-
1141
Optimized YOLOv8 framework for intelligent rockfall detection on mountain roads
Published 2025-04-01“…To enable efficient detection, this study proposes a rockfall detection system based on embedded technology and an improved Yolov8 algorithm, termed Yolov8-GCB. The algorithm enhances detection performance through the following optimizations: (1) integrating a lightweight DeepLabv3+ road segmentation module at the input stage to generate mask images, which effectively exclude non-road regions from interference; (2) replacing Conv convolution units in the backbone network with Ghost convolution units, significantly reducing model parameters and computational cost while improving inference speed; (3) introducing the CPCA (Channel Priori Convolution Attention) mechanism to strengthen the feature extraction capability for targets with diverse shapes; and (4) incorporating skip connections and weighted fusion in the Neck feature extraction network to enhance multi-scale object detection. …”
Get full text
Article -
1142
Using 'sentinel' plants to improve early detection of invasive plant pathogens.
Published 2023-02-01Get full text
Article -
1143
A Novel Two-Stage Learning-Based Phase Unwrapping Algorithm via Multimodel Fusion
Published 2025-01-01“…To solve this problem, this paper combines a deep neural network model with the traditional PhU model and proposes a novel two-stage learning-based phase unwrapping (TLPU) algorithm via multimodel fusion. The major advantages of TLPU are as follows: 1) A high-resolution U-Net (HRU-Net) model trained on a dataset constructed according to InSAR interferometric geometry is utilized for the PhU for the first time, which effectively improves the performance of the DLPU. 2) TLPU utilizes the traditional PhU method to optimize the results of DLPU, addressing the issue of weak generalization ability of a single DLPU, while improving accuracy in areas with large-gradient changes. …”
Get full text
Article -
1144
Application of the joint clustering algorithm based on Gaussian kernels and differential privacy in lung cancer identification
Published 2025-05-01“…The algorithm enhances cancer detection while ensuring data privacy. …”
Get full text
Article -
1145
Multiuser computation offloading for edge-cloud collaboration using submodular optimization
Published 2020-10-01“…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
Get full text
Article -
1146
Development and Comparison of Interrupt-Based and Analog-to-Digital Converter Algorithms for Seed Counting in Precision Planters
Published 2024-12-01“…Correspondingly, unique circuits were engineered for each algorithm.To enhance the sensitivity of the sensor while simplifying the circuit's complexity and dimensions, the lm324 Op-Amp was used in the interrupt-based sensor circuit. …”
Get full text
Article -
1147
Optimizing Feature Selection for IOT Intrusion Detection Using RFE and PSO
Published 2025-06-01“…RFE notably improved kNN and DT accuracy, while SVM showed consistent results regardless of the feature of selection. …”
Get full text
Article -
1148
RIS-assisted terahertz frequency band vehicle network capacity optimization
Published 2023-10-01“…In order to alleviate the spectrum scarcity and capacity limitation of the current wireless system, the terahertz frequency band was introduced and the reconfigurable intelligent surface (RIS) was used for auxiliary communication to construct a downlink vehicle network.Considering the constraints of limited total system power, QoS constraints of cellular mobile users, and randomness constraints of vehicle and user locations, a hybrid optimization model was established for optimal power allocation and optimal deployment of RIS with the aim of maximizing the total rate of vehicle users.Based on the balance method, linear transformation method, and element elimination method, the original NP-hard problem was transformed into a convex optimization problem with complex correlation constraints and multivariate coupling.The inner layer iteration was based on the Lagrange multiplier method to solve the optimal power allocation, and the outer layer iteratively solved the optimal deployment of RIS based on a improved genetic algorithm.The simulation results show that rationally deploying the number and distribution density of RIS nodes based on optimal power allocation can save costs while achieving a higher target total capacity.…”
Get full text
Article -
1149
Optimal Computation Offloading Decisions Based on System Utility and Cost Balance
Published 2025-01-01“…Based on the new evaluation model, an objective function is constructed to minimize the system’s cost-utility ratio, and an improved particle swarm optimization algorithm with enhanced search capabilities is proposed to solve it by designing a computation offloading strategy. …”
Get full text
Article -
1150
Improved RRT*-Connect Manipulator Path Planning in a Multi-Obstacle Narrow Environment
Published 2025-04-01“…This paper proposes an improved RRT*-Connect algorithm (IRRT*-Connect) for robotic arm path planning in narrow environments with multiple obstacles. …”
Get full text
Article -
1151
Dimensionality Reduction Optimization of High Subsonic Unmanned Aerial Vehicles Intake
Published 2025-05-01“…Among them, sensitivity analysis is suitable for dimensionality reduction with a clear optimization objective, while PCA is more suitable for dimensionality reduction in multi-objective optimization.…”
Get full text
Article -
1152
Dynamic Coal Flow-Based Energy Consumption Optimization of Scraper Conveyor
Published 2025-06-01“…The multi-objective optimization model for energy consumption is solved using the NSGA-II-ARSBX algorithm, yielding a 33.7% reduction in energy consumption, while the lump coal area is reduced by 27.7%, indicating a trade-off between energy efficiency and coal fragmentation. …”
Get full text
Article -
1153
Optimized Offloading in Vehicular Edge Computing: A Game Theoretic Analysis
Published 2025-01-01Get full text
Article -
1154
Optimization Research of the Hinge Position and Output Speed of Electromechanical Erection Device
Published 2021-08-01“…The optimum match relation between the output speed and the hinge position is got. It can improve work efficiency, make space layout of the whole device optimal and make the installation space the best compact.…”
Get full text
Article -
1155
Reliability-Based Optimization of Impeller Structure Using Exponential Function Approximation
Published 2025-06-01“…The results indicate that the proposed method can provide significantly improved computational efficiency while maintaining optimization accuracy comparable to that obtained by traditional double-loop optimization methods. …”
Get full text
Article -
1156
Low Complexity Optimized AOR Method for Massive MIMO Signal Detection
Published 2025-01-01“…To address these challenges, we introduce an improved variant of traditional accelerated over-relaxation (AOR) called an optimized AOR (OAOR) signal detector. …”
Get full text
Article -
1157
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
1158
Explorative Binary Gray Wolf Optimizer with Quadratic Interpolation for Feature Selection
Published 2024-10-01“…Therefore, feature selection becomes an essential preprocessing stage, aimed at reducing the dimensionality of the dataset by selecting the most informative features while improving classification accuracy. This paper proposes a novel binary Gray Wolf Optimization algorithm to address the feature selection problem in classification tasks. …”
Get full text
Article -
1159
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01Get full text
Article -
1160
Assessment of Urban Water Supply System Based on Query Optimization Strategy
Published 2018-01-01“…As a complicated water treatment system project, an urban water supply plays a significant role in enhancing ecological civilization construction, promoting social-economic sustainable development, and improving the living environment of humans. This paper has the goal of improving water treatment efficiency and reducing water treatment cost based on comparative studies by applying two types of distributed database query optimization methods, including the system for a distributed database (SDD-1) and all reduction algorithms. …”
Get full text
Article