-
11001
Shadow Separation of Pavement Images Based on Morphological Component Analysis
Published 2021-01-01“…A shadow separation algorithm based on morphological component analysis (MCA) is proposed herein to solve the shadow problem of road imaging. …”
Get full text
Article -
11002
Multi-scale guided filtering integrated with superpixel and patch shift
Published 2022-11-01“…In order to avoid the phenomenon that edges were easily blurred during filtering, a multi-scale guided filtering integrated with superpixel and patch shift was proposed.Firstly, the bilateral filtering was applied to an input image to get more accurate superpixel regions.Then, the overlapping was used as the final filtering region, which was formed by the local window and the superpixel.The local window was selected by a metric function so that it did not contain edge information as much as possible.Finally, a small-scale window was used to preserve the edges, and then the window scale was increased for iterative guided filtering.The final filtering output was calculated by fusing the results of different window scales to smooth details while preserving the structural edges.Additionally, the evaluation index of filtering results quality was proposed and compared in different algorithms.The proposed algorithm has stronger edge preservation ability and can obtain better filtering effectiveness than other algorithms.…”
Get full text
Article -
11003
INTELLIGENT LIQUID LEVEL CONTROL OF A COUPLED NONLINEAR THREE TANK SYSTEM SUBJECTED TO VARIABLE FLOW PARAMETERS
Published 2021-06-01“…The proposed controllers are designed with the same neural network architecture and algorithm. Comparison of the system with the proposed controllers for tracking a step and random level set points for a fixed and variable flow parameter and some good results have been obtained. …”
Get full text
Article -
11004
Self-Adaptive Predictor-Corrector Approach for General Variational Inequalities Using a Fixed-Point Formulation
Published 2022-01-01“…Convergence analyses of the suggested algorithm are demonstrated. Moreover, numerical analysis shows that we establish the new best method for solving general variational inequality which performs better than the previous one. …”
Get full text
Article -
11005
LEO satellite constellation design with multi-QoS guarantee for non-terrestrial network
Published 2023-12-01“…LEO satellite constellation (LSC) offers seamless and fast connectivity for non-terrestrial network (NTN).However, the lack of QoS guarantees for users significantly impacts the performance of the NTN system.Considering multi-QoS metrics, a capacity and downlink budget model for LSC was established, and subsequently, the establishment of inter-satellite links was framed as a link budget issue for the QoS guarantee.The non-dominated sorting genetic algorithm (INSGA-II) with improved crossover and mutation operators was proposed to optimize LSC, aiming to maximize coverage and system capacity while minimizing constellation costs.The numerical results demonstrate that the designed LSC exhibits comparable or superior performance to Telesat and Kepler, and its scale is only 64% of the Kepler system.…”
Get full text
Article -
11006
A Population-Based Optimization Method Using Newton Fractal
Published 2019-01-01“…We propose a deterministic population-based method for a global optimization, a Newton particle optimizer (NPO). The algorithm uses the Newton method with a guiding function and drives particles toward the current best positions. …”
Get full text
Article -
11007
Clinical Practice Guideline for the Care of Elderly Patients Hospitalized with Delirium
Published 2015-06-01“…It highlights the clinical and therapeutic aspects of this complex syndrome. An algorithm that facilitates the management of this condition at Dr. …”
Get full text
Article -
11008
Sparsity-Based Robust Bistatic MIMO Radar Imaging in the Presence of Array Errors
Published 2020-01-01“…The impact of multiplicative array gain-phase errors is changed to be additive through model reformulation, and transmit-receive angle imaging is formulated to a sparse total least square signal problem. Then, an iterative algorithm is proposed to solve the optimization problem. …”
Get full text
Article -
11009
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
Published 2015-04-01“…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
Get full text
Article -
11010
Bus Route Design Problem for Rural Tourism Objectives: A Multiobjective Approach
Published 2022-01-01“…A solution approach is put forward based on the initial solution set generation procedure and strengthens the elitist genetic algorithm. Finally, the bus network in a rural tourism destination of Nanjing is taken as the case study to validate the feasibility and efficiency of the proposed model.…”
Get full text
Article -
11011
A Scalable MAC Protocol Supporting Simple Multimedia Traffic QoS in WSNs
Published 2011-08-01“…And if there are the some link failures in multi-hop transmission, the protocol can recover the links quickly. Using this algorithm, the proposed MAC protocol outperforms the IEEE 802.11e EDCF and the IEEE 802.15.4 MAC protocol in terms of the end-to-end delay and stable transmission of multimedia streaming data.…”
Get full text
Article -
11012
Financial Risk Avoidance Based on the Sensor Network and Edge Computing
Published 2022-01-01“…In order to improve the effect of financial risk aversion, this paper studies the financial risk aversion system combined with the edge computing method of the sensor network and proposes a sensor data anomaly detection algorithm based on the offset distance. Moreover, this paper divides the sensor data into several sliding windows according to the time series, analyzes the offset between the data object and other data in the sliding window by calculating the offset distance, and uses the abnormal level to indicate the possibility of data abnormality. …”
Get full text
Article -
11013
Ecological modelling: A computational analysis of air pollution discourses in English print media of India and Pakistan.
