-
3981
Robust mesh generation for electromagnetic models with geometric defects through node alignment and mesh boolean operations
Published 2025-07-01“…Abstract This paper presents a mesh fault-tolerant repair algorithm tailored to address common geometric issues inherent in electromagnetic models. …”
Get full text
Article -
3982
Multi task detection method for operating status of belt conveyor based on DR-YOLOM
Published 2025-06-01“…The results show that compared to mainstream single detection algorithms, DR-YOLOM multi task detection algorithm has better comprehensive detection ability, and this algorithm can ensure high target recognition accuracy, segmentation accuracy, and appropriate inference speed with a small number of parameters. …”
Get full text
Article -
3983
A Vision-Based End-to-End Reinforcement Learning Framework for Drone Target Tracking
Published 2024-10-01“…This framework focuses on controlling the drone to follow a moving target while maintaining a specific distance. VTD3 is a pure vision-based tracking algorithm which integrates the YOLOv8 detector, the BoT-SORT tracking algorithm, and the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. …”
Get full text
Article -
3984
Web service discovery method based on semantic expansion
Published 2007-01-01“…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
Get full text
Article -
3985
Exploration of indoor environment perception and design model based on virtual reality technology
Published 2025-04-01“…(a) Error changes before applying filtering algorithms. (b) Error changes after applying filtering algorithms.…”
Get full text
Article -
3986
EXTRAPOLATION BY ATTRACTION METHOD FOR IDENTIFICATION OF TRACKS AND PLOTS IN SYSTEM OF SECONDARY RADAR INFORMATION PROCESSING
Published 2019-06-01“…One of the main problems in the secondary radar information processing (trace-while-scan) is the correct identification of sensed plots with corresponding tracks of targets being tracked by extrapolated marks. …”
Get full text
Article -
3987
Web service discovery method based on semantic expansion
Published 2007-01-01“…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
Get full text
Article -
3988
Efficient multiplication for finite fields of p characteristic
Published 2009-01-01“…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
Get full text
Article -
3989
Dynamic pilot assignment in massive MIMO system based on user classification
Published 2017-09-01“…Aiming at the problem of pilot contamination in massive MIMO system,a dynamic pilot assignment strategy based on user classification was proposed.The target cell user was divided into the central user and the edge user based on the variance of target cell user signal intensity.The central user used the maximum C/I algorithm to assign pilots to maximize the channel capacity of the central user.The edge user used greedy algorithm to assign pilots to improve the signal to interference and noise ratio of each edge user.Simulation results show that the proposed strategy can improve the channel capacity of the system while improving the signal to interference and noise ratio of the edge user.…”
Get full text
Article -
3990
Program Complex for Calculation and Optimization of the Regimes of Electric Power Systems
Published 2003-04-01“…The possibilities of modem computers have permitted to apply more advanced algorithms. The algorithm of regime calculations is based on the modified New- ton-Raphson method. …”
Get full text
Article -
3991
Real-Time Optimally Adapting Meshes: Terrain Visualization in Games
Published 2008-01-01“…One of the main challenges encountered by interactive graphics programmers involves presenting high-quality scenes while retaining real-time frame rates on the hardware. …”
Get full text
Article -
3992
Robust Multi-Sensor Fusion for Localization in Hazardous Environments Using Thermal, LiDAR, and GNSS Data
Published 2025-03-01“…To evaluate the algorithm, we conduct a field test in an urban environment using a vehicle equipped with the appropriate sensor suite while simulating an outage one at a time, to demonstrate the approach’s effectiveness under real-world conditions.…”
Get full text
Article -
3993
FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack
Published 2023-12-01“…Federated learning (FL) can push the limitation of “Data Island” while protecting data privacy has been a broad concern. …”
Get full text
Article -
3994
Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images
Published 2025-08-01“…Grayscale images offer advantages in terms of storage and algorithm efficiency, while RGB images provide broader color diversity and versatile applications. …”
Get full text
Article -
3995
Adaptive dimensionality reduction for neural network-based online principal component analysis.
Published 2021-01-01“…This requires to update both the principal components and the dimensionality in every timestep. While the continuous update of the principal components is widely studied, the available algorithms for dimensionality adjustment are limited to an increment of one in neural network-based and incremental PCA. …”
Get full text
Article -
3996
Differentiable architecture search-based automatic modulation recognition for multi-carrier signals
Published 2024-09-01“…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
Get full text
Article -
3997
Non-Holonomic Mobile Manipulator Obstacle Avoidance with Adaptive Prioritization
Published 2025-04-01“…A series of examples are proposed in simulation using Matlab and analyzed to show how the algorithm works if the obstacle interferes with the manipulator or the base. …”
Get full text
Article -
3998
Reliable Process Tracking Under Incomplete Event Logs Using Timed Genetic-Inductive Process Mining
Published 2025-03-01“…Experimental results using real-world event logs from a health service in Indonesia demonstrate that TGIPM achieves higher fitness, precision, and generalization compared to the sequential approach, while slightly compromising simplicity. Moreover, the TGIPM algorithm exhibits lower computational cost and more effectively captures parallelism, making it particularly suitable for large and incomplete datasets. …”
Get full text
Article -
3999
An Improved Large Neighborhood Search for Network-Level Airport Slot Allocation Optimization
Published 2025-01-01“…Validated through an extensive case study involving 4,695 requests across six hub airports, the algorithm achieves solutions within a 1.7% optimality gap while reducing computation time by up to 64%.…”
Get full text
Article -
4000
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
Get full text
Article