Suggested Topics within your search.
Suggested Topics within your search.
-
5221
Real time wire rope detection method based on Rockchip RK3588
Published 2025-08-01“…Conventional model training and algorithmic computations rely on server-based systems, requiring significant computational resources. …”
Get full text
Article -
5222
On the Satisfiability and Model Checking for one Parameterized Extension of Linear-time Temporal Logic
Published 2021-12-01“…Sequential reactive systems are computer programs or hardware devices which process the flows of input data or control signals and output the streams of instructions or responses. …”
Get full text
Article -
5223
A decision-theoretic framework for wastewater treatment performance assessment based on a fuzzy parameterized fuzzy hypersoft set approach
Published 2025-07-01“…With proper fuzzy parameterization of each sub-attribute, novel specialized FPFHSS based Technique of Ordered Preference Similar to Ideal Solution (TOPSIS) and Multi-Objective Optimization on the basis of a Ratio Analysis (MULTIMOORA) approaches are developed that provide a versatile analysis in addition to the newly developed algorithm. With these 3 specialized systems, 4 case studies were developed based on 19 pseudo-realistic environmental, social, technical, and economic factors each simulating a different scenario faced by nations highlighting sustainability, technical performance and the environment allowing for informed decision-making while addressing uncertainty making them highly suitable as a computational AI solution for real-data analysis. …”
Get full text
Article -
5224
LOGICAL AND COMPETENCY APPROACH IN LEARNING SPORTS DISCIPLINES
Published 2016-12-01“…The interrelation between cultural and professional competences and the basic information through a modular system, step0by0step algorithm of skills is shown.…”
Get full text
Article -
5225
Research on Camouflage Recognition in Simulated Operational Environment Based on Hyperspectral Imaging Technology
Published 2021-01-01“…According to their similarities and differences between them and referenced spectrum, the models of classification were established by combining the Naive Bayes (NB) algorithm, K-nearest neighbour (KNN) algorithm, random forest (RF) algorithm, and support vector machine (SVM) algorithm. …”
Get full text
Article -
5226
Digital Inspection Technology for Sheet Metal Parts Using 3D Point Clouds
Published 2025-08-01“…Feature points are extracted via the intrinsic shape signatures (ISS) algorithm and described using the fast point feature histograms (FPFH) algorithm. …”
Get full text
Article -
5227
Pengembangan Jadwal Shift Staf Editor Video pada Stasiun Televisi Nasional Trans7 berbasis Android menggunakan Algoritma Ant Colony dengan Firebase
Published 2020-02-01“…Tests are carried out on the results of algorithm calculations, functional systems, integration, and feedback to the system by looking for errors on the software interface, and direct use testing to users. …”
Get full text
Article -
5228
Application of Vector Sensors to Acoustic Surveillance of a Public Interior Space
Published 2013-10-01“…The system set up in a lecture hall, which serves as a demonstrator of the proposed technology, is described. …”
Get full text
Article -
5229
Improved Rao-Blackwellized Particle Filter by Particle Swarm Optimization
Published 2013-01-01Get full text
Article -
5230
Vision-Based Control of Robotic Arm Mounted on Unmanned Surface Vehicle for Rocket Recovery
Published 2025-01-01“…To detect and localize the landing rockets, a depth camera sensor and an advanced You Only Look Once Version Eight (YOLOv8) object-detection algorithm were employed. To train the YOLO algorithm, a customized bespoke dataset was developed for rocket identification. …”
Get full text
Article -
5231
Research on Feed Forward Adaptive-generalized Model Predictive Control for High-speed Train Automatic Operation
Published 2024-02-01“…High-speed automatic train operation (ATO) systems inherently exhibit strong nonlinearity and uncertainty. …”
Get full text
Article -
5232
A New Stress Monitoring Method for Mechanical State of Buried Steel Pipelines under Geological Hazards
Published 2022-01-01“…Long-distance pipelines are threatened by a variety of natural geological hazards. A stress monitoring system driven by the strain-stress solution algorithm was proposed; it can achieve real-time maximum axial stress measurement by installing vibrating wire gauges (VWGs) on the surface of the pipe. …”
Get full text
Article -
5233
Microgrid Energy Management Considering Energy Storage Degradation Cost
Published 2025-04-01“…The improved sine cosine algorithm (SCA) is used to simulate the energy output optimization of various distributed generators in the microgrid. …”
Get full text
Article -
5234
Quantum-Inspired MoE-Based Optimal Operation of a Wave Hydrogen Microgrid for Integrated Water, Hydrogen, and Electricity Supply and Trade
Published 2025-02-01“…The system incorporates a desalination unit to provide the island with fresh water and feed the electrolyzer to produce hydrogen. …”
Get full text
Article -
5235
Research Progress and Application of UAV Multi-Sensor Data Fusion Technology
Published 2025-01-01“…It is believed that with multi - field technology integration, the technology will develop towards algorithm intelligence, hardware miniaturization and system collaboration.…”
Get full text
Article -
5236
Path Planning of Unmanned Autonomous Helicopter Based on Human-Computer Hybrid Augmented Intelligence
Published 2021-01-01“…Unmanned autonomous helicopter (UAH) path planning problem is an important component of the UAH mission planning system. The performance of the automatic path planner determines the quality of the UAH flight path. …”
Get full text
Article -
5237
-
5238
Uniform Coverage Trajectory Planning for Polishing of Equation-Free Surfaces
Published 2025-06-01Get full text
Article -
5239
IT Parkinson’s Disease Diagnostics Based on the Freezing of Gait Analysis Using Long Short Term Memory Neural Network
Published 2024-06-01“…Next, a data enhancement algorithm was used to balance the number of samples in the data sets. …”
Get full text
Article -
5240
Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora
Published 2022-12-01“…In the known-plaintext-attack attack test, the attacker failed to find the original key used in the 128-bit Clefia algorithm, so the attacker failed to attack the system. …”
Get full text
Article