Showing 781 - 800 results of 1,112 for search 'network average problem', query time: 0.12s Refine Results
  1. 781

    Improved YOLOv7-Tiny for the Detection of Common Rice Leaf Diseases in Smart Agriculture by Fuxu Guo, Jing Li, Xingcheng Liu, Sinuo Chen, Hongze Zhang, Yingli Cao, Songhong Wei

    Published 2024-11-01
    “…The MobileNetV3 lightweight network is introduced to replace the backbone network of YOLOv7-tiny, which reduces the size of the model parameters and improves the extraction capability of features of different sizes; the RCS-OSA is used to replace the original ELAN-1 module, which improves the extraction capability of interlayer features; the TSCODE detector head is designed to enhance the extraction capability of the model for small targets; and the MPDIoU loss function is used to improve the model’s convergence speed and effect. …”
    Get full text
    Article
  2. 782

    Modelling and optimization of TPMLMs with slotted stators based on Bayesian DNN by Tao Wu, Peipei Dai, Kai Zhu, Yachao Zhu

    Published 2024-11-01
    “…Then, a multi‐objective optimisation problem for the slotted TPMLM is carried out based on the multi‐objective black hole algorithm. …”
    Get full text
    Article
  3. 783

    Efficient and fully simulated oblivious transfer protocol on elliptic curve by Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI

    Published 2023-02-01
    “…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
    Get full text
    Article
  4. 784

    Unifying Non-Markovian Characterization with an Efficient and Self-Consistent Framework by G. A. L. White, P. Jurcevic, C. D. Hill, K. Modi

    Published 2025-05-01
    “…Here, we make deep strides to remedy this problem. We establish a theoretical framework that uniformly incorporates and classifies all non-Markovian phenomena. …”
    Get full text
    Article
  5. 785

    A Bionic Social Learning Strategy Pigeon-Inspired Optimization for Multi-Unmanned Aerial Vehicle Cooperative Path Planning by Yankai Shen, Xinan Liu, Xiao Ma, Hong Du, Long Xin

    Published 2025-01-01
    “…Subsequently, a path-planning model, detection units’ network model, and cost estimation are constructed. …”
    Get full text
    Article
  6. 786

    Unveiling fine-scale spatial structures and amplifying gene expression signals in ultra-large ST slices with HERGAST by Yuqiao Gong, Xin Yuan, Qiong Jiao, Zhangsheng Yu

    Published 2025-04-01
    “…To tackle the potential over-smoothing problem arising from data splitting, we construct a heterogeneous graph network to incorporate both local and global spatial relationships. …”
    Get full text
    Article
  7. 787

    A decentralized power dispatch strategy in an electric vehicle charging station by He Yin, Amro Alsabbagh, Chengbin Ma

    Published 2021-03-01
    “…Abstract In this study, a decentralized power dispatch in a charging station serving electric vehicles (EVs) is discussed. The power dispatch problem is solved through a Stackelberg game in real time. …”
    Get full text
    Article
  8. 788

    HiCDiffusion - diffusion-enhanced, transformer-based prediction of chromatin interactions from DNA sequences by Mateusz Chiliński, Dariusz Plewczynski

    Published 2024-10-01
    “…In our study, we propose the HiCDiffusion, sequence-only model that addresses this problem. We first train the encoder-decoder neural network and then use it as a component of the diffusion model - where we guide the diffusion using a latent representation of the sequence, as well as the final output from the encoder-decoder. …”
    Get full text
    Article
  9. 789

    Aviation Rivet Classification and Anomaly Detection Based on Deep Learning by Xiao-bo Zhu

    Published 2023-01-01
    “…The shortage of personnel and the high cost have become a major pain point in the current safety supervision work of the inspectors. Aiming at the problem that the aircraft maintenance inspector could not visit the scene in person during the epidemic, a remote safety supervision platform was built based on intelligent glasses and 5G network, and the real-time monitoring of the aircraft skin rivet status was realized. …”
    Get full text
    Article
  10. 790

    A few-shot diabetes foot ulcer image classification method based on deep ResNet and transfer learning by Cheng Wang, Zhen Yu, Zhou Long, Hui Zhao, Zhenwei Wang

