-
5561
ON FPGA BASED ACCELERATION OF IMAGE PROCESSING IN MOBILE ROBOTICS
Published 2015-12-01“…In this paper, an FPGA assisted acceleration of image processing is considered to overcome limitations of computational resources available on-board and to enable high processing speeds while it may lower the power consumption of the system. …”
Get full text
Article -
5562
Research on lightweight malware classification method based on image domain
Published 2025-03-01“…This mechanism guided the model to focus on more informative features, while depthwise separable convolution further reduced the number of model parameters. …”
Get full text
Article -
5563
Enhancing Robust Adaptive Dynamic Positioning of Full-Actuated Surface Vessels: Reinforcement Learning Approach for Unknown Hydrodynamics
Published 2025-05-01“…Simulations are carried out to evaluate the superiority and feasibility of the proposed algorithm.…”
Get full text
Article -
5564
Edge caching strategy based on multi-agent deep reinforcement learning in cloud-edge-end scenarios
Published 2025-06-01“…On this basis, aiming to maximize cumulative rewards, a multi-agent deep reinforcement learning algorithm based on edge caching strategy was proposed. …”
Get full text
Article -
5565
Calculating Percentiles of <i>T</i>-Distribution Using Gaussian Integration Method
Published 2025-04-01“…The results show that the percentiles of the <i>t</i>-distribution are accurately estimated using the algorithm developed in this study.…”
Get full text
Article -
5566
An importance viral factors in the etiopathogenesis and in treatment selection otitis media with effusion in children
Published 2011-12-01“…Inclusion antiviral drug into the OME treatment algorithm decreases terms of patient¢s treatment.…”
Get full text
Article -
5567
THE DEVELOPMENT OF STATE AND PUBLIC MANAGEMENT OF EDUCATION THROUGH PROFESSIONAL ASSESSMENT OF INNOVATIVE ACTIVITY
Published 2015-07-01“…The process approach was used while designing the model; the algorithm of professional-public assessment of innovation activity is described.Practical significance. …”
Get full text
Article -
5568
Two-Step Adaptive Target Detection Scheme Using Beam-Steering FMCW Radar Sensors
Published 2024-11-01“…Furthermore, to verify the effectiveness of the proposed algorithm, high-resolution target detection experiments were conducted using a 24-GHz FMCW radar, while complexity reduction was evaluated in terms of the required memory size.…”
Get full text
Article -
5569
Modification of the Pitch Curve Design Defect of Non-circular Gear based on Spline Interpolation Method
Published 2018-01-01“…The results indicate that design deficiency such as pitch curve for high-order Achimedean spiral gear pair can be amended quickly by the algorithm,while it is exactly.…”
Get full text
Article -
5570
Transfer learning based feature selection for feedforward neural network for speech emotion classifier
Published 2025-04-01“…This technique allowed us to significantly reduce initial feature vector size while increasing models’ prediction quality. We used TESS and RAVDESS datasets to estimate the performance of proposed method. …”
Get full text
Article -
5571
Convolutional neural network for gesture recognition human-computer interaction system design.
Published 2025-01-01“…Empirical findings demonstrate that our approach surpasses the accuracy achieved by most lightweight network models on publicly available datasets, all while maintaining real-time gesture interaction capabilities. …”
Get full text
Article -
5572
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“…The IDAOA serves as a wrapper-based feature selection method, optimizing the identification of the most impactful features while balancing local exploration and global exploitation. …”
Get full text
Article -
5573
Design approach for optimization of a piston ring profile considering mixed lubrication
Published 2016-12-01“…Abstract To reduce the friction of a piston ring while maintaining a large oil film load-carrying capacity, an approach comprising of the inverse method and the sequential quadratic programming algorithm was proposed. …”
Get full text
Article -
5574
Design of Asymmetrical Relay Resonators for Maximum Efficiency of Wireless Power Transfer
Published 2016-01-01“…The capacitance of the second resonator to nth resonator and the load resistance should be determined for maximum efficiency while the capacitance of the first resonator and the source resistance are obtained for the impedance matching. …”
Get full text
Article -
5575
Non-singular terminal super-twitsing control of servo systems with backlash
Published 2025-02-01“…Finally, the effectiveness of the proposed control algorithm is verified by simulation.…”
Get full text
Article -
5576
Vision transformer-enhanced thermal anomaly detection in building facades through fusion of thermal and visible imagery
Published 2025-07-01“…The thermal anomaly detection of building facades is critically important for the evaluation and upkeep of structures. While conventional methods are effective in numerous instances, their capability to discern flaws in complex environments is constrained. …”
Get full text
Article -
5577
Comparison of Probabilistic Chain Graphical Model-Based and Gaussian Process-Based Observation Selections for Wireless Sensor Scheduling
Published 2011-10-01“…It leads to a tradeoff between making a fewer number of observations for saving energy while obtaining sufficient and more valuable sensing information. …”
Get full text
Article -
5578
Design of nodes importance assessment method for complex network based on neighborhood information
Published 2024-03-01“…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
Get full text
Article -
5579
Automatisierte Identifikation und Lemmatisierung historischer Berufsbezeichnungen in deutschsprachigen Datenbestände...
Published 2022-03-01“…In order to reduce manual effort, an algorithm for the automated lemmatization of historical, German-language occupational data is developed. …”
Get full text
Article -
5580
Unveiling connectivity patterns of railway timetables through complex network theory and Infomap clustering.
Published 2025-01-01“…This study introduces a novel framework for analysing railway timetable connectivity through complex network theory and the Infomap clustering algorithm. By transforming timetable data into network representations, we systematically assess the connectivity and efficiency of the Norwegian railway system for the 2024 and projected 2033 scenarios. …”
Get full text
Article