Suggested Topics within your search.
Suggested Topics within your search.
-
381
Detection of Welding Defects Using the YOLOv8-ELA Algorithm
Published 2025-05-01“…To address the issue of the low precision in detecting defects in aluminum alloy weld seam digital radiography (DR) images using the current target detection algorithms, a modified algorithm named YOLOv8-ELA based on YOLOv8 is proposed. …”
Get full text
Article -
382
Experimental Investigation of an Algorithmic Approach for Optimizing DAB Converter Design
Published 2024-11-01“…Subsequently, a lookup table is formulated to ensure efficient OBC operation across varying output power and current levels by optimizing the frequency as a single variable. …”
Get full text
Article -
383
Parameter Extraction for Photovoltaic Models with Flood-Algorithm-Based Optimization
Published 2024-12-01“…The FLA’s performance is systematically evaluated against nine recently developed optimization algorithms through comprehensive comparative and statistical analyses. …”
Get full text
Article -
384
A Novel Coverage Enhancement Algorithm for Image Sensor Networks
Published 2012-05-01“…Aimed at nonboundary nodes, based on potential field theory, it adopts paired tangent point repulsion mechanism, which attempts to obtain the optimal network sensing coverage through the multiple paired achievements between one current node and several target nodes. Combined with FVPTR, some algorithms such as LRBA, MBAA, and mixed superposition algorithm are put forward to single or multiple-time adjustment by the rotation of the direction angle. …”
Get full text
Article -
385
СONSTRUCTION AND THE ALGORITHM OPERATION OF THE LASER COMBINED FIRE DETECTOR
Published 2017-02-01“…The decision of the current objective is carried out using the proposed optical scheme of the dual-channel devices of smoke detection (for control of the radiation intensities scattered by smoke particles and passed through the smoke).The design and algorithm of the combined fire detector comprising a dual-channel laser device of smoke detection and carbon monoxide detector is developed.The results of the made detector tests indicate about its increased in comparison with the conventional single-channel point smoke fire detector sensitivity to various types of fumes and detection rate of fires. …”
Get full text
Article -
386
Energy Optimal Control Strategy of PHEV Based on PMP Algorithm
Published 2017-01-01“…Under the global voice of “energy saving” and the current boom in the development of energy storage technology at home and abroad, energy optimal control of the whole hybrid electric vehicle power system, as one of the core technologies of electric vehicles, is bound to become a hot target of “clean energy” vehicle development and research. …”
Get full text
Article -
387
A congestion prediction method based on trajectory mining algorithm
Published 2025-01-01“…To solve the problem, a new traffic congestion prediction method based on trajectory mining algorithm is proposed in this paper. In this method, traffic controllers can set a threshold for each road according to the current situation of the road. …”
Get full text
Article -
388
Unveiling the Efficacy of AI-based Algorithms in Phishing Attack Detection
Published 2024-06-01“…To verify the effectiveness of these algorithms an experiment is performed on two datasets. …”
Get full text
Article -
389
Examining the Efficiency of Learning-Based Algorithms in the Process of Declaring Customs
Published 2022-12-01“…Intelligent structures supported by current information technologies are needed to solve these problems. …”
Get full text
Article -
390
Methods and Algorithms for Decision-Making in Agro-Industrial Environmental Management
Published 2025-04-01Get full text
Article -
391
A systematic review: computer vision algorithms in drone surveillance
Published 2025-03-01“…This paper provides a comprehensive review of drone-based surveillance techniques, focusing on object detection and tracking algorithms, relevant datasets, and exploration strategies. …”
Get full text
Article -
392
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01“…Thus, a robust data foundation for multi-category detection was established. At the algorithmic design level, an improved GR (gated recurrent unit-random forest) algorithm model was proposed. …”
Get full text
Article -
393
HUMAN EMOTION RECOGNITION SYSTEM USING DEEP LEARNING ALGORITHMS
Published 2022-09-01“…Therefore, the purpose of the work is to find and optimize the most satisfactory in terms of accuracy algorithm for classifying human emotions based on facial images. …”
Get full text
Article -
394
Small-Target Detection Algorithm Based on STDA-YOLOv8
Published 2025-04-01“…Ablation and comparative experiments conducted on the proposed STDA-YOLOv8 model demonstrate that on the VisDrone dataset, its accuracy improved by 5.3% compared to YOLOv8, reaching 93.5%; on the PASCAL VOC dataset, its accuracy increased by 5.7% compared to YOLOv8, achieving 94.2%, outperforming current mainstream target detection models and small-target detection algorithms like QueryDet, effectively enhancing small-target detection capabilities.…”
Get full text
Article -
395
GIS vibration signal denoising algorithm based on SVD-IACMD
Published 2024-11-01“…However, the vibration signals of the GIS body are affected by the base vibration, measurement noise, and environmental noise, which leads to poor performance in on-site GIS vibration live detection and mechanical defect diagnosis. In response to the current situation, an on-site vibration signal denoising diagnosis algorithm based on the singular value decomposition (SVD)-improve adaptive chirp mode decomposition (IACMD) algorithm is proposed. …”
Get full text
Article -
396
From humans to algorithms: A sociotechnical framework of workplace surveillance
Published 2025-12-01“…Although existing surveillance frameworks acknowledge the role that social context plays in shaping the outcomes of surveillance, they overlook the impact organisational culture, leadership, management, and employees have on shaping its characteristics. Current frameworks also underplay the influence of digital technology and fail to account for the impact modern digital technologies, such as artificial intelligence algorithms, have on shaping the characteristics of surveillance. …”
Get full text
Article -
397
An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms
Published 2023-06-01Get full text
Article -
398
Design and experiment of landslide monitoring algorithm based on MEMS sensor
Published 2024-11-01“…Objective To address current engineering challenges such as poor stability and accuracy, limited coverage, and high costs associated with soil landslide displacement monitoring, a novel method based on microelectromechanical system (MEMS) sensor technology is proposed. …”
Get full text
Article -
399
Differential Protection of Main Transformer of Doubly-Fed Wind Farm Based on Current Synthesized Vector Trajectory Characteristics
Published 2025-02-01“…During the fault ride-through process of the doubly-fed wind farms, the short-circuit current provided by the wind farm side exhibits frequency deviation, which leads to errors in the Fourier algorithm based phasor extraction. …”
Get full text
Article -
400
Magnetic Moment Estimation Algorithm Based on Convolutional Neural Network
Published 2025-03-01“…The simulation results demonstrate that the proposed algorithm performs well in noise environments with a signal-to-noise ratio (SNR) greater than −5 dB. …”
Get full text
Article