-
21
An approach to improve grounding resistance characteristic in existing 115 KV transmission towers
Published 2024-12-01Get full text
Article -
22
DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption
Published 2025-04-01“…Very well-established encryption mechanisms such as AES, RC4, and XOR cannot strike a balance between speed, energy consumption, and robustness. …”
Get full text
Article -
23
Dam Crack Instance Segmentation Algorithm Based on Improved YOLOv8
Published 2025-01-01“…Dam cracks are typically morphologically complex and suffer from severe background interference. Current algorithms often struggle to strike a balance between detection accuracy and segmentation precision. …”
Get full text
Article -
24
An improved polar lights optimization algorithm for global optimization and engineering applications
Published 2025-04-01“…Abstract The study proposes an enhanced, high-caliber Population Evolution Polar Lights Optimization (IPLO) algorithm to address the shortcomings of the existing Polar Lights Optimization (PLO) method. …”
Get full text
Article -
25
Improved YOLOv8-Based Algorithm for Citrus Leaf Disease Detection
Published 2025-01-01“…In view of the small difference between citrus leaf diseases which can lead to false inspection and missed inspection, an improved YOLOv8 citrus leaf disease detection algorithm is proposed. The proposed approach uses YOLOv8n as the base model and introduces adaptive convolution into the Backbone, allowing the model to dynamically prioritize different disease features. …”
Get full text
Article -
26
MAOA: A Swift and Effective Optimization Algorithm for Linear Antenna Array Design
Published 2025-05-01“…This paper presents the modified arithmetic optimization algorithm (MAOA), a swift and effective optimization algorithm specifically designed for electromagnetic applications. …”
Get full text
Article -
27
A cyclic redundancy check aided encoding construction method for list sphere polar decoder
Published 2025-08-01“…In contrast, the list sphere decoding (LSD) algorithm strikes a balance between performance and complexity. …”
Get full text
Article -
28
Self-adapted task allocation algorithm with complicated coalition in wireless sensor network
Published 2014-03-01“…Considering the real-time requirement and some specific limitations (e.g.insufficient computing resource,energy constraint,etc) in task scheduling of wireless sensor networks,different priorities were assigned to tasks according to their deadline,and an adaptive task allocation algorithm with complicated coalition was designed through analyzing historical information.Moreover,a discrete particle swarm optimization algorithm was designed via employing binary matrix coding form.The proposed optimization algorithm generates coalitions in parallel and then performs subtask allocation algorithm based on load and energy balance.Finally,the experimental results show that the proposed algorithm strikes a good balance between local solution and global exploration,and achieves a satisfactory result within a short period of time.…”
Get full text
Article -
29
Self-adapted task allocation algorithm with complicated coalition in wireless sensor network
Published 2014-03-01“…Considering the real-time requirement and some specific limitations (e.g.insufficient computing resource,energy constraint,etc) in task scheduling of wireless sensor networks,different priorities were assigned to tasks according to their deadline,and an adaptive task allocation algorithm with complicated coalition was designed through analyzing historical information.Moreover,a discrete particle swarm optimization algorithm was designed via employing binary matrix coding form.The proposed optimization algorithm generates coalitions in parallel and then performs subtask allocation algorithm based on load and energy balance.Finally,the experimental results show that the proposed algorithm strikes a good balance between local solution and global exploration,and achieves a satisfactory result within a short period of time.…”
Get full text
Article -
30
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
31
Research on dimension measurement algorithm for parcel boxes in high-speed sorting system
Published 2025-07-01“…In addition, it is difficult for existing parcel box detection algorithms to strike a balance between identification efficiency, identification accuracy and deployment cost. …”
Get full text
Article -
32
Energy management strategy for hybrid electric vehicle based on improved PPO algorithm
Published 2025-06-01“…In order to improve the economy of power-split hybrid electric vehicle (HEV),a longitudinal dynamics model of the entire HEV vehicle was established,and an energy management strategy (EMS) based on strategy entropy optimization with an improved proximal policy optimization (PPO) algorithm was proposed. The algorithmic framework was simplified by employing an experience pooling mechanism based on traditional PPO algorithm,and only one deep neural network was used for interactive training and updating to reduce the complexity of parameter synchronization in the policy network. …”
Get full text
Article -
33
Simulation Analysis of Temperature Field of Optical Fiber Composite Overhead Ground Wire
Published 2019-10-01“…Finally, an analysis is made on the temperature field distribution of OPGW under lightning strike and the high temperature hazard of lightning strike.…”
Get full text
Article -
34
Two-Stage Evolutionary Algorithm Based on Subspace Specified Searching for Hyperspectral Endmember Extraction
Published 2024-01-01“…We propose a two-stage, evolutionary-based EE algorithm, referred to as TSEA, designed to confront these issues. …”
Get full text
Article -
35
Ornithological flight safety as a task of decision making in conditions of uncertainty
Published 2024-05-01“…The problem of aircraft collision with birds (bird strike) is becoming more relevant with the growing trends of air transportation. …”
Get full text
Article -
36
Mission-oriented capability evaluation for combat network based on operation loops
Published 2024-12-01Get full text
Article -
37
Automatic detection of human gait events: a simple but versatile 3D algorithm
Published 2025-05-01“…Method We developed a deterministic algorithm called the Multi-Condition algorithm. This algorithm identifies the Foot Strike when the first of the foot markers loses its degrees of freedom and the Foot Off when the last of the foot markers regains its degrees of freedom. …”
Get full text
Article -
38
Research on Reactor Radiation Shielding Optimization Method Based on Multi-objective Evolutionary Algorithm
Published 2024-06-01“…This paper introduced two multi-objective evolutionary algorithms, utilizing a non-dominated sorting genetic algorithm (NSGA-Ⅲ) based on reference point selection and a multi-objective artificial bee colony (MOABC) algorithm based on crowding distance selection. …”
Article -
39
Quantum Marine Predator Algorithm: A Quantum Leap in Photovoltaic Efficiency Under Dynamic Conditions
Published 2024-11-01“…The Quantum Marine Predator Algorithm (QMPA) presents a groundbreaking solution to the inherent limitations of conventional Maximum Power Point Tracking (MPPT) techniques in photovoltaic systems. …”
Get full text
Article -
40
An Open-Source Algorithm for Correcting Stress Wave Dispersion in Split-Hopkinson Pressure Bar Experiments
Published 2025-01-01“…To do this, an innovative computational algorithm, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="monospace">SHPB</mi><mtext>_</mtext><mi mathvariant="monospace">Processing</mi><mo>.…”
Get full text
Article