-
3341
Research on the evaluation method of cooperative jamming effectiveness based on IPSO-ELM
Published 2025-01-01“…For the problem of evaluating the effectiveness of cooperative jamming to group network radar by formation aircraft, a cooperative jamming effectiveness evaluation method based on Improved Particle Swarm Optimization–Extreme Learning Machine (IPSO-ELM) is proposed. …”
Get full text
Article -
3342
Characterizing Optimum N Rate in Waterlogged Maize (<i>Zea mays</i> L.) with Unmanned Aerial Vehicle (UAV) Remote Sensing
Published 2025-02-01“…The experiment was performed using a split plot design with four replications, with soil moisture conditions as main plots and different N rates as sub-plots. The artificial intelligence SciPy (version 1.5.2) optimization algorithm and spherical function were used to estimate the economically optimum N rate under the different treatments. …”
Get full text
Article -
3343
An Innovative Balanced-Yielding Support Method for Tunnel in Deep Inclined Strata
Published 2022-01-01Get full text
Article -
3344
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01Get full text
Article -
3345
-
3346
Improved YOLOv8 Object Detection Method for Drone Aerial Images
Published 2025-06-01“…A new improved YOLOv8 drone aerial image object detection method, referred to as the BDI-YOLO model, is proposed to address the problems of small target object size and blurry feature information in drone aerial images, which can lead to missed and false detections. …”
Get full text
Article -
3347
Method for estimating objective function landscape convexity during extremum search
Published 2025-04-01“…The particle swarm optimization algorithm was used as an extremum search method. …”
Get full text
Article -
3348
Analysis of soil suitability for agricultural needs using machine learning methods
Published 2024-01-01“…Moreover, the study addresses the importance of accessible and cost-effective data collection methods for scaling the model to different regions. …”
Get full text
Article -
3349
Histopathology Grading of Breast Cancer Using Visual Geometry Group Method
Published 2025-07-01Get full text
Article -
3350
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
3351
Evaluation of Photogrammetric Methods for Displacement Measurement During Structural Load Testing
Published 2025-07-01“…The study evaluates the influence of different camera systems, image acquisition techniques, and processing methods on the overall measurement accuracy. …”
Get full text
Article -
3352
TFC: A Series of Band Selection Methods for Hyperspectral Target Detection
Published 2025-01-01“…By analyzing the detection principle of TCIMF, the BS problem can be transformed into a constrained optimization problem. According to the different method for solving constrained optimization problem, the TFC methods are divided into TFC-MP (TFC-Matching Pursuit), TFC-OMP (TFC-Orthogonal Matching Pursuit) and TFC-StOMP (TFC-Stagewise Orthogonal Matching Pursuit) methods. …”
Get full text
Article -
3353
An interaction relational inference method for a coal-mining equipment system
Published 2025-01-01“…The results show that EMIFC-CIRI successfully built various interaction relations of different strengths, with a 156.17% improvement in interaction-relation quality and a 68.17% improvement in dynamic modeling performance compared with state-of-the-art comparison methods. …”
Get full text
Article -
3354
A Low-Complexity Versatile Beamforming Method for Multiple Parametric Arrays
Published 2025-06-01“…This paper proposes a low-complexity versatile beamforming method based on the transitive relationship among ATFs. …”
Get full text
Article -
3355
Automatic mosaic method of remote sensing images based on machine vision
Published 2024-10-01Get full text
Article -
3356
Survey on multi-agent reinforcement learning methods from the perspective of population
Published 2023-09-01“…How to design multi-agent reinforcement learning methods that meet the large number and scale of intelligent agents and adapt to multiple different application scenarios is a cutting-edge topic in this field. …”
Get full text
Article -
3357
Reinforcement Method for Transmission Corridor to Enhance Resilience Against Typhoon Disasters
Published 2025-05-01“…Therefore, a two-stage reinforcement method for disaster resilience enhancement is proposed. …”
Get full text
Article -
3358
Research on Non-Probabilistic Reliability Partitioning Methods for Large Workspace Robots
Published 2025-01-01“…The method considers the differences in non-probabilistic reliability of robot end positions in different workspace ranges and uses KLFCM clustering combined with a genetic algorithm to perform a two-stage hierarchical partitioning optimization. …”
Get full text
Article -
3359
Performance Comparison of Plasmonic Sensors via Ion Reduction and KOH Methods
Published 2025-06-01“…In this work, several types of plasmonic sensors were prepared by different methods (ion reduction method and wet-chemical KOH route) to detect the ultralow anti-CIPRO concentration using AgNPs/PSi SERS-active substrate with AgNPs concentration. …”
Get full text
Article -
3360
Damage Detection Method for Road Ancillary Facilities Integrating Attention Mechanism
Published 2025-01-01“…Lastly, the WIoUv3 bounding box loss function is employed to optimize the regression performance of bounding boxes, ensuring higher localization accuracy under different scales and overlap conditions. …”
Get full text
Article