Showing 201 - 220 results of 42,430 for search '"algorithm"', query time: 0.19s Refine Results
  1. 201

    Time Window Characteristics in a Heuristic Algorithm for a Full-Truck Vehicle Routing Heuristic Algorithm in An Intermodal Context by Wisute Ongcunaruk, Pornthipa Ongkunaruk, Gerrit Janssens

    Published 2025-06-01
    “…The results of the experimental runs of the algorithm are statistically analysed to identify under which conditions of concentration and specialization an effect on the cost can be identified. …”
    Get full text
    Article
  2. 202
  3. 203

    A Hybrid Algorithm Based on a Modified Sine Cosine Algorithm and Least Square and Its Application to Microwave Imaging by Meng Wang, Guizhen Lu

    Published 2021-01-01
    “…First, the proposed algorithm improves the search path of the traditional sine cosine algorithm, which obtains better global search capability. …”
    Get full text
    Article
  4. 204
  5. 205
  6. 206

    Carrier-independent deep optical watermarking algorithm by Hao CHEN, Feng WANG, Weiming ZHANG, Nenghai YU

    Published 2022-08-01
    “….), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the "projecting-shooting" process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.…”
    Get full text
    Article
  7. 207

    Image Defogging Algorithm Based on Sparse Representation by Di Fan, Xinyun Guo, Xiao Lu, Xiaoxin Liu, Bo Sun

    Published 2020-01-01
    “…Aiming at the problems of low contrast and low definition of fog degraded image, this paper proposes an image defogging algorithm based on sparse representation. Firstly, the algorithm transforms image from RGB space to HSI space and uses two-level wavelet transform extract features of image brightness components. …”
    Get full text
    Article
  8. 208

    Survey of Autonomous Vehicles’ Collision Avoidance Algorithms by Meryem Hamidaoui, Mohamed Zakariya Talhaoui, Mingchu Li, Mohamed Amine Midoun, Samia Haouassi, Djamel Eddine Mekkaoui, Abdelkarim Smaili, Amina Cherraf, Fatima Zahra Benyoub

    Published 2025-01-01
    “…The primary collision avoidance algorithms currently employed by self-driving cars are examined in this thorough survey. …”
    Get full text
    Article
  9. 209
  10. 210

    A Calibration Algorithm for Microelectromechanical Inertial Sensors by Nguyen Trong Yen, Nguyen Quoc Khanh, Ha Manh Thang

    Published 2022-09-01
    “…An algorithm for determining the calibration parameters of sensors regardless of the initial alignment of the sensor sensitive axes relative to a reference system was developed. …”
    Get full text
    Article
  11. 211

    Doubly Constrained Robust Blind Beamforming Algorithm by Xin Song, Jingguo Ren, Qiuming Li

    Published 2013-01-01
    “…The simulation results confirm the superiority of the proposed algorithm on beampattern control and output SINR enhancement.…”
    Get full text
    Article
  12. 212

    Genetic algorithm for parameter optimization of supercapacitor model. by Filipe Menezes, Sérgio Cunha, William Assis, Allan Manito, Reinaldo Leite, Thiago Soares, Hugo Lott

    Published 2025-01-01
    “…For the optimal adjustment of the electrical circuit model parameters, a Genetic Algorithm (GA) is used. The response of the electrical circuit, adjusted by the Genetic Algorithm (GA), is then compared to the response obtained through computer simulation of a supercapacitor using PSIM software, which is a software well validated in such studies. …”
    Get full text
    Article
  13. 213
  14. 214
  15. 215

    Algorithm of automatic control system of hydraulic excavator by R. Y. Sukharev, A. V. Starostin

    Published 2017-08-01
    “…There is presented the algorithm of automation of working process of hydraulic excavator in this article, that allows to dig trenches automatically and also the design scheme of the working equipment of hydraulic excavator in the working plane.…”
    Get full text
    Article
  16. 216

    Research on Collision Detection Algorithm of Dual Manipulator by Jianchun Liu, Kun Qin, Yanfeng Lin, Zian Liu

    Published 2021-01-01
    “…In order to ensure the safety of dual manipulator in public space, an accurate and efficient collision detection algorithm is proposed. The sphere and capsule bounding boxes are used to simplify the manipulator model, and the collision is judged according to the intersection between the bounding boxes. …”
    Get full text
    Article
  17. 217
  18. 218
  19. 219

    Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems by Riyam Noori Jawad, Faez Hassan Ali

    Published 2020-06-01
    Subjects: “…Ant Colony Optimization (ACO), Cryptanalysis, Genetic Algorithm (GA), Shrinking Generator, Stream Cipher.…”
    Get full text
    Article
  20. 220

    Opportunities and challenges of multidisciplinary algorithmic impact assessments by Juana Catalina Becerra Sandoval, Felicia Jing, Adriana Alvarado Garcia, Sara E. Berger, Heloisa Candello, Caitlin Lustig

    Published 2025-12-01
    “…However, the evaluation of computational and algorithmic systems has largely been approached through a uni-modal and uni-disciplinary perspective that heavily privileges computer science and engineering disciplines. …”
    Get full text
    Article