Showing 961 - 980 results of 1,060 for search 'operator’s activity algorithm', query time: 0.16s Refine Results
  1. 961

    A Review of Recent Advances in Roll Stability Control in On-Road and Off-Road Vehicles by Jie Chen, Ruochen Wang, Wei Liu, Dong Sun, Yu Jiang, Renkai Ding

    Published 2025-05-01
    “…Validation is primarily performed through hardware-in-the-loop simulations and on-road testing. Off-road vehicles, operating in more complex environments with dynamic load changes and rugged terrain, emphasize adaptive leveling, direct torque control, and active steering. …”
    Get full text
    Article
  2. 962

    Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age by Ahmad Mansour, Khaled Alshaketheep, Hind Al-Ahmed, Ahmad Shajrawi, Arafat Deeb

    Published 2025-06-01
    “…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
    Get full text
    Article
  3. 963

    APPLICATION OF ARTIFICIAL NEURON NETWORK AND FUZZY INFERENCE IN THE HOUSEPLANT WATERING INTELLIGENT SYSTEM by Roman Korostenskyi, Igor Olenych

    Published 2025-03-01
    “…Results and Discussion. The system operates by periodically analyzing the soil’s relative humidity and indoor air temperature, making decisions regarding the activation of the irrigation mechanism based on the collected data. …”
    Get full text
    Article
  4. 964

    Enhancing Security and Authenticity in Immersive Environments by Rebecca Acheampong, Dorin-Mircea Popovici, Titus Balan, Alexandre Rekeraho, Manuel Soto Ramos

    Published 2025-03-01
    “…This study proposes a cryptographic solution that leverages digital signatures and hash algorithms to secure virtual assets in immersive environments. …”
    Get full text
    Article
  5. 965

    Python-Based Implementation of Metaheuristic MPPT Techniques: A Cost-Effective Framework for Solar Photovoltaic Systems in Developing Nations by Syed Majed Ashraf, M. Saad Bin Arif, Mohammed Khouj, Shahrin Md. Ayob, Muhammad I. Masud

    Published 2025-06-01
    “…Due to this, the simulation and analysis of these MPPT algorithms for developing and underdeveloped countries added an extra economic burden. …”
    Get full text
    Article
  6. 966

    Optimized solar PV integration for voltage enhancement and loss reduction in the Kombolcha distribution system using hybrid grey wolf-particle swarm optimization by Awot Getachew Abera, Tefera Terefe Yetayew, Assen Beshr Alyu

    Published 2025-06-01
    “…BFS analysis identified total active and reactive power losses of 506.93 kW and 303.55 kVAr with 90.84% of buses operating below minimum voltage standard. …”
    Get full text
    Article
  7. 967

    Sparse signal transmission under lossy wireless links based on double process of compressive sensing by Peng SUN, Gui-nan LI, Lian-tao WU, Zhi WANG

    Published 2017-04-01
    “…In resource-limited wireless sensor networks,links with poor quality hinder its large-scale applications seriously.Thanks to the inherent sparse property of signals in WSN,the framework of sparse signal transmission based on double process of compressive sensing was proposed,providing an insight into a new way of real-time,accurate and energy-efficient sparse signal transmission.Firstly,the random packet loss during transmission under lossy wireless links was modeled as a linear dimension-reduced measurement process of CS (a passive process of CS).Then,considering that a large packet was often adopted in WSN for higher transmission efficiency,a random linear dimension-reduced projection (a simple source coding operation) was employed at the sender node (an active process of CS) to prevent block data loss.Now,the raw signal could be recovered from the lossy data at the receiver node using CS reconstruction algorithms.Furtherly,according to the theory of CS reconstruction and the formula of packet reception rate in wireless communication,the minimum compression ratio and the maximum packet length allowed were obtained.Extensive simulations demonstrate that the reliability of data transmission and its accuracy,the data transmission volume,the transmission delay and energy consumption could be greatly optimized by means of proposed method.…”
    Get full text
    Article
  8. 968

    Visual recognition of honeybee behavior patterns at the hive entrance. by Tomyslav Sledevič, Artūras Serackis, Dalius Matuzevičius, Darius Plonis, Gabriela Vdoviak

    Published 2025-01-01
    “…The system effectively detects multiple bee activities such as foraging, fanning, washboarding, and defense, achieving a mean detection accuracy of 98% and operating at speeds of up to 36 fps, surpassing state-of-the-art methods in both speed and accuracy. …”
    Get full text
    Article
  9. 969
  10. 970

    Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology by Md. Mazharul Islam, Mubasshir Ahmed, Rajesh Palit, Mohammad Shahriar Rahman, Salekul Islam

    Published 2025-08-01
    “…Privacy is preserved using cryptographic techniques such as secure hashing and anonymous credentials, which ensure that sensitive patient information remains confidential throughout the claim process. Smart contract algorithms are utilized in two scenarios: patient‐submitted claims and healthcare provider‐submitted claims, ensuring accurate processing and validation while detecting fraudulent activities such as duplicate claims, inflated medical bills, billing for unprovided services, falsifying patient records, and submitting claims for nonexistent treatments. …”
    Get full text
    Article
  11. 971

