Showing 361 - 380 results of 2,363 for search 'integration construction algorithm', query time: 0.12s Refine Results
  1. 361

    Multi-Source Data-Driven Terrestrial Multi-Algorithm Fusion Path Planning Technology by Xiao Ji, Peng Liu, Meng Zhang, Chengchun Zhang, Shuang Yu, Bing Qi, Man Zhao

    Published 2025-06-01
    “…This paper presents a multi-source data-driven hybrid path planning framework that integrates global A* search with local Deep Q-Network (DQN) optimization to address complex terrestrial routing challenges. …”
    Get full text
    Article
  2. 362

    GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm by Xiangqiang Kong, Guangmin Liu, Yanchen Gao

    Published 2025-05-01
    “…Second, the neck network employs the lightweight hybrid convolution GSConv. By integrating it with the VoV-GSCSP module, the Slim-neck structure is constructed. …”
    Get full text
    Article
  3. 363

    Fault localization for automatic train operation based on the adaptive error locating array algorithm by Yanpeng Zhang, Yuxiang Cao

    Published 2025-01-01
    “…The experimental results of ablation and comparison show that the Integrity, average Accuracy and average C-Evaluation of the proposed algorithm can reach up to 100%, 91.07% and 84.56% respectively. …”
    Get full text
    Article
  4. 364

    Cloud Computing Resource Scheduling Algorithm Based on Unsampled Collaborative Knowledge Graph Network by Haichuan Sun, Liang Gu, Chenni Dong, Xin Ma, Zeyu Liu, Zhenxi Li

    Published 2024-01-01
    “…Based on graph convolutional neural networks, analyze the target load of cloud platforms, construct multi hop data transmission paths one by one, and perform deep level information load balancing; Establish a multiplexing information transmission model, correct the initial weights of graph convolutional neural networks, combine reverse transmission calculation methods, integrate and balance cloud computing resources, and confirm the optimal resource scheduling plan; Integrating class convolution and human-machine interaction attention mechanism, the value of the previous time series neural unit is transferred to the current neural unit, and the classification output sequence of knowledge graph relational data feature fragments is analyzed. …”
    Get full text
    Article
  5. 365

    Prescription Recommendation Algorithm Based on Herbal Property-Driven Compatibility Mechanism Semantic Modeling by Geng Xueru, Zhang Jiantong, Luo Tao, Hou Jianchen, Tao Xiaohua

    Published 2025-01-01
    “…First, the analysis of prescriptions takes into account the herbal property categories, which are defined as entities when constructing the knowledge graph. Second, the algorithm integrates compatibility rules to model the interactions between symptoms and herbs with weighted connections. …”
    Get full text
    Article
  6. 366

    Multisource Heterogeneous Data Fusion Methods Driven by Digital Twin on Basis of Prophet Algorithm by Min Li

    Published 2025-01-01
    “…The article first used curve and sequence alignment to extract data features and then analyzed the trend of data changes using the Prophet algorithm. Afterward, this article constructed a digital twin model to provide analytical views and data services. …”
    Get full text
    Article
  7. 367
  8. 368

    Defects Detection in Screen-Printed Circuits Based on an Enhanced YOLOv8n Algorithm by Xinyu Zhang, Jia Wang, Dan Jiang, Yang Li, Xuewei Wang, Han Zhang

    Published 2025-05-01
    “…To address these challenges, a self-made SPC defect data set and an enhanced CAAB-YOLOv8n detection algorithm were developed. A CAD module was integrated into the backbone network to improve the model’s ability to detect bar-shaped features. …”
    Get full text
    Article
  9. 369
  10. 370

    Experiment study on UAV target detection algorithm based on YOLOv8n-ACW by Bo Xue, Bowen Zhang, Qin Cheng

    Published 2025-04-01
    “…Abstract To address the challenges associated with dense and occluded targets in small target detection utilizing unmanned aerial vehicle (UAV), we propose an enhanced detection algorithm referred as the YOLOv8n-ACW. Building upon the YOLOv8n baseline network model, we have integrated Adown into the Backbone and developed a CCDHead to further improve the drone’s capability to recognize small targets. …”
    Get full text
    Article
  11. 371