Published 2025-01-01“…The study applied Latent Dirichlet Allocation (LDA), a robust algorithm for analyzing the large text corpus. The study underpinned Computational Grounded Theory, which relies on the fact that computation is a way to reveal the hidden meanings beyond the text. …”
Get full text
Article -
11014
Optimization for Due-Window Assignment Scheduling with Position-Dependent Weights
Published 2020-01-01“…Optimal properties of the problem are given, and then, a polynomial-time algorithm is provided to solve the problem. An extension to the problem is offered by assuming general position-dependent processing time.…”
Get full text
Article -
11015
Selective Extraction of Entangled Textures via Adaptive PDE Transform
Published 2012-01-01“…The present work introduces adaptive PDE transform algorithm to appropriately threshold the statistical variance of the local variation of functional modes. …”
Get full text
Article -
11016
Fault Feature Extraction Method of Gearbox based on Parameter Optimization VMD
Published 2020-03-01“…Firstly,the drosophila optimization algorithm is used to search for the most optimal combination of the variational mode decomposition's <italic>K</italic> and <italic>α</italic>,aiming at the minimum local entropy of the decomposition result. …”
Get full text
Article -
11017
Adaptive Optimal 𝑚-Stage Runge-Kutta Methods for Solving Reaction-Diffusion-Chemotaxis Systems
Published 2011-01-01“…Yet, theorems about stability and convergence of the algorithm are provided in analyzing robustness and efficiency. …”
Get full text
Article -
11018
Eenergy effiency access strategy:towards hybrid wireless sensor network
Published 2013-09-01“…A dynamically access mechanism of non-real-time sensor nodes with adaptive listening and sleeping,against the background,co-existence of real-time traffic and non-real-time traffic in the networks,was studied.The energy consumption is very slow while the node is in a sleep state; however,the long sleep time may make the network nodes miss transmission opportunity.Thus,according to the usage of the channel,a reasonable set of wireless sensor network nodes sleep time in the network energy consumption and transmission efficiency could be adjusted to maximize the energy transmission efficiency of wireless sensor network.Firstly,the continuous-time Markov modeling the problem was used and analyzed.Then system model based on perturbation analysis theory was proposed to obtain the gradient algorithm for solving the optimal sleep time.Finally,the feasibility of the recommended program is verified by comparing the theoretical results and computer simulation.…”
Get full text
Article -
11019
Analysis of the Indicators Based on the DS/FH TT&C System
Published 2013-02-01“…The novelty and importance in testing of TT&amp;C were analyzed;the meaning of the indicators from both qualitative and quantitative aspects was defined;the test method of the indicators was provided,and a new algorithm used to correct the test error about the stability of the hopping pattern was proposed. …”
Get full text
Article -
11020
Estimation of Concentrations Parameters in the Model of Mixture with Varying Concentrations
Published 2025-01-01“…Consistency of the LS estimator is demonstrated. A fast algorithm for the LS estimator calculation is presented. …”
Get full text
Article