Showing 1,861 - 1,880 results of 2,680 for search 'reaching algorithms', query time: 0.10s Refine Results
  1. 1861

    Road Perception for Autonomous Driving: Pothole Detection in Complex Environments Based on Improved YOLOv8 by Siyuan Kong, Qiao Meng, Xin Li, Zhijie Wang, Xin Liu, Bingyu Li

    Published 2025-01-01
    “…Experiments on public datasets have validated the effectiveness of our approach: compared to the original YOLOv8 model, the detection precision and recall rate of our algorithm have been improved by 9.8% and 11.6% respectively, and the F1 score has reached 84.9%. …”
    Get full text
    Article
  2. 1862

    Interpreting seasonal droughts over the Yangtze River Basin utilizing anomalies of local-scale atmospheric circulation by Hao Yin, Zhiyong Wu, Hai He

    Published 2025-04-01
    “…New hydrological insights for the region: Low-level specific humidity significantly influences drought conditions in the northern middle and lower reaches, while mid-level vertical velocity is the dominant factor in the southern middle and lower reaches. …”
    Get full text
    Article
  3. 1863

    SPECT/CT WITH 99MTC-MIBL IN MONITORING OF ESTHESIONEUROBLASTOMA by A. S. Krylov, S. V. Shiryaev, A. D. Ryzhkov, Е. М. Mikhailova, M. O. Goncharov, D. D. Sevryukov

    Published 2017-06-01
    “…This article describes a new approach to the diagnosis of esthesioneuroblastoma. The classical algorithm examination included the whole body 99mTc-MIBI scans and SPECT/CT of the head. …”
    Get full text
    Article
  4. 1864

    Research on PRBP Neural Network Flood Forecasting Model in Chongyang River Basin by SI Qi, JIN Baoming, LU Wangming, CHEN Zhaoqing

    Published 2025-06-01
    “…The Poak-Ribiére conjugate gradient back propagation algorithm (PRBP) of numerical optimization technology was used, and 21 rainstorm and flood processes from 1997 to 2022 in the upper reaches of Chongyang River basin were studied. …”
    Get full text
    Article
  5. 1865

    Research on PRBP Neural Network Flood Forecasting Model in Chongyang River Basin by SI Qi, JIN Baoming, LU Wangming, CHEN Zhaoqing

    Published 2025-01-01
    “…The Poak-Ribiére conjugate gradient back propagation algorithm (PRBP) of numerical optimization technology was used, and 21 rainstorm and flood processes from 1997 to 2022 in the upper reaches of Chongyang River basin were studied. …”
    Get full text
    Article
  6. 1866

    Research on leaf identification of table grape varieties based on deep learning by PAN Bowen, LIN Meiling, JU Yanlun, SU Baofeng, SUN Lei, FAN Xiucai, ZHANG Ying, ZHANG Yonghui, LIU Chonghuai, JIANG Jianfu, FANG Yulin

    Published 2025-08-01
    “…The F1 value of creson seedless, Xianfeng and longan varieties in the ResNet-101 model reached 1, and the average F1 value reached 0.94. …”
    Get full text
    Article
  7. 1867

    Technical Code Analysis of Geomagnetic Flaw Detection of Suppression Rigging Defect Signal Based on Convolutional Neural Network by Gang Zhao, Changyu Han, Zhongxiang Yu, Zhipan Li, Guoao Yu, Hongmei Zhang, Dadong Zhao, Zhengyi Jiang

    Published 2024-12-01
    “…The single-stage object detection algorithm YOLOv5 (You Only Look Once) based on convolutional neural network model calculation is used, the scale detection layer and positioning loss function of the YOLOv5 algorithm are improved and optimized, and the improved YOLOv5 algorithm is used for experiments. …”
    Get full text
    Article
  8. 1868

    State of Charge Estimation of Composite Energy Storage Systems with Supercapacitors and Lithium Batteries by Kai Wang, Chunli Liu, Jianrui Sun, Kun Zhao, Licheng Wang, Jinyan Song, Chongxiong Duan, Liwei Li

    Published 2021-01-01
    “…According to the energy storage principle of the electric vehicle composite energy storage system, the circuit models of supercapacitors and lithium batteries were established, respectively, and the model parameters were identified online using the recursive least square (RLS) method and Kalman filtering (KF) algorithm. Then, the online estimation of SOC was completed based on the Kalman filtering algorithm and unscented Kalman filtering algorithm. …”
    Get full text
    Article
  9. 1869

    Hardware-Accelerated Infrared Small Target Recognition Based on Energy-Weighted Local Uncertainty Measure by Xiaoqing Wang, Zhantao Zhang, Yujie Jiang, Kuanhao Liu, Yafei Li, Xuri Yao, Zixu Huang, Wei Zheng, Jingqi Zhang, Fu Zheng

