-
1861
Road Perception for Autonomous Driving: Pothole Detection in Complex Environments Based on Improved YOLOv8
Published 2025-01-01“…Experiments on public datasets have validated the effectiveness of our approach: compared to the original YOLOv8 model, the detection precision and recall rate of our algorithm have been improved by 9.8% and 11.6% respectively, and the F1 score has reached 84.9%. …”
Get full text
Article -
1862
Interpreting seasonal droughts over the Yangtze River Basin utilizing anomalies of local-scale atmospheric circulation
Published 2025-04-01“…New hydrological insights for the region: Low-level specific humidity significantly influences drought conditions in the northern middle and lower reaches, while mid-level vertical velocity is the dominant factor in the southern middle and lower reaches. …”
Get full text
Article -
1863
SPECT/CT WITH 99MTC-MIBL IN MONITORING OF ESTHESIONEUROBLASTOMA
Published 2017-06-01“…This article describes a new approach to the diagnosis of esthesioneuroblastoma. The classical algorithm examination included the whole body 99mTc-MIBI scans and SPECT/CT of the head. …”
Get full text
Article -
1864
Research on PRBP Neural Network Flood Forecasting Model in Chongyang River Basin
Published 2025-06-01“…The Poak-Ribiére conjugate gradient back propagation algorithm (PRBP) of numerical optimization technology was used, and 21 rainstorm and flood processes from 1997 to 2022 in the upper reaches of Chongyang River basin were studied. …”
Get full text
Article -
1865
Research on PRBP Neural Network Flood Forecasting Model in Chongyang River Basin
Published 2025-01-01“…The Poak-Ribiére conjugate gradient back propagation algorithm (PRBP) of numerical optimization technology was used, and 21 rainstorm and flood processes from 1997 to 2022 in the upper reaches of Chongyang River basin were studied. …”
Get full text
Article -
1866
Research on leaf identification of table grape varieties based on deep learning
Published 2025-08-01“…The F1 value of creson seedless, Xianfeng and longan varieties in the ResNet-101 model reached 1, and the average F1 value reached 0.94. …”
Get full text
Article -
1867
Technical Code Analysis of Geomagnetic Flaw Detection of Suppression Rigging Defect Signal Based on Convolutional Neural Network
Published 2024-12-01“…The single-stage object detection algorithm YOLOv5 (You Only Look Once) based on convolutional neural network model calculation is used, the scale detection layer and positioning loss function of the YOLOv5 algorithm are improved and optimized, and the improved YOLOv5 algorithm is used for experiments. …”
Get full text
Article -
1868
State of Charge Estimation of Composite Energy Storage Systems with Supercapacitors and Lithium Batteries
Published 2021-01-01“…According to the energy storage principle of the electric vehicle composite energy storage system, the circuit models of supercapacitors and lithium batteries were established, respectively, and the model parameters were identified online using the recursive least square (RLS) method and Kalman filtering (KF) algorithm. Then, the online estimation of SOC was completed based on the Kalman filtering algorithm and unscented Kalman filtering algorithm. …”
Get full text
Article -
1869
Hardware-Accelerated Infrared Small Target Recognition Based on Energy-Weighted Local Uncertainty Measure
Published 2024-09-01“…And, the algorithm is at the leading edge in terms of performance; the processing frame rate can reach 3051 FPS (frame per second), 96 FPS, and 54 FPS for image data with a resolution of 256 × 256, 1920 × 1080, and 2560 × 1440, respectively.…”
Get full text
Article -
1870
The design of advertising text keyword recommendation for internet search engines
Published 2024-12-01“…In practical applications, the recommendation efficiency of this method can reach 96.3 %, and the recommendation precision can reach 95.8 %. …”
Get full text
Article -
1871
Maturity Classification and Quality Determination of Cherry Using VNIR Hyperspectral Images and Comprehensive Chemometrics
Published 2024-12-01“…After the chemometrics related to hyperspectral imaging had been examined, the least square-support vector regression models based on the feature bands, which were selected by the shuffled frog leaping algorithm, showed the best performance, and the determination coefficients of prediction (R2P) for cherry sugar content and acidity reached 0.976 and 0.906, respectively. …”
Get full text
Article -
1872
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
Get full text
Article -
1873
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
1874
First- and Second-Order Centrodes of Both Coupler Links of Stephenson III Six-Bar Mechanisms
Published 2025-01-01“…The position vectors of both pairs of instantaneous centers of rotation and acceleration centers are expressed as vector functions of the driving input angle of the mechanism and apply the fundamental theorems for velocities and accelerations, respectively. Thus, the proposed algorithm has been formulated by using vector algebra and validated through significant numerical and graphical results by devoting particular attention to the cases in which the second coupler link shows an instantaneous stop configuration, along with those where the first four-bar linkage reaches an asymptotic configuration. …”
Get full text
Article -
1875
Reservoir optimization with differential evolution
Published 2016-03-01“…This method is an improved variant of GA to converge and reach to the optimal solution faster than the traditional GA. …”
Get full text
Article -
1876
KFCM-PSOTD : An Imputation Technique for Missing Values in Incomplete Data Classification
Published 2024-05-01“…The outcomes demonstrate that the KFCM-PSOTD algorithm has a better performance; even the difference in evaluation scores obtained reaches 10% better than other imputation techniques.…”
Get full text
Article -
1877
Using Interval Operations in the Hungarian Method to Solve the Fuzzy Assignment Problem and Its Application in the Rehabilitation Problem of Valuable Buildings in Egypt
Published 2020-01-01“…Then, the interval arithmetic operations and the order relations are applied to get the optimal solution by utilizing the modified Hungarian method. The proposed algorithm requires less efforts and time to reach optimality, compared to the existing methods. …”
Get full text
Article -
1878
Two-Stage User Identification Based on User Topology Dynamic Community Clustering
Published 2021-01-01“…Finally, the iteration is repeated until no new matching user pairs are generated, or the set number of iterations is reached. Experiments conducted on real-world social networks Twitter-Foursquare datasets demonstrate that compared with the global user matching method and hidden label node method, the average accuracy of the proposed UIUTDC algorithm is improved by 33% and 26.8%, respectively. …”
Get full text
Article -
1879
Research on Multimodal Control Method for Prosthetic Hands Based on Visuo-Tactile and Arm Motion Measurement
Published 2024-12-01“…To control the grasping attitude, a fusion algorithm based on information of upper limb motion state, hand position, and lesser toe haptics was proposed to realize control of the robotic grasping process with a human in the ring. …”
Get full text
Article -
1880
Mobile Robot Path Planning Using Polyclonal-Based Artificial Immune Network
Published 2013-01-01“…So, mobile robot can avoid obstacles, escape traps, and reach the goal with optimum path and faster convergence speed.…”
Get full text
Article