Suggested Topics within your search.
Suggested Topics within your search.
-
241
The optimization model of building construction based on BIM and improved NSGA-III algorithm
Published 2025-06-01“…The cost of optimizing the original non-dominated sorting genetic algorithm III was 184.6469 million yuan. The total cost of optimizing the research algorithm was 184.1165 million yuan. …”
Get full text
Article -
242
A 3D Face Recognition Algorithm Directly Applied to Point Clouds
Published 2025-01-01Get full text
Article -
243
A new RS steganalysis algorithm of detecting UnderMP3Cover
Published 2018-04-01“…A new RS steganalysis algorithm to attack UnderMP3Cover was proposed.By analyzing the error caused by the RS algorithm,the choice of resolution function,the initial bias and the fitting method were modified,the flip operator was also selected in the experiment.Experimental results demonstrate that the proposed method can estimate the length of embedded message effectively and the average error reduces to 2%,which is better than the existing algorithms.…”
Get full text
Article -
244
Coverage Optimization Algorithm Based on Sampling for 3D Underwater Sensor Networks
Published 2013-09-01“…We propose a coverage optimization algorithm based on sampling to enhance the coverage of 3D underwater sensor networks. …”
Get full text
Article -
245
Research on Wellbore Trajectory Optimization and Drilling Control Based on the TD3 Algorithm
Published 2025-06-01“…This research shows that the TD3 algorithm is superior to the multi-objective optimization algorithm in optimizing key parameters, such as well deviation, kickoff point (KOP), and trajectory length, especially in well deviation and KOP optimization. …”
Get full text
Article -
246
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
Published 2023-02-01Subjects: “…Container, Gravitational Search Algorithm, Mathematics, Teaching Learning Based Optimization Algorithm, 3-D Packing…”
Get full text
Article -
247
Improved Crosstalk Reduction on Multiview 3D Display by Using BILS Algorithm
Published 2014-01-01“…In multiview three-dimensional (3D) displays, crosstalk is one of the most annoying artefacts degrading the quality of the 3D image. …”
Get full text
Article -
248
Duty Cycle Algorithm for 3D Cable Routing in Rail Transit Vehicles
Published 2025-02-01“…To enable rapid calculation, analysis, and warning of cable routing duty cycles, and to improve the safety and reliability for heat dissipation and electromagnetic compatibility after cable design and assembly, a duty cycle algorithm for 3D cable routing in rail transit vehicles is investigated, aiming to enhance the product performance. …”
Get full text
Article -
249
A 3D Offline Packing Algorithm considering Cargo Orientation and Stability
Published 2023-01-01Get full text
Article -
250
A Substitution Algorithm for Dataflow Network Agents on Smart-M3 Platform
Published 2013-08-01“…The paper presents an agent substitution algorithm for a dataflow network implemented on the Smart-M3 platform. …”
Get full text
Article -
251
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
252
A 3D sensor based deflection correction algorithm for belt layer
Published 2022-06-01“…In order to solve the problem that the center position of the belt layer is offset during transmission, a 3D sensor based belt layer deviation correction algorithm is proposed in this paper. …”
Get full text
Article -
253
IOT Monitoring System for Ship Operation Management Based on YOLOv3 Algorithm
Published 2022-01-01“…Combined with the YOLOv3 algorithm, the Darknet network developed on the Internet of Things offers boat maintenance, design, and deployment to meet the needs of developing and implementing the Internet of Things-based ship management. …”
Get full text
Article -
254
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
255
Examining the empathy levels of medical students using CHAID analysis
Published 2025-05-01Subjects: Get full text
Article -
256
-
257
Implementation of the C4.5 Algorithm in Predicting the Interest of Prospective Students in Choosing Higher Education
Published 2025-01-01Subjects: Get full text
Article -
258
RELIABILITY ESTIMATION OF MECHANICAL SEALS BASED ON ARTIFICIAL HUMMINGBIRD ALGORITHM AND THREE⁃PARAMETER WEIBULL DISTRIBUTION
Published 2024-08-01Subjects: Get full text
Article -
259
-
260
Bridge Deformation Monitoring Combining 3D Laser Scanning with Multi-Scale Algorithms
Published 2025-06-01Subjects: “…Multi-Scale Model-to-Model Cloud Comparison (M3C2) algorithm…”
Get full text
Article