Showing 61 - 80 results of 338 for search 'man algorithm', query time: 0.12s Refine Results
  1. 61
  2. 62
  3. 63

    Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region by Beijing XIE, Heng LI, Zheng LUAN, Zhen LEI, Xiaoxu LI, Zhuo LI

    Published 2025-02-01
    “…Intelligent recognition of coal mine workers and manned vehicles (coal mine pedestrian-vehicles) is an important component of video surveillance systems and a key task in the development of coal mine intelligence. …”
    Get full text
    Article
  4. 64
  5. 65

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…The paper presents a description of an automated system and the algorithms implemented in it for detection, association and location of low-frequency acoustic events based on infrasound array data. …”
    Get full text
    Article
  6. 66

    Algorithmic Collusion: Corporate Accountability and the Application of Art. 101 TFEU by Maria Giacalone

    Published 2025-01-01
    “…Two different scenarios are discussed: the Predictable Agent and the Digital Eye, where algorithms operate either under human control or in an autonomous man-ner. …”
    Get full text
    Article
  7. 67
  8. 68
  9. 69
  10. 70

    Trust transitivity algorithm based on multiple influencing factors for grid environment by ZHANG Lin1, WANG Ru-chuan1, WANG Hai-yan1

    Published 2011-01-01
    “…A trust deployment scheme based on layered idea was given for grid environment,which reduced the man-agement costs of system.The fine-grain trust model was proposed which was based on interaction capability and honesty ability.It enhanced the rationality of the model.At the same time,4 influencing factors about trust transitivity were dis-cussed,such as cycle path,path length threshold,node honesty threshold and further trust information.On this condition,the trust transitivity algorithm for grid was studied which was based on depth-first traversal.Example and experimental results show that the model and algorithm are feasible and correct.…”
    Get full text
    Article
  11. 71

    Algorithm for intelligent collaborative target search and trajectory planning of MAV/UAV by Zhuo LU, Qihui WU, Fuhui ZHOU

    Published 2024-01-01
    “…Based on the manned aerial vehicle (MAV) / unmanned aerial vehicle (UAV) intelligent cooperation platform, the search of multiple interfered signal sources with unknown locations and trajectory planning were studied.Considering the real-time and dynamic nature of the search process, a MAV/UAV intelligent collaborative target search and trajectory planning (MUICTSTP) algorithm based on multi-agent deep reinforcement learning (MADRL) was proposed.Each UAV made online decision on trajectory planning by sensing the received interference signal strength (RISS) values, and then transmitted the sensing information and decision-making actions to the MAV to obtain the global evaluation.The simulation results show that the proposed algorithm exhibits better performance in long-term RISS, collision, and other aspects compared to other algorithms, and the learning strategy is better.…”
    Get full text
    Article
  12. 72

    An evaluation of flow-routing algorithms for calculating contributing area on regular grids by A. B. Prescott, J. D. Pelletier, S. Chataut, S. Ananthanarayan

    Published 2025-03-01
    “…Here we document the fact that a commonly used multiple-flow-direction algorithm for calculating contributing area, i.e., <span class="inline-formula"><i>D</i>∞</span> of Tarboton (1997), is sufficiently biased along the cardinal and ordinal directions that it is unsuitable for some standard applications of flow-routing algorithms. …”
    Get full text
    Article
  13. 73

    Overview of metro train driving technology development:from manual driving to intelligent unmanned driving by Wenzhu LAI, Dewang CHEN, Zhenfeng HE, Xinguo DENG, CARLO Marano GIUSEPPE

    Published 2022-09-01
    “…Based on the current development status of subway train driving technology in China and abroad, the four stages of subway train driving technology development were proposed and explained as manual driving, automatic driving, unmanned driving, and intelligent unmanned driving.After summarizing the construction situation of unmanned subway trains in China, the disadvantages of the current train control methods based on neural network-based machine learning methods were addressed.Then, the basic block diagram of metro intelligent unmanned driving based on man-machine hybrid intelligence was put forward and the deep fuzzy system was introduced.A promising solution for the combination of expert experience in dealing with emergency and interpretable AI algorithms for unmanned driving system to evolve into intelligent unmanned driving was provided.…”
    Get full text
    Article
  14. 74
  15. 75

    Estimation Algorithm of Machine Operational Intention by Bayes Filtering with Self-Organizing Map by Satoshi Suzuki, Fumio Harashima

    Published 2012-01-01
    “…We present an intention estimator algorithm that can deal with dynamic change of the environment in a man-machine system and will be able to be utilized for an autarkical human-assisting system. …”
    Get full text
    Article
  16. 76

    A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare by Mamta Kumari, Mahendra Gaikwad, Salim A. Chavan

    Published 2025-05-01
    “…The aim of research is to propose and evaluate an attack detection algorithm for IoMT, focusing on improving detection performance against man-in-the-middle attacks. …”
    Get full text
    Article
  17. 77

    Optimal Poisson Cognitive System with Markov Learning Model by A. A. Solodov

    Published 2021-12-01
    “…The research method consists in the application of the simplest Markov learning model of Estes with a stochastic matrix with two states, in which the transition probabilities are calculated in accordance with the optimal Neуman-Pearson algorithm for detecting stimuli affecting the system. …”
    Get full text
    Article
  18. 78
  19. 79

    NEURAL NETWORK ALGORITHM SAFE OVERFLIGHT AERIAL OBSTACLES AND PROHIBITED LAND AREAS by D. A. Mikhaylin

    Published 2017-09-01
    “…The article presents the algorithm of safe flying around obstacles when making en route flight of manned and unmanned aircraft. …”
    Get full text
    Article
  20. 80

    Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher by Rifaat Zaidan Khalaf, Alharith Abdulkareem Abdullah

    Published 2014-01-01
    “…One of them is the classical key that is used in the Hill cipher algorithm where Alice and Bob use the authenticated Diffie Hellman key exchange algorithm using the concept of digital signature for the authentication of the two communicating parties and so eliminate the man-in-the-middle attack. …”
    Get full text
    Article