Showing 301 - 320 results of 2,363 for search 'integration construction algorithm', query time: 0.10s Refine Results
  1. 301

    Research on the Visual SLAM Algorithm for Unmanned Surface Vehicles in Nearshore Dynamic Scenarios by Yanran Zhang, Lan Zhang, Qiang Yu, Bowen Xing

    Published 2025-03-01
    “…Additionally, the ELAS algorithm computes disparity maps, integrating depth information and dynamic object information to construct a static dense map. …”
    Get full text
    Article
  2. 302

    Routing Algorithm for Power Communication Networks Based on Serivce Differentiated Transmission Requirements by Songping XUE, Dequan GAO, Ziyan ZHAO, Yuqian LIN, Zejing GUANG, Dawei ZHANG

    Published 2024-11-01
    “…Implemented through the TensorFlow framework, this algorithm has been rigorously validated in a simulation environment constructed using OpenAI Gym. …”
    Get full text
    Article
  3. 303

    A chaotic digital signature algorithm based on a dynamic substitution box by Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Miguel Gabriel Villarreal-Cervantes

    Published 2025-01-01
    “…This proposal induces chaotic behavior in the signature, making it highly sensitive to any changes in the signer’s private key or message content, thereby enhancing authentication and integrity verification. Moreover, the proposed algorithm computes a single multiplicative modular inverse during verification and none during signing, unlike other approaches that require inverse computation in both stages. …”
    Get full text
    Article
  4. 304
  5. 305

    Belt conveyor idler fault detection algorithm based on improved YOLOv5 by Cen Pan, Qing Tao, Hao Pei, Biao Wang, Wei Liu

    Published 2025-01-01
    “…Experimental results demonstrate that the enhanced YOLOv5 algorithm achieves a 95.3% mAP on the self-constructed infrared image dataset, surpassing the original algorithm by 2.7%. …”
    Get full text
    Article
  6. 306

    Consensus-Based Power System State Estimation Algorithm Under Collaborative Attack by Zhijian Cheng, Guanjun Chen, Xiao-Meng Li, Hongru Ren

    Published 2024-10-01
    “…In order to describe such attack behaviors, the denial of service (DoS) attack model for hybrid remote terminal unit (RTU) and phasor measurement unit (PMU) measurements, and the false data injection (FDI) attack model for neighboring estimation information, are constructed. By integrating these two types of attack models, a different consensus-based distributed estimator is designed to accurately estimate the state of the power system under collaborative attacks. …”
    Get full text
    Article
  7. 307

    Collaborative filtering recommendation algorithm based on hybrid clustering and user preferences fusion by Ma Tian, Yu Benguo, Zhang Jing, Song Wenai, Jing Yu

    Published 2022-04-01
    “…Problems such as low recommendation efficiency and recommendation quality to be improved generally exist in the traditional collaborative filtering recommendation algorithm. In order to improve and solve these problems, the collaborative filtering recommendation algorithm integrates mixed clustering with user interests and preferences, and the recommendation quality has been significantly improved after verification. …”
    Get full text
    Article
  8. 308

    Image target importance recognition method based on visual model and correlation algorithm by Z. Ren, L. Huo, T. Shen, F. Kong

    Published 2025-07-01
    “…This paper proposes a vision model-based approach for image object relevance analysis, aiming to evaluate inter-object correlations in images by integrating scene knowledge graphs with target relevance analysis.First, we systematically conduct ontological modeling of urban scenes to construct a cityscape knowledge graph. …”
    Get full text
    Article
  9. 309

    Active collision avoidance method for automated vehicles based on fuzzy PID algorithm by Lu Chen

    Published 2025-07-01
    “…Therefore, an active collision avoidance method for automated vehicles based on a fuzzy Proportional – integral – derivative (PID) algorithm is proposed. …”
    Get full text
    Article
  10. 310

    Object Tracking Algorithm Based on Multi-Layer Feature Fusion and Semantic Enhancement by Jing Wang, Yanru Wang, Dan Yuan, Yuxiang Que, Weichao Huang, Yuan Wei

    Published 2025-06-01
    “…The TransT object tracking algorithm, built on Transformer architecture, effectively integrates deep feature extraction with attention mechanisms, thereby enhancing the stability and accuracy of the algorithm. …”
    Get full text
    Article
  11. 311

    Structural Simulation Model Updating Based on Improved MCMC Algorithm and Surrogate Model by MIAO Ji, DUAN Liping, LIU Jiming, LIN Siwei, ZHAO Jincheng

    Published 2025-08-01
    “…To enhance the accuracy of finite element model simulation, a model updating method based on Bayesian theory is proposed, and the updating efficiency is improved by integrating improved Markov chain Monte Carlo (MCMC) algorithm and surrogate model. …”
    Get full text
    Article
  12. 312

