-
61
Optimization of delivery routes for takeout under time-varying road networks
Published 2025-06-01Get full text
Article -
62
Fusion of MHSA and Boruta for key feature selection in power system transient angle stability
Published 2025-01-01Get full text
Article -
63
Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region
Published 2025-02-01“…Intelligent recognition of coal mine workers and manned vehicles (coal mine pedestrian-vehicles) is an important component of video surveillance systems and a key task in the development of coal mine intelligence. …”
Get full text
Article -
64
Research of Exoskeleton Trajectory Algorithm based on Homogeneous Differential Equation
Published 2017-01-01Get full text
Article -
65
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…The paper presents a description of an automated system and the algorithms implemented in it for detection, association and location of low-frequency acoustic events based on infrasound array data. …”
Get full text
Article -
66
Algorithmic Collusion: Corporate Accountability and the Application of Art. 101 TFEU
Published 2025-01-01“…Two different scenarios are discussed: the Predictable Agent and the Digital Eye, where algorithms operate either under human control or in an autonomous man-ner. …”
Get full text
Article -
67
An algorithm for automatic fitting and formula assignment in atmospheric mass spectra
Published 2025-04-01Get full text
Article -
68
USING MULTIVARIATE COMMUNICATION APPROACH TO BUILDING THE UNIVERSITY MANAGEMENT SYSTEM
Published 2014-12-01Get full text
Article -
69
-
70
Trust transitivity algorithm based on multiple influencing factors for grid environment
Published 2011-01-01“…A trust deployment scheme based on layered idea was given for grid environment,which reduced the man-agement costs of system.The fine-grain trust model was proposed which was based on interaction capability and honesty ability.It enhanced the rationality of the model.At the same time,4 influencing factors about trust transitivity were dis-cussed,such as cycle path,path length threshold,node honesty threshold and further trust information.On this condition,the trust transitivity algorithm for grid was studied which was based on depth-first traversal.Example and experimental results show that the model and algorithm are feasible and correct.…”
Get full text
Article -
71
Algorithm for intelligent collaborative target search and trajectory planning of MAV/UAV
Published 2024-01-01“…Based on the manned aerial vehicle (MAV) / unmanned aerial vehicle (UAV) intelligent cooperation platform, the search of multiple interfered signal sources with unknown locations and trajectory planning were studied.Considering the real-time and dynamic nature of the search process, a MAV/UAV intelligent collaborative target search and trajectory planning (MUICTSTP) algorithm based on multi-agent deep reinforcement learning (MADRL) was proposed.Each UAV made online decision on trajectory planning by sensing the received interference signal strength (RISS) values, and then transmitted the sensing information and decision-making actions to the MAV to obtain the global evaluation.The simulation results show that the proposed algorithm exhibits better performance in long-term RISS, collision, and other aspects compared to other algorithms, and the learning strategy is better.…”
Get full text
Article -
72
An evaluation of flow-routing algorithms for calculating contributing area on regular grids
Published 2025-03-01“…Here we document the fact that a commonly used multiple-flow-direction algorithm for calculating contributing area, i.e., <span class="inline-formula"><i>D</i>∞</span> of Tarboton (1997), is sufficiently biased along the cardinal and ordinal directions that it is unsuitable for some standard applications of flow-routing algorithms. …”
Get full text
Article -
73
Overview of metro train driving technology development:from manual driving to intelligent unmanned driving
Published 2022-09-01“…Based on the current development status of subway train driving technology in China and abroad, the four stages of subway train driving technology development were proposed and explained as manual driving, automatic driving, unmanned driving, and intelligent unmanned driving.After summarizing the construction situation of unmanned subway trains in China, the disadvantages of the current train control methods based on neural network-based machine learning methods were addressed.Then, the basic block diagram of metro intelligent unmanned driving based on man-machine hybrid intelligence was put forward and the deep fuzzy system was introduced.A promising solution for the combination of expert experience in dealing with emergency and interpretable AI algorithms for unmanned driving system to evolve into intelligent unmanned driving was provided.…”
Get full text
Article -
74
-
75
Estimation Algorithm of Machine Operational Intention by Bayes Filtering with Self-Organizing Map
Published 2012-01-01“…We present an intention estimator algorithm that can deal with dynamic change of the environment in a man-machine system and will be able to be utilized for an autarkical human-assisting system. …”
Get full text
Article -
76
A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare
Published 2025-05-01“…The aim of research is to propose and evaluate an attack detection algorithm for IoMT, focusing on improving detection performance against man-in-the-middle attacks. …”
Get full text
Article -
77
Optimal Poisson Cognitive System with Markov Learning Model
Published 2021-12-01“…The research method consists in the application of the simplest Markov learning model of Estes with a stochastic matrix with two states, in which the transition probabilities are calculated in accordance with the optimal Neуman-Pearson algorithm for detecting stimuli affecting the system. …”
Get full text
Article -
78
-
79
NEURAL NETWORK ALGORITHM SAFE OVERFLIGHT AERIAL OBSTACLES AND PROHIBITED LAND AREAS
Published 2017-09-01“…The article presents the algorithm of safe flying around obstacles when making en route flight of manned and unmanned aircraft. …”
Get full text
Article -
80
Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher
Published 2014-01-01“…One of them is the classical key that is used in the Hill cipher algorithm where Alice and Bob use the authenticated Diffie Hellman key exchange algorithm using the concept of digital signature for the authentication of the two communicating parties and so eliminate the man-in-the-middle attack. …”
Get full text
Article