-
861
PMD-Transformer: A Domain Generalization Approach for Person Re-Identification
Published 2025-01-01“…Domain generalization person re-identification (DG-ReID) aims to address the performance degradation caused by domain shift between the training domain and unseen target domains. …”
Get full text
Article -
862
Selection Seeder with a Robotic Cassette Loading Device Mounted on Self-Propelled Chassis
Published 2025-03-01“…Additionally a diagram and an operational algorithm for the robotic carousel-type cassette loading device are presented. …”
Get full text
Article -
863
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Published 2025-03-01“…The proposed method uses keys derived from the Lorentz attractor for diffusion and a 16-bit Linear Feedback Shift Register (LFSR) for pseudo-random confusion. …”
Get full text
Article -
864
A Time-Segmented SAI-Krylov Subspace Approach for Large-Scale Transient Electromagnetic Forward Modeling
Published 2025-05-01“…The Arnoldi algorithm is used to construct the orthogonal basis for the Krylov subspace, and the preconditioned conjugate gradient (PCG) method is applied to solve large-scale linear equations. …”
Get full text
Article -
865
A Portable Smartphone-Based 3D-Printed Biosensing Platform for Kidney Function Biomarker Quantification
Published 2025-03-01“…The sensor relies on colorimetric analysis, where a reagent reacts with blood serum to produce a color shift proportional to the biomarker concentration. …”
Get full text
Article -
866
Efficient automated detection of power quality disturbances using nonsubsampled contourlet transform & PCA-SVM
Published 2025-05-01“…The NSCT's multiscale, multidirectional, and shift-invariant properties enable the decomposition of signals into transient and oscillatory components. …”
Get full text
Article -
867
A skipping spectrum sensing scheme based on deep reinforcement learning for transform domain communication systems
Published 2024-12-01“…By assigning different weights to balance sensing overhead and spectrum utilization while reducing conflicts, the algorithm’s adaptability and performance are improved. …”
Get full text
Article -
868
Individual tree segmentation of airborne and UAV LiDAR point clouds based on the watershed and optimized connection center evolution clustering
Published 2023-07-01“…Here, we propose a new individual tree segmentation method, which couples the classical and efficient watershed algorithm (WS) and the newly developed connection center evolution (CCE) clustering algorithm in pattern recognition. …”
Get full text
Article -
869
-
870
A robust approach to satellite image encryption using chaotic map and circulant matrices
Published 2024-12-01“…This study presents an improved satellite image encryption technique that combines the cryptographic strength of the circulant matrix in the Hill cipher with the dynamic characteristics of the hyperbolic tangent tent map, further enhanced by the Kronecker XOR product. The algorithm initiates with computing alterations by a shift amount. …”
Get full text
Article -
871
A Confidential Transmission Method for High-Speed Power Line Carrier Communications Based on Generalized Two-Dimensional Polynomial Chaotic Mapping
Published 2025-07-01“…A high-speed power line carrier communication network is established using a power line carrier routing algorithm based on the minimal connected dominating set. …”
Get full text
Article -
872
Technical study on the efficiency and models of weed control methods using unmanned ground vehicles: A review
Published 2025-12-01“…The effectiveness of UGVs for weed control is hinged on the accuracy of their navigation and weed detection technologies, which are influenced heavily by environmental conditions, including lighting, weather, uneven terrain, and weed and crop density. Also, there is a shift from using traditional machine learning (ML) algorithms to deep learning neural networks, including convolutional neural networks (CNNs) and recurrent neural networks (RNNs), for weed detection algorithm development due to their potential to work in complex environments. …”
Get full text
Article -
873
An LDPC Encoder Architecture With Up to 47.5 Gbps Throughput for DVB-S2/S2X Standards
Published 2022-01-01“…However, due to the large block size, most of the architectures proposed so far use Random Access Memory (RAM) to store and update the encoding results, and the delay caused by address-controlled read and write operations and barrel shift during computation inevitably limits the upper bound of encoder throughput. …”
Get full text
Article -
874
Re-conceptualizing trafficking-in-persons victimization using latent class analysis: Results from a community study in Cape Town, South Africa
Published 2025-01-01“…We conclude by calling for a shift from a binary prosecutorial definition to a dimensional approach of identifying trafficking, guided by the understanding that such risks exist on a spectrum influenced by one's experience of human trafficking exploitation, and behavioral and social environment.…”
Get full text
Article -
875
Experimental Demonstration of 73 Gb/s QPSK and 150 Gb/s QAM-32 Wireless Data Links in the Sub-THz Band Through Frequency Selective Surface Filters
Published 2025-01-01“…Measurement results for the EVM are predicted through an innovative use of the k-means algorithm which is here suitably modified to deal with FSS-based communications. …”
Get full text
Article -
876
A Metaheuristic Framework for Cost-Effective Renewable Energy Planning: Integrating Green Bonds and Fiscal Incentives
Published 2025-05-01“…However, accurately assessing the economic feasibility of NCRES projects requires methodologies that account for policy-driven incentives and financing mechanisms. To support the shift towards NCRES, evaluating their financial viability while considering public policies and funding options is important. …”
Get full text
Article -
877
A Simple Blind Sampling Frequency Offset Estimation Scheme for Short-Reach DD-OFDM Systems
Published 2020-01-01“…After extracting subcarriers of OFDM symbols from multiple OFDM frames, the phase shift is obtained by the fourth-power algorithm, and the obtained results are averaged to perform phase estimation. …”
Get full text
Article -
878
Cross-Cultural Sense-Making of Global Health Crises: A Text Mining Study of Public Opinions on Social Media Related to the COVID-19 Pandemic in Developed and Developing Economies
Published 2025-01-01“…In total, 284,512 posts from Italy, 261,978 posts from the United Kingdom, and 209,725 posts from Egypt were analyzed using the latent Dirichlet allocation algorithm to identify key thematic topics and track shifts in discourse across time and regions. …”
Get full text
Article -
879
Enhanced Multiphase Interleaved Boost Converter Interface for Grid-Connected PV Power System
Published 2024-01-01“…The suggested converter regulates the input and output power by modulating the phase shift in the pulse width modulation (PWM) technique using the maximum power point tracking (MPPT) algorithm via two closed feedback loops, one for a slower external loop and the other for a faster PWM control internal loop, similar to current mode control. …”
Get full text
Article -
880
Semantics of visual models in space research
Published 2022-04-01“…In order to achieve the goal, a criterion for classifying visual models as complex and an algorithm for obtaining a gradient image with several levels of density were introduced. …”
Get full text
Article