    Optimizing firefighting resilience in airports through genetic algorithms and decision-making frameworks by Yulong Zhu, Wei Tian, Xuhong Jia, Quanyi Liu

    Published 2025-06-01
    “…Specifically, we analyze the resilience characteristics of airport firefighting systems, which can be subdivided into four dimensions: stability capability, resistance capability, recovery capability, and adaptability capability. Furthermore, by integrating human, mechanical, environmental, and managerial elements, a comprehensive resilience evaluation indicator system is constructed. …”
    Get full text
    Article
  13. 313

    YOLO-DLHS-P: A Lightweight Behavior Recognition Algorithm for Captive Pigs by Changhua Zhong, Hao Wu, Junzhuo Jiang, Chaowen Zheng, Hong Song

    Published 2024-01-01
    “…Firstly, the C2f-DRB structure is introduced at the Backbone position, and the sizeable convolutional kernel is used to extend the receptive field to enhance the spatial perception ability of the model, and to enhance the network’s ability to capture spatial information while maintaining the number of learnable parameters and computational efficiency; The LSKA attention mechanism is then introduced to be integrated into the SPPF module to construct the SPPF-LSKA structure, which significantly improves the ability of the SPPF module to aggregate features at multiple scales; Then, the downsampling at the Neck position is optimised to the HWD algorithm, which reduces the spatial resolution of the feature map while retaining more useful information and reduces the uncertainty of the information compared with the downsampling method of the baseline model; finally, the Shape-IoU is used to replace the original CIoU, which significantly improves the detection efficiency and accuracy of the model without increasing the extra computational burden. …”
    Get full text
    Article
  14. 314

    Remote Irrigation Control Based on LoRa Technology and Fuzzy PID Algorithm by Yuliang Li

    Published 2025-01-01
    “…Due to the dual challenges of limited communication distance and insufficient adaptability to complex environments in remote irrigation control technology, this study combines Long Range Radio (LoRa) technology and Proportional-Integral-Derivative (PID) algorithm to construct a remote irrigation control system and improve the intelligence of irrigation modes. …”
    Get full text
    Article
  15. 315

    Application of Improved Whale Algorithm to Optimize Dephosphorization Process Parameters in Converter Steelmaking by Congrui Wu, Yueping Kong

    Published 2025-04-01
    “…This study addresses process parameter optimization challenges in converter steelmaking by proposing an improved multi-objective whale optimization algorithm (IMOWOA) that synergistically integrates metallurgical thermodynamics with data-driven modeling. …”
    Get full text
    Article
  16. 316

    Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making by Vadim Tynchenko, Alexander Lomazov, Vadim Lomazov, Dmitry Evsyukov, Vladimir Nelyub, Aleksei Borodulin, Andrei Gantimurov, Ivan Malashin

    Published 2024-11-01
    “…Zadeh’s theory of linguistic variables, the methodology integrates expert analysis, linguistic variables, and a continuous genetic algorithm to predict membership function parameters. …”
    Get full text
    Article
  17. 317

    An improved air conditioner label defect detection algorithm based on SURF features by Huizi ZHOU, Yuelin LIU, Qing LIU, Jianwu LI

    Published 2025-06-01
    “…Firstly,SURF algorithm was used to extract features from the image,and the product quantization theory was used to construct search trees. …”
    Get full text
    Article
  18. 318

    LE-YOLO: A Lightweight and Enhanced Algorithm for Detecting Surface Defects on Particleboard by Chao He, Yongkang Kang, Anning Ding, Wei Jia, Huaqiong Duo

    Published 2025-07-01
    “…Current algorithms for surface defect detection in particleboard often encounter limitations such as high computational complexity and excessive parameter scale. …”
    Get full text
    Article
  19. 319

    Heat Pump Temperature Trajectory Planning Algorithm for Bus Voltage Sag Suppression by Yangyang ZHAO, Lan LIU, Wei ZHAO, Shuang ZENG, Anqi LIANG, Hanqiu WANG, Kai MA

    Published 2023-05-01
    “…Therefore, this paper proposes a temperature trajectory planning algorithm that can suppress transient dc bus voltage sag. …”
    Get full text
    Article
  20. 320

    Graph Knowledge-Enhanced Iterated Greedy Algorithm for Hybrid Flowshop Scheduling Problem by Yingli Li, Biao Zhang, Kaipu Wang, Liping Zhang, Zikai Zhang, Yong Wang

    Published 2025-07-01
    “…The proposed algorithm addresses the trade-off between the finite solution space corresponding to solution representation and the search space for the optimal solution, as well as constructs a decision mechanism to determine which search operator should be used in different search stages to minimize the occurrence of futile searching and the low computational efficiency caused by individuals conducting unordered neighborhood searches. …”
    Get full text
    Article