Suggested Topics within your search.
Suggested Topics within your search.
-
11981
An effective method for the abnormal monitoring of stage performance based on visual sensor network
Published 2018-04-01Get full text
Article -
11982
Automatic Fall Risk Detection Based on Imbalanced Data
Published 2021-01-01“…We assess not only different imbalanced data handling methods but also different machine learning algorithms. After oversampling on our training data, the K-Nearest Neighbors (KNN) algorithm achieves the best performance. …”
Get full text
Article -
11983
Deep Learning Method for Wetland Segmentation in Unmanned Aerial Vehicle Multispectral Imagery
Published 2024-12-01“…We present an enhanced semantic segmentation algorithm designed for UAV MS imagery, which incorporates thermal infrared (TIR) data to improve segmentation outcomes. …”
Get full text
Article -
11984
A Framework for Human Activity Recognition Based on WiFi CSI Signal Enhancement
Published 2021-01-01“…Finally, an activity segmentation algorithm was proposed to detect the start and end time of activity. …”
Get full text
Article -
11985
Advanced fault diagnosis in industrial robots through hierarchical hyper-laplacian priors and singular spectrum analysis
Published 2025-05-01“…In addition, the HHLP algorithm can identify harmonic interference, periodical impulses, and noise, with maximal posterior probabilities compared to the other algorithms. …”
Get full text
Article -
11986
Enhancing IoT Connectivity through Advanced Scheduling at 142 GHz Sub-THz in 5G and Beyond Networks
Published 2025-07-01“…In this paper, we will introduce the latest developments in scheduling algorithms for 5G-IoT networks and their impact. Next, we propose a new scheduling algorithm aligned with IoT applications need. …”
Get full text
Article -
11987
Intelligent controller design of an autonomous system using a social spider optimizer for path navigation and obstacle avoidance
Published 2024-10-01“…This research paper proposes a hybrid fuzzy logic controller for achieving autonomous path navigation and obstacle avoidance through the use of the Social Spider Optimizer algorithm. …”
Get full text
Article -
11988
Real-Time Parameter Control for Trajectory Generation Using Reinforcement Learning With Zero-Shot Sim-to-Real Transfer
Published 2024-01-01“…Research on trajectory generation algorithms for unmanned ground vehicles (UGVs) has been actively conducted due to the rapid increase in their use across various fields. …”
Get full text
Article -
11989
Optimization strategies for public health education based on ISSA and information system technology
Published 2025-05-01Get full text
Article -
11990
An Efficient Method for Generating a Super-Sized and Heterogeneous Pore-Throat Network Model of Rock
Published 2025-01-01Get full text
Article -
11991
Integration of Regression-Based Guidance Ant for Enhanced Exploration and Convergence in Ant Colony Optimization (ACO)
Published 2025-01-01“…Traditional Ant Colony Optimization (T-ACO) algorithms often face challenges in dynamic environments, particularly the tendency to become trapped in local minima, resulting in suboptimal path planning. …”
Get full text
Article -
11992
Development and observation of a three-dimensional scanning coaxial Mie lidar for dynamic monitoring of near-surface aerosol plumes
Published 2024-09-01“…To meet the observation requirements of near-surface aerosols, an aerosol inversion algorithm combining the Fernald and Klett methods was designed and developed. …”
Get full text
Article -
11993
The Evolution of the Idiolect over the Lifetime: A Quantitative and Qualitative Study of French 19th Century Literature
Published 2022-09-01“…After applying a feature selection algorithm, we examined the most important features, i.e. the motifs that have the greatest influence on idiolectal evolution. …”
Get full text
Article -
11994
Enhancing Stock Portfolio Selection with Trapezoidal Bipolar Fuzzy VIKOR Technique with Boruta-GA Hybrid Optimization Model: A Multicriteria Decision-Making Approach
Published 2025-01-01“…The Boruta-GA approach combines the advantages of the Genetic Algorithm (GA) and Boruta Optimization Algorithm (BOA) methods, implementing the comprehensive feature selection capability of Boruta to detect all relevant features and harnessing the strength of GA to bring about improvement within a wide range of datasets. …”
Get full text
Article -
11995
Maximum Butterfly Generators Search in Bipartite Networks
Published 2024-12-01“…Furthermore, an effective MBGS search algorithm is proposed. Extensive experiments on real-world networks with ground-truth communities and interesting case studies validated the effectiveness and efficiency of our MBGS model and algorithm.…”
Get full text
Article -
11996
PHOTOGRAMMETRIC METHOD OF OBTAINING A DIAGNOSTIC 3D MODEL OF THE JAW
Published 2023-03-01“…The algorithm consisted of 50 frame photographing of a plaster model. …”
Get full text
Article -
11997
-
11998
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article -
11999
High precision DOA estimation of microphone array for shipboard teleconferencing
Published 2022-03-01Get full text
Article -
12000