    Published 2024-09-01
    “…And, the algorithm is at the leading edge in terms of performance; the processing frame rate can reach 3051 FPS (frame per second), 96 FPS, and 54 FPS for image data with a resolution of 256 × 256, 1920 × 1080, and 2560 × 1440, respectively.…”
    Get full text
    Article
  10. 1870

    The design of advertising text keyword recommendation for internet search engines by Fang Wang, Liuying Yu

    Published 2024-12-01
    “…In practical applications, the recommendation efficiency of this method can reach 96.3 %, and the recommendation precision can reach 95.8 %. …”
    Get full text
    Article
  11. 1871

    Maturity Classification and Quality Determination of Cherry Using VNIR Hyperspectral Images and Comprehensive Chemometrics by Yuzhen Wei, Siyi Yao, Feiyue Wu, Qiangguo Yu

    Published 2024-12-01
    “…After the chemometrics related to hyperspectral imaging had been examined, the least square-support vector regression models based on the feature bands, which were selected by the shuffled frog leaping algorithm, showed the best performance, and the determination coefficients of prediction (R2P) for cherry sugar content and acidity reached 0.976 and 0.906, respectively. …”
    Get full text
    Article
  12. 1872

    Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments by Cancan Tao, Bowen Liu

    Published 2024-12-01
    “…Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
    Get full text
    Article
  13. 1873

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  14. 1874

    First- and Second-Order Centrodes of Both Coupler Links of Stephenson III Six-Bar Mechanisms by Giorgio Figliolini, Chiara Lanni, Luciano Tomassi

    Published 2025-01-01
    “…The position vectors of both pairs of instantaneous centers of rotation and acceleration centers are expressed as vector functions of the driving input angle of the mechanism and apply the fundamental theorems for velocities and accelerations, respectively. Thus, the proposed algorithm has been formulated by using vector algebra and validated through significant numerical and graphical results by devoting particular attention to the cases in which the second coupler link shows an instantaneous stop configuration, along with those where the first four-bar linkage reaches an asymptotic configuration. …”
    Get full text
    Article
  15. 1875

    Reservoir optimization with differential evolution by Phan Thi Thu Phuong, Hoang Van Lai, Bui Dinh Tri

    Published 2016-03-01
    “…This method is an improved variant of GA to converge and reach to the optimal solution faster than the traditional GA. …”
    Get full text
    Article
  16. 1876

    KFCM-PSOTD : An Imputation Technique for Missing Values in Incomplete Data Classification by Muhaimin Ilyas, Syaiful Anam, Trisilowati Trisilowati

    Published 2024-05-01
    “…The outcomes demonstrate that the KFCM-PSOTD algorithm has a better performance; even the difference in evaluation scores obtained reaches 10% better than other imputation techniques.…”
    Get full text
    Article
  17. 1877

    Using Interval Operations in the Hungarian Method to Solve the Fuzzy Assignment Problem and Its Application in the Rehabilitation Problem of Valuable Buildings in Egypt by M. A. Elsisy, A. S. Elsaadany, M. A. El Sayed

    Published 2020-01-01
    “…Then, the interval arithmetic operations and the order relations are applied to get the optimal solution by utilizing the modified Hungarian method. The proposed algorithm requires less efforts and time to reach optimality, compared to the existing methods. …”
    Get full text
    Article
  18. 1878

    Two-Stage User Identification Based on User Topology Dynamic Community Clustering by Jiajing Zhang, Zhenhua Yuan, Neng Xu, Jinlan Chen, Juxiang Wang

    Published 2021-01-01
    “…Finally, the iteration is repeated until no new matching user pairs are generated, or the set number of iterations is reached. Experiments conducted on real-world social networks Twitter-Foursquare datasets demonstrate that compared with the global user matching method and hidden label node method, the average accuracy of the proposed UIUTDC algorithm is improved by 33% and 26.8%, respectively. …”
    Get full text
    Article
  19. 1879

    Research on Multimodal Control Method for Prosthetic Hands Based on Visuo-Tactile and Arm Motion Measurement by Jianwei Cui, Bingyan Yan

    Published 2024-12-01
    “…To control the grasping attitude, a fusion algorithm based on information of upper limb motion state, hand position, and lesser toe haptics was proposed to realize control of the robotic grasping process with a human in the ring. …”
    Get full text
    Article
  20. 1880

    Mobile Robot Path Planning Using Polyclonal-Based Artificial Immune Network by Lixia Deng, Xin Ma, Jason Gu, Yibin Li

    Published 2013-01-01
    “…So, mobile robot can avoid obstacles, escape traps, and reach the goal with optimum path and faster convergence speed.…”
    Get full text
    Article