Search alternatives:
direction » detection (Expand Search)
Showing 561 - 580 results of 962 for search 'low direction algorithm', query time: 0.15s Refine Results
  1. 561

    A Truncated Singular Value Decomposition Enhanced Nested Complex Source Beam Method by Lianning Song, Zaiping Nie

    Published 2017-01-01
    “…Furthermore, the translation matrices are obtained according to the beam width of CSBs. Due to the high directivity of the radiation patterns of CSBs, all the far-field related interaction matrices are low-ranked. …”
    Get full text
    Article
  2. 562

    A three-dimensional reconstruction method of coal mine tunnel fused with LiDAR and IMU by Qinghua MAO, Jianquan CHAI, Yanzhang CHEN, Xusheng XUE, Chuanwei WANG

    Published 2025-02-01
    “…The results show that the error percentage of each area of the indoor corridor model constructed by the proposed algorithm in the directions of length, width and height was within 1.2%. …”
    Get full text
    Article
  3. 563

    Data Cooperative Distribution Mechanism of Internet of Vehicles Using D2D Technology by Xuejuan Chen, Gaofeng Chu

    Published 2022-01-01
    “…Existing communication technologies can no longer meet the demands of high mobility, low latency, high reliability, and massive streaming data distribution faced by IoV in the future. …”
    Get full text
    Article
  4. 564

    A statistical method for high-throughput emergence rate calculation for soybean breeding plots based on field phenotypic characteristics by Yan Sun, Mengqi Li, Meiling Liu, Jingyi Zhang, Yingli Cao, Xue Ao

    Published 2025-03-01
    “…Due to the influence of environmental factors, the existing methods have shortcomings, such as low throughput, low efficiency, and insufficient precision. …”
    Get full text
    Article
  5. 565

    Application of microscopic smartphone attachment for remote preoperative lab testing by Kefan Song, Kefan Song, Alexander T. Adams, Alexander T. Adams

    Published 2024-11-01
    “…Future enhancements, including wider field-of-view, adjustable magnification, more advanced and integrated algorithms as well as integration with a microfluidic channel for direct sample analysis, are proposed to expand the device’s functionality. …”
    Get full text
    Article
  6. 566

    Extraction of exact symbolic stationary probability formulas for Markov chains with finite space with application to production lines. Part I: description of methodology by Konstantinos S. Boulas, Georgios D. Dounias, Chrissoleon T. Papadopoulos

    Published 2025-07-01
    “…In the context of an inverted graph, implementing a suitable algorithm for forming spanning trees, such as the Gabow and Myers algorithm, is imperative. …”
    Get full text
    Article
  7. 567

    Design of a Conveyer Trough Bolt Signal Acquisition System and Bayesian Ensemble Identification Method for Working State by Yi Lian, Bangzhui Wang, Meiyan Sun, Kexin Que, Sijia Xu, Zhong Tang, Zhilong Huang

    Published 2025-04-01
    “…Finally, after comparing machine learning algorithms, Support Vector Machine was chosen for its superior performance. …”
    Get full text
    Article
  8. 568

    Presenting a Fuzzy Multiobjective Mathematical Model of the Reverse Logistics Supply Chain Network in the Automotive Industry to Reduce Time and Energy by Saeed Aminpour, Alireza Irajpour, Mehdi Yazdani, Ali Mohtashami

    Published 2023-01-01
    “…To continue the competition, the manufacturers of the leading car equipment should strive for better product quality by continuously improving their production processes, directing the production of greenhouse gases with low carbon levels, and increasing sustainability. …”
    Get full text
    Article
  9. 569

    Thermal Radiation Transport with Tensor Trains by Alex A. Gorodetsky, Patrick D. Mullen, Aditya Deshpande, Joshua C. Dolence, Chad D. Meyer, Jonah M. Miller, Luke F. Roberts

    Published 2025-01-01
    “…The algorithm, following a step-then-truncate approach of a traditional discrete ordinates method, operates directly on the compressed state vector, thereby enabling large speedups for low-rank solutions. …”
    Get full text
    Article
  10. 570

    Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks by Haipeng Qu, Guojia Hou, Ying Guo, Ning Wang, Zhongwen Guo

    Published 2013-04-01
    “…Because of the limitations of LSARSSI, we put forward an improved algorithm named ILSARSSI. Our scheme uses only one location-known anchor which is useful in low density environment without using additional hardware. …”
    Get full text
    Article
  11. 571

    Hazardous Gas Emission Monitoring Based on High-Resolution Images by Wenjian Chen, Yi Wang, Xuan Li, Wei Gao, Shiwei Ma, Yuanyuan Duan, Xiaopeng Shao

