-
13181
Texture Analysis and Classification using Local Binary Patterns and Statistical Features
Published 2024-09-01“…The combined use of local and global texture information is helpful in the presented problem when prioritizing the recognition of complex texture patterns that cannot be deciphered by a single algorithm. To demonstrate the efficiency of the proposed hybrid method, several experiments are performed on several texture databases. …”
Get full text
Article -
13182
Fault Diagnosis Method for Rolling Bearing Based on Sparse Principal Subspace Discriminant Analysis
Published 2022-01-01“…The experimental results demonstrated that the feasibility and effectiveness of the proposed fault diagnosis model based on a sparse principal subspace discriminant analysis algorithm can achieve higher recognition accuracy than fisher discriminant analysis and its extensions, and it is relatively insensitive to the impact of noise and outliers owing to the sparse property.…”
Get full text
Article -
13183
A Roller Bearing Fault Diagnosis Method Based on LCD Energy Entropy and ACROA-SVM
Published 2014-01-01“…This study investigates a novel method for roller bearing fault diagnosis based on local characteristic-scale decomposition (LCD) energy entropy, together with a support vector machine designed using an Artificial Chemical Reaction Optimisation Algorithm, referred to as an ACROA-SVM. First, the original acceleration vibration signals are decomposed into intrinsic scale components (ISCs). …”
Get full text
Article -
13184
First in Vivo SPECT Imaging of Mouse Femorotibial Cartilage Using Tc-NTP 15-5
Published 2008-11-01“…Tomographic reconstruction of SPECT data was performed with a three-dimensional ordered subset expectation maximization algorithm, and slices were reconstructed in three axes. 99m Tc-NTP 15-5 rapidly accumulated in the joint, with a peak of radioactivity being reached from 5 minutes postinjection and maintained for at least 90 minutes. …”
Get full text
Article -
13185
On Calibration and Direction Finding with Uniform Circular Arrays
Published 2019-01-01“…Furthermore, local calibration, where array calibration measurements are incorporated in the DF algorithm, is considered as well. Common DF algorithms will be outlined, their assumptions regarding array properties will be addressed, and required preprocessing steps such as the beam-space transformation will be presented. …”
Get full text
Article -
13186
Time-Dependent Transportation Network Design considering Construction Impact
Published 2018-01-01“…A time-dependent DNDP (T-DNDP) model is developed with the objective of minimizing total weighted net user cost during the entire planning horizon. An active-set algorithm is applied to solve the model. A simple example network is first utilized to demonstrate the necessity of considering the construction process in T-DNDP and to illustrate the trade-off between the construction impact and the benefit realized through capacity extension. …”
Get full text
Article -
13187
A Decision-Making Model Using Machine Learning for Improving Dispatching Efficiency in Chengdu Shuangliu Airport
Published 2020-01-01“…The mathematical methods such as function equation, BP neural network algorithm, and queuing theory were used to establish a complete decision-making model for taxi drivers and an optimization model of dispatching efficiency at the airport. …”
Get full text
Article -
13188
Bearing Fault Diagnosis Method Based on Multidomain Heterogeneous Information Entropy Fusion and Model Self-Optimisation
Published 2022-01-01“…Nineteen key model parameters that were required for HSMSF construction were selected by adaptive optimisation using the chaos elitist modified sparrow search algorithm (CEI-SSA), and a self-learning diagnostic model that is suitable for multiple detection points was constructed. …”
Get full text
Article -
13189
Latency Improvement Strategies for Reliability-Aware Scheduling in Industrial Wireless Sensor Networks
Published 2015-10-01“…Moreover, SchedEx executes orders of magnitude faster than recent algorithms in the literature while producing schedules with competitive latencies. …”
Get full text
Article -
13190
Using Propensity Score Matching Technique to Estimate Utilization and Costs of General Practitioners’ Services associated with Alzheimer’s Disease
Published 2016-03-01“…Propensity scores were then estimated using the generalized boosted model, a multivariate, nonparametric and automated algorithm technique. **Setting:** Observational data from Statistics Denmark registry. …”
Get full text
Article -
13191
Global Alignment of Pairwise Protein Interaction Networks for Maximal Common Conserved Patterns
Published 2013-01-01“…In view of this, we introduce a connected-components based fast algorithm, HopeMap, for network alignment. Observing that the size of true orthologs across species is small comparing to the total number of proteins in all species, we take a different approach based on a precompiled list of homologs identified by KO terms. …”
Get full text
Article -
13192
Research on Equivalent Method of Bench Fatigue Tests for Main Reducers
Published 2024-06-01“…By collecting the actual driving load spectrum of users and the test site, the road condition and road load spectrum of the test site are reconstructed by using rain-flow counting and elite strategy non-dominated sorting genetic algorithm. In order to verify the effectiveness of the equivalent method, the finite element model of the main reducer is established and the static strength analysis is carried out to verify the mesh independence and model validity. …”
Get full text
Article -
13193
Improved Set-point Tracking Control of an Unmanned Aerodynamic MIMO System Using Hybrid Neural Networks
Published 2024-03-01“…ANN as a Hybrid intelligent control strategy of ANN in combination with Pattern Search and Genetic Algorithm, is then utilized to optimize the parameters of the neural networks. …”
Get full text
Article -
13194
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview
Published 2024-12-01“…The purpose of anomaly detection is to develop methods that can detect attackers' attacks and prevent them from happening again. Algorithms and methods based on statistics play an important role in predicting and diagnosing anomalies. …”
Get full text
Article -
13195
Compressed Measurements Based Spectrum Sensing for Wideband Cognitive Radio Systems
Published 2015-01-01“…In this paper, we propose a novel compressed detector using energy detection technique on compressed measurements sensed by the discrete cosine transform (DCT) matrix. The proposed algorithm not only reduces the computational complexity but also provides a better performance than the traditional energy detector and the traditional compressed detector in terms of the receiver operating characteristics. …”
Get full text
Article -
13196
The Performance of Resistance Progressive Collapse Analysis for High-Rise Frame-Shear Structure Based on OpenSees
Published 2017-01-01“…Method of deleting failure component elements was presented, as well as the model solving algorithm. The FEM was validated by the completed structure test. …”
Get full text
Article -
13197
Analysis of Meshing Contact Characteristics of the Gear Transmission System Based on Data Mining Technology
Published 2023-03-01“…Then, the prediction model of meshing contact characteristics of the system is established using support vector machine and random forest algorithm, which realizes the efficient prediction of meshing contact characteristics of the system. …”
Get full text
Article -
13198
Numerical Solutions of Duffing Van der Pol Equations on the Basis of Hybrid Functions
Published 2023-01-01“…Resolved governance equation using the Runge-Kutta fourth order algorithm with the stepping time 0.01 s via numerical solution. …”
Get full text
Article -
13199
Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50
Published 2025-01-01“…We used the face detector algorithm called Multi-Task Cascaded Convolutional Neural Network (MTCNN) for face detection with 99.8% accuracy. …”
Get full text
Article -
13200
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Published 2015-01-01“…State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. …”
Get full text
Article