-
101
An M-DeepSORT Algorithm for Pedestrian Detection and Tracking Based on Video Images – A Case Study in Ji-nan Subway Station
Published 2025-03-01“…Experimental results affirm the effectiveness of the proposed algorithm in detecting, tracking and statistically analysing subway station corridor passenger flow trajectories, demonstrating robust performance in diverse subway station scenarios.…”
Get full text
Article -
102
WTI-SLAM: a novel thermal infrared visual SLAM algorithm for weak texture thermal infrared images
Published 2025-04-01“…Abstract This study addresses the challenges of robotic localization and navigation in visually degraded environments, such as low illumination and adverse weather conditions, by proposing a novel thermal infrared visual SLAM (Simultaneous Localization and Mapping) algorithm. The research introduces a new infrared visual odometry that integrates feature-based methods with optical flow techniques, enhancing image processing capabilities to mitigate the issues of high time overhead and cumulative errors in traditional feature-based odometry. …”
Get full text
Article -
103
Enhanced Flow Rate-Based Queuing Discipline for Contention Avoidance in SD-WANs
Published 2025-01-01Get full text
Article -
104
An Adaptive Threshold-Based Pixel Point Tracking Algorithm Using Reference Features Leveraging the Multi-State Constrained Kalman Filter Feature Point Triangulation Technique for D...
Published 2025-04-01“…Monocular visual–inertial odometry based on the MSCKF algorithm has demonstrated computational efficiency even with limited resources. …”
Get full text
Article -
105
Overcoming Fairness and Latency Challenges in BBR With an Adaptive Delay Detection
Published 2025-01-01“…In this paper, we introduce a modification to BBR, termed BBR Refined (BBR-R), which enhances throughput fairness among diverse RTT flows and lowers queuing delays. By targeting the underlying causes of unfairness, BBR-R adaptively adjusts delay detection intervals to clear queues in the bottleneck link buffer while preserving link utilization. …”
Get full text
Article -
106
Vision-Based Damage Detection Method Using Multi-Scale Local Information Entropy and Data Fusion
Published 2025-01-01“…Low-spatial-resolution measurements from contact sensors and excessive measurement noise have impeded the implementation of vibration-based damage detection. To tackle these challenges, we propose a novel vision-based damage detection method combining multi-scale signal analysis theory and data fusion algorithm. …”
Get full text
Article -
107
Research on Leak Detection and Localization Algorithm for Oil and Gas Pipelines Using Wavelet Denoising Integrated with Long Short-Term Memory (LSTM)–Transformer Models
Published 2025-04-01“…Additionally, the model can detect leaks exceeding 0.6% of the main pipeline flow without generating false alarms during operation.…”
Get full text
Article -
108
-
109
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
110
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
111
Software defined data center network with hybrid routing
Published 2016-04-01“…SHR differentiate data flows by statistical calculat nt flows utilize the adap-tive routing algorithm while the mice flows use the oblivious routing algorithm. …”
Get full text
Article -
112
A Miniaturized and Intelligent Lensless Holographic Imaging System With Auto-Focusing and Deep Learning-Based Object Detection for Label-Free Cell Classification
Published 2024-01-01“…Cell detection and classification is a key technique for disease diagnosis, but conventional methods such as optical microscopy and flow cytometry have limitations in terms of field-of-view (FOV), throughput, cost, size, and operation complexity. …”
Get full text
Article -
113
Automated polymorphic worm signature generation approach based on seed-extending
Published 2014-09-01Get full text
Article -
114
-
115
-
116
Efficacy of artificial intelligence-based FFR technology for coronary CTA stenosis detection in clinical management of coronary artery disease: a systematic review
Published 2025-07-01“…This review synthesizes recent developments in AI-based FFR technology for coronary stenosis detection via CCTA, focusing on AI-assisted quantitative coronary CTA (AI-QCT), deep learning algorithms, and their applications in three-dimensional coronary reconstruction and hemodynamic simulation. …”
Get full text
Article -
117
Validation of Taylor’s Frozen Hypothesis for DAS-Based Flow
Published 2025-06-01“…This study provides innovative methods and experimental basis for non-intrusive flow detection using DAS.…”
Get full text
Article -
118
Capture of microexpressions based on the entropy of oriented optical flow
Published 2017-11-01“…This paper proposes an algorithm that is effective in detecting the key frame of microexpression based on the entropy of oriented optical flow. …”
Get full text
Article -
119
Application of optical flow method in metro train speed measurement
Published 2022-03-01“…The results show that the improved optical flow algorithm based on image pyramid can improve the accuracy of optical flow estimation under large displacement, and the optical flow parallel calculation based on GPU can effectively improve the optical flow calculation speed and meet the real-time requirements of metro speed measurement system. …”
Get full text
Article -
120
Preliminary Results in the Investigation of In Vivo Iliac and Coronary Flow Collision, Vortex Formation, and Disorganized Flow Degeneration: Insights from Invasive Cardiology Based...
Published 2024-09-01“…Additionally, in two sub-studies, we analyzed the relationship between retrograde flow and blood pressure, and artificial intelligence algorithms were used to detect the retrograde flow in the right coronary artery. …”
Get full text
Article