    Published 2018-01-01
    “…Particularly, multiple dictionary pairs were trained according to the gradient features of samples, and one optimal pair of dictionaries was chosen to reconstruct by judging the weighting of the information in different directions. Furthermore, the K-means singular value decomposition algorithm was used to train the dictionaries and the orthogonal matching pursuit algorithm was employed to calculate the sparse coding coefficients. …”
    Get full text
    Article
  12. 572

    ST-YOLO: A defect detection method for photovoltaic modules based on infrared thermal imaging and machine vision technology. by Hanfei Xie, Baoxi Yuan, Chengyu Hu, Yujie Gao, Feng Wang, Chunlan Wang, Yuqian Wang, Peng Chu

    Published 2024-01-01
    “…To address the shortcomings of existing photovoltaic defect detection technologies, such as high labor costs, large workloads, high sensor failure rates, low reliability, high false alarm rates, high network demands, and slow detection speeds of traditional algorithms, we propose an algorithm named ST-YOLO specifically for photovoltaic module defect detection. …”
    Get full text
    Article
  13. 573

    Spatial–degree of freedom improvement of interference alignment in multi-input, multi-output interference channels by Yi-bing Li, Xue-ying Diao, Qian-hui Dong

    Published 2017-01-01
    “…To improve the achievable degree of freedom in the K -user interference network, we propose a rank minimization interference minimization algorithm. Unlike the existing methods concentrating on the promotion of degree of freedom, our rank optimization method works directly with the interference matrix rather than its projection using the receive beamformers. …”
    Get full text
    Article
  14. 574

    Adaptive MCS selection and resource planning for energy-efficient communication in LTE-M based IoT sensing platform. by Nhu-Ngoc Dao, Minho Park, Joongheon Kim, Sungrae Cho

    Published 2017-01-01
    “…However, LTE-M may not be optimally exploited for directly supporting such low-data-rate devices in terms of energy efficiency since it depends on core technologies of LTE that are originally designed for high-data-rate services. …”
    Get full text
    Article
  15. 575

    Time-Triggered Task Offloading Scheduling in TSN-Based Edge Computing Power Networks by Hongrui Nie, Yang Wu, Weifeng Zhu, Jinzuo Zhong, Hang Yang, Yu Zhou

    Published 2025-01-01
    “…Subsequently, we establish the correlation between tasks using Directed Acyclic Graph (DAG) and design a matching and load balancing-based task offloading algorithm (MLB-TOA). …”
    Get full text
    Article
  16. 576

    Basis Recovery Method for Ionospheric Delay Corrections in PPP-RTK Model with Recommendations for Interpolation Reference Station Number Selection by Siyao Wang, Runzhi Zhang, Rui Tu, Lihong Fan, Xiaochun Lu

    Published 2025-06-01
    “…Under normal conditions (terrain is relatively flat and the atmospheric conditions are inactive) where reference stations are approximately evenly distributed in all directions, and using low-order surface interpolation model, for networks with 50 km spacing, four or five reference stations are recommended, while for 100 km networks, six or seven stations are enough to calculate precise corrections. …”
    Get full text
    Article
  17. 577

    Identity-Based Online/Offline Encryption Scheme from LWE by Binger Zuo, Jiguo Li, Yichen Zhang, Jian Shen

    Published 2024-09-01
    “…In addition, devices with limited computing power are becoming increasingly common in practice, making it increasingly important to improve the efficiency of online computation of encryption algorithms. The classic solution is to directly improve the efficiency of the Gaussian sampling algorithm, thereby increasing the overall efficiency of the scheme. …”
    Get full text
    Article
  18. 578

    Extending Conflict-Based Search for Optimal and Efficient Quadrotor Swarm Motion Planning by Zihao Wang, Zhiwei Zhang, Wenying Dou, Guangpeng Hu, Lifu Zhang, Meng Zhang

    Published 2024-11-01
    “…SL-CBS is a two-layer search algorithm: (1) The low-level search utilizes an improved state lattice. …”
    Get full text
    Article
  19. 579

    Retrieving Inland Water Quality Parameters via Satellite Remote Sensing: Sensor Evaluation, Atmospheric Correction, and Machine Learning Approaches by Mohsen Ansari, Anders Knudby, Meisam Amani, Michael Sawada

    Published 2025-05-01
    “…Machine learning models have limitations, including low generalizability, low dimensionality, spatial/temporal autocorrelation, and information leakage. …”
    Get full text
    Article
  20. 580

    Deep Learning-Based Sound Source Localization: A Review by Kunbo Xu, Zekai Zong, Dongjun Liu, Ran Wang, Liang Yu

    Published 2025-07-01
    “…These directions aim to propel SSL toward intelligent systems characterized by high precision, strong robustness, and low power consumption. …”
    Get full text
    Article