Suggested Topics within your search.
Suggested Topics within your search.
-
5441
-
5442
-
5443
Hybrid TDOA/DOA Multiple PD Localization Using Two Arrays With KPCA-mnc-FastICA and Sparrow Search Algorithm
Published 2025-01-01“…To tackle the problem of slow calculation speed, this article explores a combined method of hybrid TDOA/DOA positioning model and sparrow search algorithm (SSA) with two arrays which is sufficient to meet the requirement of multiple PD localization. …”
Get full text
Article -
5444
-
5445
-
5446
A model adapted to predict blast vibration velocity at complex sites: An artificial neural network improved by the grasshopper optimization algorithm
Published 2025-06-01“…Through a comprehensive evaluation of the running time results, the root mean square error (RMSE), mean absolute error (MAE), and determination coefficient (R2), a new algorithm, the grasshopper optimization algorithm (GOA), which is suitable for optimizing an ANN to predict PPV, is obtained. …”
Get full text
Article -
5447
ADS-YOLO: A Multi-Scale Feature Extraction Remote Sensing Image Object Detection Algorithm Based on Dilated Residuals
Published 2025-01-01“…Object detection in remote sensing images is of significant research value in fields such as environmental monitoring and urban planning. …”
Get full text
Article -
5448
-
5449
Main control factors affecting mechanical oil recovery efficiency in complex blocks identified using the improved k-means algorithm.
Published 2021-01-01“…Taking an oil production block in the Daqing Oilfield as the research object, the k-means and improved algorithm are used to analyse the main control factors influencing mechanical production efficiency. …”
Get full text
Article -
5450
Expediency Analysis of Clustering Algorithms for Electric Two-Wheeler Driving Cycle Development Under Indian Smart City Driving Conditions
Published 2024-01-01“…Then, the Calinski Harabasz index (CHI), Davies-Bouldin index (DBI), and silhouette score are used to assess the homogeneity and completeness of selected clustering algorithms in the data cluster. Overall, the E2WUDC is developed using X-means which is selected as a suitable clustering algorithm based on the performance indices. …”
Get full text
Article -
5451
Extreme gradient boosting algorithm based urban daily traffic index prediction model: a case study of Beijing, China
Published 2023-09-01“…Based on long-term historical TPI data, this research proposed a daily dimensional road network TPI prediction model by using an extreme gradient boosting algorithm (XGBoost). …”
Get full text
Article -
5452
A Study on the Establishment of a Variable Stiffness Physical Model of Abdominal Soft Tissue and an Interactive Massage Force Prediction Algorithm
Published 2025-05-01“…This research focuses on the crucial issue of ascertaining safe and suitable massage forces for abdominal massage robots. …”
Get full text
Article -
5453
-
5454
-
5455
Computationally Enhanced UAV-Based Real-Time Pothole Detection Using YOLOv7-C3ECA-DSA Algorithm
Published 2025-01-01“…Despite these limitations, the research significantly advances real-time pothole detection by striking an optimal balance between computational efficiency and detection accuracy. …”
Get full text
Article -
5456
Establishing a differential diagnosis model between primary membranous nephropathy and non-primary membranous nephropathy by machine learning algorithms
Published 2024-12-01“…Context Four algorithms with relatively balanced complexity and accuracy in deep learning classification algorithm were selected for differential diagnosis of primary membranous nephropathy (PMN).Objective This study explored the most suitable classification algorithm for PMN identification, and to provide data reference for PMN diagnosis research.Methods A total of 500 patients were referred to Luo-he Central Hospital from 2019 to 2021. …”
Get full text
Article -
5457
-
5458
-
5459
-
5460
Artificial intelligence-driven cybersecurity: enhancing malicious domain detection using attention-based deep learning model with optimization algorithms
Published 2025-07-01“…Owing to the significant part of the domain name system (DNS), detailed research has been performed to detect malicious fields according to their unique behaviour, which is considered in dissimilar stages of the DNS life cycle queries and explanations. …”
Get full text
Article