-
2881
-
2882
Barefoot Footprint Detection Algorithm Based on YOLOv8-StarNet
Published 2025-07-01“…This study proposes an optimized footprint recognition model based on an enhanced StarNet architecture for biometric identification in the security, medical, and criminal investigation fields. …”
Get full text
Article -
2883
A deep learning-based algorithm for the detection of personal protective equipment.
Published 2025-01-01Get full text
Article -
2884
Optimal Waveform Selection for Robust Target Tracking
Published 2013-01-01“…This paper proposes a new optimal waveform selection algorithm for intelligent target tracking. …”
Get full text
Article -
2885
Elastic Optimization for Stragglers in Edge Federated Learning
Published 2023-12-01“…Then, we formulate an optimization problem to be solved at edge devices. We customize a benchmark algorithm, FedAvg, to obtain a new elastic optimization algorithm (FedEN) which is applied in local training of edge devices. …”
Get full text
Article -
2886
Research on Wind Power Grid Integration Power Fluctuation Smoothing Control Strategy Based on Energy Storage Battery Health Prediction
Published 2025-04-01“…This study first adopts a Genetic Algorithm-Optimized Support Vector Regression (GA-SVR) model to predict the SOH of the energy storage system. …”
Get full text
Article -
2887
Power inspection UAV task assignment matrix reversal genetic algorithm
Published 2024-01-01“…The model is then optimized using two-point crossover and single-point reversal mutation operations, which enhance the UAV unit utility and generate an optimal allocation matrix. …”
Get full text
Article -
2888
Motion control and singular perturbation algorithms for lower limb rehabilitation robots
Published 2025-05-01“…To better assist patients with lower limb injuries in their rehabilitation training, this paper focuses on motion control and singular perturbation algorithms and their practical applications. First, the paper conducts an in-depth analysis of the mechanical structure of such robots and establishes detailed kinematics and dynamics models. …”
Get full text
Article -
2889
A Linear Fitting Algorithm Based on Modified Random Sample Consensus
Published 2025-06-01“…RANSAC is then used to fit the model parameters of the processed dataset. The optimal parameters for the linear model are obtained after multiple iterative processes. …”
Get full text
Article -
2890
Algorithm of reconstruction combined midface defects after resection malignant tumors
Published 2022-08-01“…This allows to determining the type and volume of the defect, plan optimal method of reconstruction, model the required flap geometry, making a template for harvesting flap, calculating the position and number of titanium plates for fixation, and, if necessary, print an individual mesh of the infraorbital wall.…”
Get full text
Article -
2891
The Application of Kalman Filter Algorithm in Rail Transit Signal Safety Detection
Published 2025-01-01“…Firstly, the improved Kalman filter algorithm is used to denoise the signal to ensure the accuracy of signal transmission. …”
Get full text
Article -
2892
Optimization of Steering Torque for Suspended Monorail Vehicle
Published 2020-05-01“…Finally, the influence of significant system dynamics parameters was taken as the optimal design variables, the vehicle curve passability and stationarity were taken as the optimization constraints, the NSGA-II genetic algorithm was used as the optimization algorithm, the multi-body dynamics software (ADAMS) and multi-objective optimization software (modeFRONTIER)were combined to optimize the steering torque of the suspended monorail vehicle, and the effectiveness and feasibility of the optimization results were verified. …”
Get full text
Article -
2893
Depth first traversal algorithm for the back-off tree of distributed queuing
Published 2021-02-01“…An analytic model was provided for the conventional distributed queueing (DQ) and its back-off tree operations, followed by a design of improving algorithm based on depth first traversal.Combing the specific analysis of complete binary tree with generalized extension by random tree reconstruction, the performance of proposed algorithm was evaluated on the throughput in both theory and simulation experiment.A theoretic optimal solution of contention slots of DQ frame and a brief description of simulation extension based on the open source NS-3 were presented.The simulation results show that the maximum stationary throughput by the proposed algorithm reaches 70% of the physical capacity of channel.…”
Get full text
Article -
2894
Utility Optimization of Federated Learning with Differential Privacy
Published 2021-01-01Get full text
Article -
2895
Research on PBS buffer scheduling strategy problems based on genetic algorithms
Published 2025-01-01“…A genetic algorithm optimized vehicle selection from the PBS, adhering to constraints.Analysis showed this method improved efficiency by nearly 40% compared to traditional linear scheduling. …”
Get full text
Article -
2896
Early Remaining Useful Life Prediction for Lithium-Ion Batteries Using a Gaussian Process Regression Model Based on Degradation Pattern Recognition
Published 2025-06-01“…The model hyperparameters are further optimized through the particle swarm optimization (PSO) algorithm to improve the adaptability and generalization capability of the predictive models. …”
Get full text
Article -
2897
Hybrid Denoising Algorithm for Architectural Point Clouds Acquired with SLAM Systems
Published 2024-12-01“…The sudden development of systems capable of rapidly acquiring dense point clouds has underscored the importance of data processing and pre-processing prior to modeling. This work presents the implementation of a denoising algorithm for point clouds acquired with LiDAR SLAM systems, aimed at optimizing data processing and the reconstruction of surveyed object geometries for graphical rendering and modeling. …”
Get full text
Article -
2898
Revocation encryption scheme based on domestic cryptographic algorithm SM9
Published 2025-05-01“…To address the limitations of lengthy system public keys and inefficient decryption in existing identity-based revocation encryption schemes, an optimized revocation encryption scheme was proposed based on SM9, China’s independently developed identity-based cryptographic algorithm. …”
Get full text
Article -
2899
Assortment and promotion optimization in a retail chain
Published 2024-01-01“…Overall, the proposed model provides a valuable tool for chain stores to optimize their promotion and assortment strategies, and improve their market competitiveness.…”
Get full text
Article -
2900
Research on Semantic Segmentation Algorithm for Infrared Moving Targets in Complex Backgrounds
Published 2025-04-01“…Based on the publicly available target detection and tracking dataset, an infrared image semantic segmentation dataset is annotated and constructed. The STDC-Seg model is used to optimize the characteristics of infrared images, and an infrared target semantic segmentation algorithm STDC-Infrared is proposed. …”
Get full text
Article