    Published 2024-12-01
    “…The objective of the study is to propose a few-shot DFU image classification method based on deep residual neural network and transfer learning. Considering the difficulty in obtaining clinical DFU images, it is a few-shot problem. …”
    Get full text
    Article
  11. 791

    Multi-defect detection and classification for aluminum alloys with enhanced YOLOv8. by Ying Han, Xingkun Li, Gongxiang Cui, Jie Song, Fengyu Zhou, Yugang Wang

    Published 2025-01-01
    “…Finally, the backbone network structure is reconstructed. Fine-grained adjustments and improvements are made to enhance neck network layers and the feature extraction capability. …”
    Get full text
    Article
  12. 792

    Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption by Wei Guo, Kai Liang, Yuewen Song, Xiaoli Chu, Gan Zheng, Kai-Kit Wong

    Published 2025-05-01
    “…Based on this analysis, we formulate a mixed-integer nonlinear programming problem to minimize the average delay of URLLC packets while satisfying the average delay and throughput requirements of eMBB by jointly optimizing the eMBB subcarrier allocation, the URLLC subcarrier scheduling and the computing resource allocation. …”
    Get full text
    Article
  13. 793
  14. 794

    A Distributed Cooperative Anti-Windup Algorithm Improving Voltage Profile in Distribution Systems with DERs’ Reactive Power Saturation by Giovanni Mercurio Casolino, Giuseppe Fusco, Mario Russo

    Published 2025-07-01
    “…This paper proposes a Distributed Cooperative Algorithm (DCA) that solves the windup problem caused by the saturation of the Distributed Energy Resource (DER) PI-based control unit. …”
    Get full text
    Article
  15. 795

    Dual-robot formation transport in random environment and narrow restricted area via improved DDPG navigation by Liang Tang, Ronggeng Ma, Bowen Chen, Yisen Niu

    Published 2025-02-01
    “…The method aimed at generating optimized navigation paths for leader–follower robot formations to complete tasks such as moving objects, designing swap decision reward function for DDPG to resolving the problem of blocked exits in narrow areas. Specifically, the paper first optimizes the reward function module in the DDPG network to incorporate a decision-swapping reward mechanism for training the formation's navigation capability. …”
    Get full text
    Article
  16. 796

    AReal-time Detection Method of Vehicle Target Based on Improved YOLOv5s Algorithm by CHEN Xiufeng, WANG Chengxin, WU Yuechen, GU Kexin

    Published 2024-02-01
    “…For the problem of heterogeneous redundant frames,weighted non-maximum value suppression is used to fuse the information of both frames to improve the detection accuracy. …”
    Get full text
    Article
  17. 797

    Teamwork without talking: distributed system estimates maintain approximately centralized control of smart urban drainage systems during communications outages by Travis Adrian Dantzer, Branko Kerkez

    Published 2025-01-01
    “…We show robustness to communications outages; maintaining centralized control in this case study when reporting only once every 7 days on average. We also examine the role of relative position within the network in determining the accuracy of each microcontroller’s estimates of depths in the other storage basins. …”
    Get full text
    Article
  18. 798

    A dual self-attentive transformer U-Net model for precise pancreatic segmentation and fat fraction estimation by Ashok Shanmugam, Prianka Ramachandran Radhabai, Kavitha KVN, Agbotiname Lucky Imoize

    Published 2025-08-01
    “…The most widely used pancreas segmentation technique is a U-shaped network based on deep convolutional neural networks (DCNNs). …”
    Get full text
    Article
  19. 799

    A Multimodal Approach of Machine and Deep Learnings to Enhance the Fall of Elderly People by Saleh Al meraikhi, Murad Al-Rajab

    Published 2022-05-01
    “…As such, the motivation for this research is to implement an algorithmic solution to the problem of falls that leverages the benefits of Machine Learning to detect falls in the elderly. …”
    Get full text
    Article
  20. 800

    Rough-and-Refine Model for Scene Graph Generation by Li Junliang, Lv Shirong, Li Wei

    Published 2025-01-01
    “…The TQG and EPR modules also provide a degree of improvement, with average decreases of 4.7% and 5.2% when removed. The model represented in the first row of the table, which excludes all four modules, is equivalent to the Rough Part, showing an average decrease of 24.9%.ConclusionsTo address the issue of insufficient predicate representation, a scene graph generation method based on a Rough-and-Refine network is proposed. …”
    Get full text
    Article