-
181
A BP-Neural-Network-Based PID Control Algorithm of Shipborne Stewart Platform for Wave Compensation
Published 2024-11-01“…Then, the BP-PID control algorithm was designed based on the joint space control. …”
Get full text
Article -
182
Medical Image Segmentation Algorithm Based on Optimized Convolutional Neural Network-Adaptive Dropout Depth Calculation
Published 2020-01-01“…This model better addresses the problem of the weak generalizability of deep learning models. Based on the above ideas, this paper proposes a medical image segmentation algorithm based on an optimized convolutional neural network with adaptive dropout depth calculation. …”
Get full text
Article -
183
Research on automatic processing system of financial information in colleges and universities based on NLP-KG fusion algorithm
Published 2025-12-01“…The existing mechanisms ensure security and privacy from multiple aspects: access control (using multi-factor identity authentication and role-based permission management), data encryption (SSL/TLS encryption protocol and AES algorithms are used for transmission and storage, respectively), data backup and recovery (regular backup, off-site storage, and recovery drills), audit and monitoring (detailed recording of operations and real-time monitoring of network traffic, etc.). …”
Get full text
Article -
184
Examining the Impact of Distance-Based Similarity Metrics on the Performance of Projected Clustering Algorithm for Fingerprint Database Clustering
Published 2025-01-01“…The projected clustering (PROCLUS) algorithm is a subspace clustering algorithm based on the k-medoids clustering approach. …”
Get full text
Article -
185
A Novel Black Widow Optimization Algorithm Based on Lagrange Interpolation Operator for ResNet18
Published 2025-06-01“…In response to this, we propose a black widow optimization algorithm based on Lagrange interpolation (LIBWONN) to optimize the learning rate of ResNet18. …”
Get full text
Article -
186
-
187
-
188
Retrieval of cloud fraction using machine learning algorithms based on FY-4A AGRI observations
Published 2024-11-01“…Random forest (RF) and multilayer perceptron (MLP) algorithms were used in this paper to retrieve the cloud fraction of AGRI (Advanced Geosynchronous Radiation Imager) on board the Fengyun-4A (FY-4A) satellite based on its full-disk level-1 radiance observation. …”
Get full text
Article -
189
A Fine-Grained Aircraft Target Recognition Algorithm for Remote Sensing Images Based on YOLOV8
Published 2025-01-01“…This article addresses the issues of missed and false detections in existing aircraft target fine-grained recognition algorithms for remote sensing images by proposing an improved algorithm based on YOLOv8, called FD-YOLOv8 (Focus Detail-YOLOv8). …”
Get full text
Article -
190
Intelligent recognition algorithm and application of coal mine overhead passenger device based on multiscale feature fusion
Published 2024-12-01“…The YOLOv8n single-stage object detection algorithm was used as the baseline model, and a coal mine cmopd intelligent recognition algorithm based on multi-scale feature fusion was proposed.In the image preprocessing stage, adaptive histogram equalization was employed to enhance image quality, and random rectangle masking was applied to simulate real scenarios where cmopd is occluded by underground objects during operation. …”
Get full text
Article -
191
Energy-Efficient Computation Offloading and Resource Allocation in SWIPT-Based MEC Networks
Published 2025-01-01“…We also propose a three-part alternative optimization algorithm framework based on the categories of optimization variables. …”
Get full text
Article -
192
Teaching Internal Medicine Residents to Critically Appraise the Role of Race in Pulmonary Function Testing
Published 2025-02-01Get full text
Article -
193
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
Published 2008-01-01“…A sort algorithm based on token and a sort algorithm based on weighted roles synthesis were presented in allusion to the problem of multi-roles and multi-users sequence constraint in the process of executing tasks. …”
Get full text
Article -
194
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01“…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
Get full text
Article -
195
The intelligent lift: Artificial Intelligence's growing role in plastic surgery - a comprehensive review
Published 2025-08-01Get full text
Article -
196
-
197
Multicellular model of neuroblastoma proposes unconventional therapy based on multiple roles of p53.
Published 2024-12-01Get full text
Article -
198
-
199
An Improved Human Evolution Optimization Algorithm for Unmanned Aerial Vehicle 3D Trajectory Planning
Published 2025-01-01“…To address the challenges of slow convergence speed, poor convergence precision, and getting stuck in local optima for unmanned aerial vehicle (UAV) three-dimensional path planning, this paper proposes a path planning method based on an Improved Human Evolution Optimization Algorithm (IHEOA). …”
Get full text
Article -
200