-
101
A Unified Multi-Target Clever Eye Algorithm: Analytical Solutions and Application
Published 2025-06-01“…In this paper, by naturally extending CE to a multiple-target case, we propose a unified algorithm termed multi-target clever eye (MTCE). The theoretical results in CE prompt us to consider an interesting question: do the MTCE solutions also share a similar structure to those of CE? …”
Get full text
Article -
102
Weed Detection Algorithms in Rice Fields Based on Improved YOLOv10n
Published 2024-11-01“…Additionally, we proposed a lightweight detection head based on shared convolution and scale scaling, maintaining accuracy while reducing model parameters. …”
Get full text
Article -
103
Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset
Published 2010-12-01“…Genetic algorithms (GA) which is a model of genetic evolution, while Clonal selection theory (CST) is from models of the natural immune system NIS, the two models are from two different fields of Artificial Intelligence AI but they have portion of shared operations and objectives. …”
Get full text
Article -
104
Leveraging AI to Drive Timely Improvements in Patient Experience Feedback: Algorithm Validation
Published 2025-07-01“…This approach enhanced the accuracy and reliability of the algorithm, encouraged inter- and intraorganizational collaboration, and shared learning.…”
Get full text
Article -
105
Applications of digital health technologies and artificial intelligence algorithms in COPD: systematic review
Published 2025-02-01“…Methods A systematic search was conducted in PubMed and Web of Science for studies published up to December 2024 that applied AI algorithms in digital health for COPD management. Inclusion criteria focused on original research utilizing AI algorithms and digital health technologies for COPD, while review articles were excluded. …”
Get full text
Article -
106
Enhancing Diversity and Convergence in MMOPs with a Gaussian Similarity-Based Evolutionary Algorithm
Published 2025-01-01“…Multi-modal multi-objective optimization problems (MMOPs) are challenging due to multiple solutions sharing similar objective values. Existing algorithms for solving MMOPs typically evaluate the crowding in the decision space and objective space independently, leading to an imbalance in diversity between the two spaces. …”
Get full text
Article -
107
Intelligent Detection Algorithm for Concrete Bridge Defects Based on SATH–YOLO Model
Published 2025-02-01Get full text
Article -
108
A Federated Learning Algorithm That Combines DCScaffold and Differential Privacy for Load Prediction
Published 2025-03-01“…Experimental results demonstrate that the proposed algorithm enables federated training without the need for sharing raw load data, facilitating load scheduling and energy management operations in smart grids while safeguarding user privacy. …”
Get full text
Article -
109
Intrusion detection algorithm of wireless network based on network traffic anomaly analysis
Published 2025-06-01“…To promptly identify and mitigate abnormal behaviors while ensuring normal operation and security, this paper proposes an algorithm for detecting compromised nodes in wireless networks based on network traffic anomaly analysis. …”
Get full text
Article -
110
LE-YOLO: A Lightweight and Enhanced Algorithm for Detecting Surface Defects on Particleboard
Published 2025-07-01“…A dynamic mixed convolutional network module is introduced to construct a lightweight backbone architecture. Moreover, the Shared Dilated Feature Pyramid (SDFP) module is employed in the neck network, effectively reducing computational overhead while preserving detection accuracy. …”
Get full text
Article -
111
Algorithms to Identify Copied and Manipulated Spectrum Occupancy Data in Cognitive Radio Networks
Published 2025-01-01“…Spectrum Access Systems (SASs) and similar systems coordinate access to shared radio frequency bands to efficiently allocate the use of spectrum between users in a locality. …”
Get full text
Article -
112
RTL-Net: real-time lightweight Urban traffic object detection algorithm
Published 2025-05-01“…Secondly, the Lightweight Shared Convolutional Detection (LSCD) head was replaced to ensure the detection performance and significantly improve the lightweight performance of the algorithm. …”
Get full text
Article -
113
SACWOM: Synergistic Adaptive Congestion Window Optimization Mechanism for Self-Clocked Algorithm
Published 2025-01-01“…Congestion Control (CC) is essential in networked systems, especially in environments with strict delay and throughput requirements. While CC algorithms like Self-Clocked Rate Adaptation for Multimedia (SCReAM) and Bottleneck Bandwidth and Round-trip propagation time (BBR) have shown progress, each faces limitations: BBR encounters difficulty in balancing responsiveness and fairness when rapid fluctuations in network conditions arise, which can lead to inefficient performance in shared environments. …”
Get full text
Article -
114
Design and Application of Algorithm Intensive Environment for CMA Big Data and Cloud Platform
Published 2024-01-01“…The algorithm library facilitates the standardization, unified management and sharing of algorithms. …”
Get full text
Article -
115
Deep reinforcement learning-based resource reservation algorithm for emergency Internet-of-things slice
Published 2020-09-01“…Based on the requirements of ultra-low latency services for emergency Internet-of-things (EIoT) applications,a multi-slice network architecture for ultra-low latency emergency IoT was designed,and a general methodology framework based on resource reservation,sharing and isolation for multiple slices was proposed.In the proposed framework,real-time and automatic inter-slice resource demand prediction and allocation were realized based on deep reinforcement learning (DRL),while intra-slice user resource allocation was modeled as a shape-based 2-dimension packing problem and solved with a heuristic numerical algorithm,so that intra-slice resource customization was achieved.Simulation results show that the resource reservation-based method enable EIoT slices to explicitly reserve resources,provide a better security isolation level,and DRL could guarantee accuracy and real-time updates of resource reservations.Compared with four existing algorithms,dueling deep Q-network (DQN) performes better than the benchmarks.…”
Get full text
Article -
116
A lightweight UAV target detection algorithm based on improved YOLOv8s model
Published 2025-05-01“…To tackle these challenges, this paper proposes LW-YOLOv8, a lightweight object detection algorithm based on the YOLOv8s model for UAV deployment. …”
Get full text
Article -
117
A Lightweight Pavement Defect Detection Algorithm Integrating Perception Enhancement and Feature Optimization
Published 2025-07-01“…Secondly, the dynamic upsampling module DySample is introduced into the efficient feature pyramid, constructing a new feature fusion pyramid (Generalized Dynamic Sampling Feature Pyramid Network, GDSFPN) to optimize the multi-scale feature fusion effect. In addition, a shared detail-enhanced convolution lightweight detection head (SDCLD) was designed, which significantly reduces the model’s parameters and computation while improving localization and classification performance. …”
Get full text
Article -
118
Traffic environment perception algorithm based on multi-task feature fusion and orthogonal attention
Published 2025-06-01“…In the realm of autonomous driving, the design and implementation of collaborative multi-task perception algorithms pose significant challenges. These challenges are primarily rooted in the need for real-time processing speeds, effective feature sharing among diverse tasks, and seamless information fusion. …”
Get full text
Article -
119
Integrated energy microgrid bi-level game scheduling optimization taking into account electricity-heat-hydrogen enriched compressed natural gas coupling and shared energy storage
Published 2025-08-01“…Additionally, tiered carbon trading mechanisms, integrated demand response strategies, and shared energy storage are introduced to optimize carbon reduction on both the demand and storage sides while effectively constraining energy emissions. …”
Get full text
Article -
120
A Two-Phase Embedding Approach for Secure Distributed Steganography
Published 2025-02-01“…The algorithm effectively reduces key management complexity while enhancing resilience against sophisticated steganalytic attacks. …”
Get full text
Article