    Evaluating ecological impacts through geospatial analysis of land use land cover dynamics in Jarmet wetland ecosystems in Western Ethiopia by Amanuel Kumsa Bojer, Ayad M. Fadhil Al-Quraishi, Saralees Nadarajah

    Published 2024-12-01
    “…The dataset included Thematic Mapper (TM) imagery from 1986, Enhanced Thematic Mapper Plus (ETM+) images from 2000 and 2005, and Operational Land Imager (OLI) data from 2015. Using multi-source satellite imagery, maximum likelihood algorithms, and advanced spatial tools within a Geographic Information System (GIS), LULCC was mapped. …”
    Get full text
    Article
  12. 972

    The Archive as a Dynamic Entity: an Interactive Concept Map for Architectural Projects by Alessandro Basso

    Published 2025-07-01
    “…With the help of a simple activator, it is possible to switch between 2D and 3D views, revealing further aesthetic and exploratory possibilities. …”
    Get full text
    Article
  13. 973

    Production monitoring and machine tracking in underground mines based on a collision avoidance system: A case study by Artur Skoczylas, Natalia Duda-Mróz, Wioletta Koperska, Paweł Stefaniak, Paweł Śliwiński

    Published 2025-07-01
    “…Significant emphasis is placed on comprehensive monitoring to achieve situational awareness to ensure informational continuity of operations in dispersed organizations. This knowledge is fundamental for safe and efficient extraction, current production reconciliation, and all operational and planning activities, particularly when considering specialized simulation environments for production optimization. …”
    Get full text
    Article
  14. 974

    Advanced strategies for the efficient optimization and control of industrial compressed air systems by D. Salomone-González

    Published 2025-06-01
    “…Real-time data transmission, powered by big data algorithms, enables continuous analysis to optimize the overall performance of the compressor plant. …”
    Get full text
    Article
  15. 975

    False data injection attack dataset for classification, identification, and detection for IIoT in Industry 5.0Zenodo by A K M Ahasan Habib, Mohammad Kamrul Hasan, Rosilah Hassan, Shayla Islam, Huda Saleh Abbas

    Published 2025-08-01
    “…The approach we employ makes it easier to create and assess effective machine learning (ML) and deep learning (DL) algorithms for efficient FDI attack detections. Additionally, we demonstrate a multifaceted approach to using the UKMNCT_IIoT_FDIA dataset, which includes detection algorithms to quickly address active FDI attacks, detection processes to identify malicious things, and classification approaches to classify attack categories. …”
    Get full text
    Article
  16. 976

    ANN-Based Maximum Power Tracking for a Grid-Synchronized Wind Turbine-Driven Doubly Fed Induction Generator Fed by Matrix Converter by Mohamed A. Alarabi, Sedat Sünter

    Published 2025-05-01
    “…This study shows how wind energy systems can be optimized for smart grids by integrating advanced control techniques like FOC and simplified Venturini modulation with intelligent algorithms like ANN.…”
    Get full text
    Article
  17. 977

    Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks by Sooyeon Shin, Minwoo Kim, Taekyoung Kwon

    Published 2017-11-01
    “…For resource-constrained nature of these special networks, the design of lightweight cryptography has become active research topic over the last several years. …”
    Get full text
    Article
  18. 978

    Collision Analysis and Motion Control Based on Lift-Type Power Catwalk by Jia Chen, Li Xiong, Honghui Wang, Yi Yang

    Published 2024-12-01
    “…Based on this model, a composite disturbance rejection control law was designed, integrating sliding-mode speed planning with active disturbance rejection speed tracking. The MATLAB 2022b/Simulink simulations demonstrated that the ADRC strategy outperforms PID and DDPG control algorithms in terms of robustness. …”
    Get full text
    Article
  19. 979

    PHYSICAL METHODS OF REHABILITATION IN CANCER PATIENTS AFTER COMBINED MODALITY TREATMENT FOR BREAST CANCER by V. E. Tishakova, E. V. Filonenko, V. I. Chissov, N. A. Efimenko, A. N. Urlova

    Published 2017-06-01
    “…Despite the success in current methods of treatment post-operative period in major of patients is characterized by post-mastectomy syndrome which leads to impairment in daily activities, difficulties in social adaptation and consequently to dicrease of the quality of life. …”
    Get full text
    Article
  20. 980

    Detecting Defects in Materials Using Nondestructive Microwave Testing Techniques: A Comprehensive Review by Ahmad Ghattas, Ramzi Al-Sharawi, Amer Zakaria, Nasser Qaddoumi

    Published 2025-03-01
    “…Next, a brief description of current and emerging algorithms employed in MNDT is discussed, with emphasis on those using artificial intelligence. …”
    Get full text
    Article