics and infrastructure readiness.…”
Get full text
Article