Suggested Topics within your search.
Suggested Topics within your search.
-
141
Research on the Application of Deep Learning Algorithm in the Damage Detection of Steel Structures
Published 2025-01-01Get full text
Article -
142
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01Get full text
Article -
143
Research on Robot Path Planning Based on Improved RRT-Connect Algorithm
Published 2025-02-01Get full text
Article -
144
Research on path planning of mobile robots based on improved A* algorithm
Published 2025-02-01Get full text
Article -
145
Research on the Multi-Armed Bandit Algorithm in Path Planning for Autonomous Vehicles
Published 2025-01-01“…Further in-depth research and exploration are crucial for fully utilizing the advantages of MAB algorithm in path planning and promoting the sustainable development and enhancement of autonomous driving technology.…”
Get full text
Article -
146
Research on TOF⁃Based UWB Indoor Positioning Technology and Fusion Algorithms
Published 2025-04-01Get full text
Article -
147
Research on the A* Algorithm Based on Adaptive Weights and Heuristic Reward Values
Published 2025-03-01Get full text
Article -
148
Research on the Wavelet Denoising Algorithm for Thorpe Analysis Based on the Radiosonde Data
Published 2025-01-01Get full text
Article -
149
Research on the A* Algorithm for Automatic Guided Vehicles in Large-Scale Maps
Published 2024-11-01Get full text
Article -
150
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
151
Research and implementation of mobile DPI association algorithm with big data technology
Published 2017-12-01Get full text
Article -
152
Research on the Image Background Base Algorithm Based on the Factor Space Theory
Published 2023-08-01Get full text
Article -
153
Research on Target Tracking Algorithm of Micro-UAV Based on Monocular Vision
Published 2023-01-01Get full text
Article -
154
Research on the eLoran/GNSS Combined Positioning Algorithm and Altitude Optimization
Published 2025-02-01“…This paper investigates and optimizes the eLoran/GNSS combined positioning algorithm. The main research contributions are as follows: (a) Correcting the incorrect application of spatial coordinate transformation relations in the existing literature and re-deriving the eLoran/GNSS combined positioning algorithm based on the Andoyer–Lambert formula. …”
Get full text
Article -
155
Research on RFID anti-collision hybrid algorithm based on discrete processing
Published 2013-08-01Get full text
Article -
156
Research on the Capability Maturity Evaluation of Intelligent Manufacturing Based on Firefly Algorithm, Sparrow Search Algorithm, and BP Neural Network
Published 2021-01-01“…In order to overcome the shortcoming of SSA that it is easy to fall into the local optimum, the firefly disturbance strategy is introduced to improve it, a new sparrow search algorithm (FASSA) is proposed, and on this basis, an intelligent manufacturing capability maturity evaluation model based on the FASSA-BP algorithm is constructed. …”
Get full text
Article -
157
Improvement in panchromatic-guided denoising algorithm for research on Beijing SDGSAT-1 luminous remote sensing image denoising algorithm
Published 2025-08-01“…The Glimmer Imaging Unit (GIU) onboard Sustainable Development Science Satellite 1 (SDGSAT-1) provides higher-resolution nighttime image data for the study of remote sensing images, but the noise in the images can have a negative impact on experimental research. In this study, based on existing denoising algorithms, the OTSU threshold method is combined with a convolution window to identify noisy pixels. …”
Get full text
Article -
158
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01Get full text
Article -
159
Research on Optimum Design of Waste Recycling Network for Agricultural Production
Published 2025-07-01Get full text
Article -
160
Research on Multi-Target Point Path Planning Based on APF and Improved Bidirectional RRT* Fusion Algorithm
Published 2025-05-01Get full text
Article