-
1481
Hybrid Window Decoding for Joint Source Channel Anytime Coding System
Published 2024-11-01“…Unlike the traditional JEWD technique and its variants, the proposed JHWD algorithm utilizes a hybrid window structure. It achieves this by implementing adaptive local expanding window decoding in the sliding window region, guided by syndrome-check-based detection. …”
Get full text
Article -
1482
ON FPGA BASED ACCELERATION OF IMAGE PROCESSING IN MOBILE ROBOTICS
Published 2015-12-01“…The results indicate that even a computationally efficient FAST algorithm can benefit from a parallel (low–cost) FPGA–based implementation that has a competitive processing time but more importantly it is a more power efficient.…”
Get full text
Article -
1483
ON AUTOMATED QUALITY CONTROL OF GEOPHYSICAL WELL LOGGING DATA
Published 2014-09-01“…A brief analysis of the unreliability symptoms of record fragments is provided. An algorithm using iterative modeling techniques of incomplete data with low-dimensional manifolds for solving the problem of assessing the quality of the well logging data is proposed. …”
Get full text
Article -
1484
A mutual mapping model of cross-sections between the axial and normal planes of ball screws based on the forming of helical ball track
Published 2025-05-01“…Empirical evaluations demonstrate the efficiency and precision of our algorithm. In 3D modeling tests, it processes 10,000 points in merely 5 ms, with an impressively low maximum relative error of 0.001%. …”
Get full text
Article -
1485
A Novel Approach to Pine Nut Classification: Combining Near-Infrared Spectroscopy and Image Shape Features with Soft Voting-Based Ensemble Learning
Published 2025-06-01“…This work provides a high-precision, low-complexity solution for rapid quality detection of pine nuts, with broad implications for agricultural product inspection and food safety.…”
Get full text
Article -
1486
Experimental DCO-OFDM Optical Camera Communication Systems With a Commercial Smartphone Camera
Published 2019-01-01“…Two DCO-OFDM OCC signal detection algorithms, namely the parabolic column vector selection (P-CVS) algorithm and the decomposition of extremely low frequency component (D-ELFC) algorithm, were proposed, along with a frequency-domain downsampling scheme, to eliminate the influence from both the blooming effect and shot noise. …”
Get full text
Article -
1487
Comparison of Manhattan and Chebyshev Distance Metrics in Quantum-Based K-Medoids Clustering
Published 2025-07-01“…The results show that the Manhattan algorithm performs better in medical contexts, particularly for detecting positive cases, with a recall of 0.57 and an F1-score of 0.695, although it has a slightly lower precision of 0.88. …”
Get full text
Article -
1488
MM-LoRa-Mod: A non-coherent LoRa modulation scheme for underwater acoustic communications
Published 2024-09-01“…Additionally, for underwater acoustic communication scenarios, a low-complexity non-coherent detection algorithm for MM-LoRa-Mod was introduced. …”
Get full text
Article -
1489
Model-Based RL Decision-Making for UAVs Operating in GNSS-Denied, Degraded Visibility Conditions with Limited Sensor Capabilities
Published 2025-06-01“…Designed for search and rescue operations, the system enables UAVs to navigate cluttered indoor environments, detect targets, and avoid obstacles under low-visibility conditions. …”
Get full text
Article -
1490
AviaryMOT: Aviary Attention-based adaptive multi-object tracking of cranes and storks in wetlands
Published 2025-06-01“…In the tracking stage, the BYTE data association method effectively utilizes similarities between low-score detection boxes and tracking trajectories, enabling the identification of true objects and filtering out background noise. …”
Get full text
Article -
1491
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01“…Then, the accuracy of rock interface identification was analyzed using parameters such as penetration rate, revolution per minute, sound pressure level, and torque using the application of the change point detection algorithm, the strucchange model in RStudio software, and the decision tree algorithm. …”
Get full text
Article -
1492
Classification of Phishing Email Using Random Forest Machine Learning Technique
Published 2014-01-01“…From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature) were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN) and false positive (FP) rates.…”
Get full text
Article -
1493
Complete Coverage Path Planning for Wind Turbine Blade Wall-Climbing Robots Based on Bio-Inspired Neural Networks and Energy Consumption Model
Published 2025-02-01“…To overcome the limitations of the existing inspection methods, which suffer from low detection precision and inefficiency, this paper proposes a novel complete coverage path planning (CCPP) algorithm for wall-climbing robots operating on wind turbine blades. …”
Get full text
Article -
1494
Combining Kronecker-Basis-Representation Tensor Decomposition and Total Variational Constraint for Spectral Computed Tomography Reconstruction
Published 2025-05-01“…The proposed objective minimization model has been tackled using the split-Bregman algorithm. To evaluate the algorithm’s performance, both numerical simulations and realistic preclinical mouse studies were conducted. …”
Get full text
Article -
1495
ESP32 and MAX30100 with Chebyshev Filter for Enhanced Heart and Oxygen Measurement
Published 2024-10-01“…This study proposes a remote health monitoring system based on a MAX30100 sensor for heart rate and oxygen saturation detection. The digital signal processing method uses the Chebyshev II filter on PPG to reduce noise, and the RSA algorithm is employed to enhance data security. …”
Get full text
Article -
1496
A Three-dimensional Measurement Method for High-speed Train Body Based on Binocular Structural Light
Published 2020-01-01“…Sanding quality is mainly judged by the measurement of surface smoothness. Currently, manual detection method is widely used, which has the disadvantages of low quality and low efficiency. …”
Get full text
Article -
1497
PLL-VO: An Efficient and Robust Visual Odometry Integrating Point-Line Features and Neural Networks
Published 2025-07-01“…To overcome the impact of complex lighting conditions, a self-supervised learning method for interest point detection and a line detection algorithm that combines line optical flow tracking with cross-constraints is presented. …”
Get full text
Article -
1498
Intracranial stenosis prediction using a small set of risk factors in the Tromsø Study
Published 2025-02-01“…We achieved similar performance on classification compared to modern detection algorithms for ICAS in TOF-MRA (time-of-flight magnetic resonance angiography). …”
Get full text
Article -
1499
Android malware family classification method based on the image of bytecodeConstruction of MDS matrices
Published 2016-06-01“…An Android malware family classification method based on the image of bytecode was proposed accord-ing to the exponential growth of Android malware.A bytecode file of Android malware was converted to a 256-level grayscale image and texture features was extracted from the image by GIST.The random forest algorithm was ap-plied to classify the extracted features.The method by the experimental data of 14 kinds of common Android mal-ware families was verified and was compared against the DREBIN on the same dataset.The experimental results show that the proposed method has high detection precision and low false positive rate.…”
Get full text
Article -
1500
Research on Intelligent Identification Technology for Bridge Cracks
Published 2025-04-01“…In response to this, this paper proposes a bridge crack multi-task integration algorithm based on YOLOv8 object detection and DeepLabv3+ semantic segmentation. …”
Get full text
Article