Suggested Topics within your search.
Suggested Topics within your search.
-
741
Joint beamforming and cooperative jamming for secure transmission in multi-antenna decode-and-forward relaying sensor networks: A greedy switching strategy
Published 2017-05-01“…In particular, based on Charnes–Cooper transformation and S-procedure, semi-definite programming is constructed to solve the robust cooperative beamforming and jamming with a low implementation complexity, respectively. …”
Get full text
Article -
742
Research on a Density-Based Clustering Method for Eliminating Inter-Frame Feature Mismatches in Visual SLAM Under Dynamic Scenes
Published 2025-01-01“…Visual SLAM relies on the motion information of static feature points in keyframes for both localization and map construction. Dynamic feature points interfere with inter-frame motion pose estimation, thereby affecting the accuracy of map construction and the overall robustness of the visual SLAM system. …”
Get full text
Article -
743
A Detection Method for Open–Close States of High-Voltage Disconnector in Smoky Environments
Published 2025-02-01“…Firstly, a feature extraction method using sliced point clouds is employed to construct edge features of the conductive arm. Building upon this foundation, an open–close position identification method based on edge pre-processing is employed to obtain the final measurement results. …”
Get full text
Article -
744
Discovery Latency Analysis of Ultra-Dense Internet-of-Things Networks
Published 2025-01-01“…Our mathematical model constructs a Markov chain model that implements the impacts of packet collisions and duplication on discovery latency. …”
Get full text
Article -
745
An Improved Multi-Threshold Clutter Filtering Algorithm for W-Band Cloud Radar Based on K-Means Clustering
Published 2024-12-01“…Utilizing W-band millimeter-wave cloud and fog radar data collected from March to July 2023 in the Qingdao area, a dataset of cloud and fog echo of different types was constructed and statistically analyzed. Subsequently, a multi-threshold clutter filtering method was proposed to identify and eliminate abnormal interferences such as noise spikes, radial interference, and suspended matter clutter. …”
Get full text
Article -
746
Identification of lesion location and discrimination between benign and malignant findings in thyroid ultrasound imaging
Published 2024-12-01“…Abstract Thyroid nodules are a common thyroid disorder, and ultrasound imaging, as the primary diagnostic tool, is susceptible to variations based on the physician’s experience, leading to misdiagnosis. This paper constructs an end-to-end thyroid nodule detection framework based on YOLOv8, enabling automatic detection and classification of nodules by extracting grayscale and elastic features from ultrasound images. …”
Get full text
Article -
747
End-to-End Intelligent Fault Diagnosis of Transmission Bearings in Electric Vehicles Based on CNN
Published 2024-10-01“…The time-domain vibration signal of the transmission bearing is converted into a continuous two-dimensional numerical matrix, and a two-dimensional CNN model is constructed through network structure optimization. …”
Get full text
Article -
748
General Inverse Problem Solution for Two-Level Systems and Its Application to Charge Transfer
Published 2024-09-01“…Using vector algebra and recently developed strategies for generating solvable two-level Hamiltonians, we construct the general solution to the inverse problem for a spin in a time-dependent magnetic field and its extension to any two-level system associated with fictitious spin and field. …”
Get full text
Article -
749
Investigation and Improvement of Inconsistency in Surface-Form Measurement Results Due to Difference of Incident Direction of Measuring Light in Abramson-Type Oblique-Incident Inte...
Published 2025-06-01“…To avoid the overcrowding of the interference fringes caused by the reduction in the incident angle of the measuring light, an oblique-incident interferometer with a near-infrared laser was constructed. …”
Get full text
Article -
750
Object Reconstruction Using the Binomial Theorem for Ghost Imaging
Published 2018-01-01“…In our method, images with low-level noise can be generated by constructing a binomial formula using high-order imaging results that are acquired by reintroducing the reconstruction result back into the imaging formula repeatedly. …”
Get full text
Article -
751
Similar Instances Reuse Based Numerical Control Process Decision Method for Prismatic Parts
Published 2025-01-01“…Then, the framework of the proposed approach is illustrated, which explains four significant steps: similar subpart instances retrieval, optimal target function construction, PSD establishment, and NC process scheme optimization. …”
Get full text
Article -
752
Investigation on the motion and fragmentation mechanism of rockfall based on PIV-seismic signal monitoring
Published 2025-01-01“…A plexiglass panel construction is utilized to fabricate a physical test platform featuring complex slope surface geometry. …”
Get full text
Article -
753
Analysis of the Rights and Obligations of Stakeholders in China’s National Park Concession System
Published 2025-02-01“…Following the principle of equality of stakeholders’ rights and obligations, this research aims to provide a comprehensive theoretical and practical framework to guide ongoing research and the systematic construction of China’s national park concession system.MethodsThis research is designed to investigate the overarching and universal challenges associated with the establishment of the national park concession system in China. …”
Get full text
Article -
754
A Note on the Dynamics of Modified rf-SQUIDs: Simulations and Possible Control over Oscillations
Published 2025-02-01“…The so-call SQUIDs (abbreviated from superconducting quantum interference device) are very sensitive apparatuses especially built for metering very low magnetic fields. …”
Get full text
Article -
755
Dynamic Positioning and Optimization of Magnetic Target Based on Binocular Vision
Published 2025-07-01“…This method detects the spatial coordinates of the magnetic target in real time through the binocular camera, extracts the target center to construct a unified reference system of the measurement platform, and uses MATLAB simulation to analyze the influence of different target layouts on the scanning stability and positioning accuracy. …”
Get full text
Article -
756
Topic adversarial neural network for cross-topic cyberbullying detection
Published 2025-06-01“…It leverages adversarial training to disentangle topic-related information while retaining universal linguistic cues relevant to harmful content. We construct a multi-topic dataset from major Chinese social media platforms, such as Weibo and Tieba, to evaluate the generalization performance of TANN in real-world scenarios. …”
Get full text
Article -
757
Object Detection Method of Inland Vessel Based on Improved YOLO
Published 2025-03-01“…Firstly, the CAA attention module is introduced into the Backbone network, and the C2f_CAA module is constructed at the same time to enhance the features of the central region and improve the understanding ability of complex scenes. …”
Get full text
Article -
758
Micro-expression spotting based on multi-modal hierarchical semantic guided deep fusion and optical flow driven feature integration
Published 2025-04-01“…Specifically, to obtain cross-modal complementary information, this scheme sequentially constructs a Multi-Scale Feature Extraction Module (MFEM) and a Multi-scale hierarchical Semantic-Guided Fusion Module (MSGFM). …”
Get full text
Article -
759
METRIC: Multiple preferences learning with refined item attributes for multimodal recommendation
Published 2025-05-01“…Prior research typically utilizes multimodal data to construct item graphs, often overlooking the nuanced details within the data. …”
Get full text
Article -
760
Improved Variational Mode Decomposition Based on Scale Space Representation for Fault Diagnosis of Rolling Bearings
Published 2025-06-01“…In concrete, the approach constructs a scale space by computing the inner product between the signal’s Fourier spectrum and a Gaussian function, and then identifies both the mode number and initial center frequencies through peak detection, ensuring more accurate and stable decomposition. …”
Get full text
Article