Suggested Topics within your search.
Suggested Topics within your search.
-
801
Visible Light Dynamic Positioning Method Using Improved Camshift-Kalman Algorithm
Published 2019-01-01“…Therefore, we propose a novel VLP method based on image sensor (as positioning terminal), using improved Camshift-Kalman algorithm. The proposed algorithm not only combines Camshift algorithm with Kalman filter, but also introduces the Bhattacharyya coefficient innovatively. …”
Get full text
Article -
802
Algorithm for investigating risk analysis and factors affecting suicidal attempts under uncertainty
Published 2025-05-01“…Also, the nature of the algorithm renders decisions on compound data interfaces beneficial to numerous public health situations. …”
Get full text
Article -
803
New methods and algorithms of the multifunctional optimization for CAE-system of some technological processes
Published 2003-11-01“…There are offered the models and algorithms for solution of the technological tasks, connected with optimization of the melts stream processes in gating systems and also for optimization of the process of the industrial details thermal treatment. …”
Get full text
Article -
804
Lightweight Apple Leaf Disease Detection Algorithm Based on Improved YOLOv8
Published 2024-09-01“…However, during the growth process, apples are prone to various diseases that not only affect the quality of the fruit but also significantly reduce the yield, impacting farmers' economic benefits and the stability of market supply. …”
Get full text
Article -
805
High-resolution image processing and entity recognition algorithm based on artificial intelligence
Published 2024-12-01Get full text
Article -
806
Evaluation of the Efficiency of Metaheuristic Algorithms in the Optimal Design of Pile Wall Retaining Systems
Published 2025-06-01“…For optimization purposes, an integration of the OpenSees software with the MATLAB platform is done to join the modeling space with the mentioned optimization algorithms. The number of iterations for each run is assumed to be 400, which is also considered a termination criterion. …”
Get full text
Article -
807
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm
Published 2025-07-01“…In 2020, Meyer proposed a side-channel attack (SCA) method that recovers the output random bits by analyzing the power consumption traces of the NIST standard AES CTR DRBG. In addition, most algorithmic countermeasures against SCAs also utilize random numbers; thus, such vulnerabilities are more critical than other SCAs on cryptographic modules. …”
Get full text
Article -
808
ALGORITHMIC FACILITIES AND SOFTWARE FOR VIRTUAL DESIGN OF ANTI-BLOCK AND COUNTER-SLIPPING SYSTEMS
Published 2009-02-01“…The paper considers algorithms of designing a roadway covering for virtual test of mobile machine movement dynamics; an algorithm of forming actual values of forces/moments in «road–wheel–car» contact and their derivatives, and also a software for virtual designing of mobile machine dynamics.…”
Get full text
Article -
809
Research on intrusion detection algorithm in wireless network based on Bayes game model
Published 2010-01-01“…Bayes game theory was used to research parameter adjustment problems in wireless network intrusion detec-tion.Intrusion detection game model was designed,time interval adjust algorithm TSMA-BG and parameter correction algorithm DPMA were also designed according to the perfect equilibrium in game modeling.Simulation results show that intrusion detection systems can effectively use these algorithms to detect intrusion behavior that have been changed.…”
Get full text
Article -
810
A new RS steganalysis algorithm of detecting UnderMP3Cover
Published 2018-04-01“…A new RS steganalysis algorithm to attack UnderMP3Cover was proposed.By analyzing the error caused by the RS algorithm,the choice of resolution function,the initial bias and the fitting method were modified,the flip operator was also selected in the experiment.Experimental results demonstrate that the proposed method can estimate the length of embedded message effectively and the average error reduces to 2%,which is better than the existing algorithms.…”
Get full text
Article -
811
Anew Conjugate Gradient Algorithm Based on The (Dai-Liao) Conjugate Gradient Method
Published 2020-02-01“… In this paper we can derive a new search direction of conjugating gradient method associated with (Dai-Liao method ) the new algorithm becomes converged by assuming some hypothesis. …”
Get full text
Article -
812
Solving degree-constrained multicast routing problem by a heuristic genetic algorithm
Published 2007-01-01“…With the purpose to solve the degree constrained multicast routing model efficiently,the evolutionary strategy was introduced into heuristic search methods by employing the chromosome as the heuristic information for global searching,and then a hybrid genetic algorithm was proposed.The algorithm not only avoids the difficulty of coding for multicast trees,but also possesses fast convergency and global optimizing capability.Meanwhile,the efficiency of the method is supported by a great number of numerical experiments.…”
Get full text
Article -
813
Tracking and automatic behavioral analysis of group-housed pigs based on YOLOX+BoT-SORT-slim
Published 2024-12-01“…Secondly, the BoT-SORT-Slim algorithm tracks the detected pigs and their behaviors at high speed. …”
Get full text
Article -
814
A Review of Multi-Armed Bandit Algorithms in Player Modeling and Game Design
Published 2025-01-01“…The potential of MAB in optimizing game design elements like difficulty, rewards, and user interface is also explored. The paper presents empirical results from simulations and user studies and concludes by discussing the potential of MAB algorithms in game design and highlighting future research directions.…”
Get full text
Article -
815
Efficient Fault-Tolerant Event Query Algorithm in Distributed Wireless Sensor Networks
Published 2010-06-01“…An imprecise and missing data correction algorithm based on Kalman filter is proposed to correct fault sensing data, and a score rank algorithm also is proposed to assign each sensor an appropriate value to reflect the importance of sensors. …”
Get full text
Article -
816
Research on greedy reconstruction algorithms of compressed sensing based on variable metric method
Published 2014-12-01“…A variable metric method based gradient pursuit algorithm based on some existing gradient pursuit algorithms was proposed by combining the gradient direction of optimization methods with greedy algorithms.The computational complexity and storage requirements of these algorithms were also analysed and compared.In experimental part,all these algorithms were used to reconstruct one-dimensional audio signal and two-dimensional image signal.Experimental results show that the VMMGP algorithm has the best reconstruction performance among all the gradient pursuit algorithms.…”
Get full text
Article -
817
Digital Art Design Effectiveness Model System Based on K-Medoids Algorithm
Published 2022-01-01“…In addition, research on the theoretical aspects of digital art design is also relatively weak, so it is essential to analyse the formal aesthetics and innovative applications. …”
Get full text
Article -
818
Methods of centroid determination in QGIS – proposal of an algorithm using the “Model Designer” tool
Published 2025-01-01“…Then, various methods of their determination and example applications are discussed. The paper also describes algorithms of calculation of centroid coordinates implemented in QGIS. …”
Get full text
Article -
819
Research on Compression Algorithm of Zone Controller Record DataBased on Huffman Coding
Published 2020-01-01“…The results show that the compression algorithm can compress data by 30%. Storage capacity of the system is effectively improved, and the workload of data dumping is also reduced.…”
Get full text
Article -
820
Asset management using genetic algorithm: Evidence from Tehran Stock Exchange
Published 2014-02-01“…The results of our investigation have also indicated that one could reach outstanding results using GA and forming efficient portfolio.…”
Get full text
Article