    Design of netted muskmelon digital twin growth model based on HMM+LSTM algorithm by LU Peng, LIU Mingtang, WU Shanshan, LI Bin, LI Shihao, WANG Changchun, YANG Yangrui, JIANG Enhui

    Published 2025-05-01
    “…The digital twin model was developed using 3ds Max for 3D modeling and Unity 3D for visualization, while the growth prediction model was built by integrating Hidden Markov Model (HMM) and Long Short-Term Memory (LSTM) algorithms. …”
    Get full text
    Article
  12. 372

    Research on lightweight tunnel cable fire recognition algorithm based on multi-scale features by Zimeng Liu, Lei Zhang, Huiqiang Ma, Xuebing Chen, Molin Zhang

    Published 2025-07-01
    “…In this study, a lightweight YOLO-v5 tunnel cable fire recognition algorithm with multiscale features is proposed. By replacing the YOLO-v5 backbone network, Darknet53, with Mobilenetv3-small and integrating the SimAM attention mechanism, the lightweight and detection speed of the network was improved. …”
    Get full text
    Article
  13. 373

    DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network by Peitao Cheng, Xuanjiao Lei, Haoran Chen, Xiumei Wang

    Published 2025-03-01
    “…As a computer vision task, object detection algorithms can be applied to various real-world scenarios. …”
    Get full text
    Article
  14. 374

    3D animation design image detail enhancement based on intelligent fuzzy algorithm by Pu Haitao, Pu Yuang

    Published 2025-01-01
    “…The image was divided into superpixel regions using SLIC (Simple Linear Iterative Clustering) algorithm, and local features such as texture, contrast, and edge intensity were extracted; in the SRGAN model, the generator improved image resolution through deep residual blocks and Convolutional Neural Network (CNN), while the discriminator optimized the generated image quality through adversarial training; at the same time, a Fuzzy Logic System (FLS) was constructed to dynamically adjust the image fuzzy degree; channel and spatial attention modules in the generator were integrated to enhance key area details. …”
    Get full text
    Article
  15. 375

    Facial recognition targeted attack algorithm based on multiscale frequency decomposition and meta-learning by CAI Jun, HUANG Tianqiang, ZHENG Aokun, YE Feng, XU Chao

    Published 2025-02-01
    “…Subsequently, a cycle-consistent generative adversarial networks (CycleGAN)-based adversarial attack algorithm with makeup transfer as its core was constructed. …”
    Get full text
    Article
  16. 376

    UCN-YOLOv5: Traffic Sign Object Detection Algorithm Based on Deep Learning by Peilin Liu, Zhaoyang Xie, Taijun Li

    Published 2023-01-01
    “…Then, ConvNeXt-V2 is integrated, and the C3 module of its Block and YOLOv5 network is used to construct the C3_CN2 structure. …”
    Get full text
    Article
  17. 377

    Development of immune-derived molecular markers for preeclampsia based on multiple machine learning algorithms by Zhichao Wang, Long Cheng, Guanghui Li, Huiyan Cheng

    Published 2025-01-01
    “…Using the identified PE- and immune source–related genes, we constructed a diagnostic forecasting model employing several ML algorithms. …”
    Get full text
    Article
  18. 378

    Integration of mitochondrial gene expression and immune landscape in acute kidney injury prediction by Xiaoping Xia, Renyang Liu, Xiaohui Jiang

    Published 2025-12-01
    “…Immune infiltration was assessed using the xCell algorithm to explore the relationship between MRS and immune cell dynamics in AKI. …”
    Get full text
    Article
  19. 379
  20. 380

    Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction by M. Mohammed Ibrahim, R. Venkatesan, Nasir Ali, Muhammad Imran Qureshi, Hafiz Muhammad Afzal Siddiqui, Fikadu Tesgera Tolasa, Suhad Ali Osman Abdallah

    Published 2025-04-01
    “…We will fill this critical gap by proposing a new hybrid hash algorithm integrating three powerful cryptographic concepts: Cellular Automata (CA), sponge functions, and Elliptic Curve Cryptography (ECC). …”
    Get full text
    Article