4,809 results
Search Results
2. Development and Validation of an Algorithm for the Digitization of ECG Paper Images.
- Author
-
Randazzo, Vincenzo, Puleo, Edoardo, Paviglianiti, Annunziata, Vallan, Alberto, and Pasero, Eros
- Subjects
- *
DIGITIZATION , *DIGITAL images , *ELECTROCARDIOGRAPHY , *HEART rate monitors , *PEARSON correlation (Statistics) , *MEASUREMENT errors , *HEART beat , *ALGORITHMS - Abstract
The electrocardiogram (ECG) signal describes the heart's electrical activity, allowing it to detect several health conditions, including cardiac system abnormalities and dysfunctions. Nowadays, most patient medical records are still paper-based, especially those made in past decades. The importance of collecting digitized ECGs is twofold: firstly, all medical applications can be easily implemented with an engineering approach if the ECGs are treated as signals; secondly, paper ECGs can deteriorate over time, therefore a correct evaluation of the patient's clinical evolution is not always guaranteed. The goal of this paper is the realization of an automatic conversion algorithm from paper-based ECGs (images) to digital ECG signals. The algorithm involves a digitization process tested on an image set of 16 subjects, also with pathologies. The quantitative analysis of the digitization method is carried out by evaluating the repeatability and reproducibility of the algorithm. The digitization accuracy is evaluated both on the entire signal and on six ECG time parameters (R-R peak distance, QRS complex duration, QT interval, PQ interval, P-wave duration, and heart rate). Results demonstrate the algorithm efficiency has an average Pearson correlation coefficient of 0.94 and measurement errors of the ECG time parameters are always less than 1 mm. Due to the promising experimental results, the algorithm could be embedded into a graphical interface, becoming a measurement and collection tool for cardiologists. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.
- Author
-
Wang, Shaofang, Pan, Jingguo, Cui, Yanrong, Chen, Zhongju, and Zhan, Wei
- Subjects
- *
ENTROPY (Information theory) , *IMAGING systems , *IMAGE encryption , *DNA , *ALGORITHMS , *PERMUTATIONS , *RSA algorithm - Abstract
At present, there is a growing emphasis on safeguarding image data, yet conventional encryption methods are full of numerous limitations. In order to tackle the limitations of conventional color image encryption methodologies, such as inefficiency and insufficient security, this paper designs an expedited encryption method for color images that uses DNA coding in conjunction with multiple chaotic systems. The encryption algorithm proposed in this paper is based on three-dimensional permutation, global scrambling, one-dimensional diffusion and DNA coding. First of all, the encryption algorithm uses three-dimensional permutation algorithms to scramble the image, which disrupts the high correlation among the image pixels. Second, the RSA algorithm and the SHA-256 hashing algorithm are utilized to derive the starting value necessary for the chaotic system to produce the key. Third, the image is encrypted by using global scrambling and one-dimensional diffusion. Finally, DNA coding rules are used to perform DNA computing. The experimental results indicate that the encryption scheme exhibits a relatively weak inter-pixel correlation, uniform histogram distribution, and an information entropy value approaching eight. This shows that the proposed algorithm is able to protect the image safely and efficiently. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Noncircular Distributed Source DOA Estimation with Nested Arrays via Reduced-Dimension MUSIC.
- Author
-
Chen, Kaiyuan, Chen, Weiyang, and Li, Jiaqi
- Subjects
- *
ARRAY processing , *DEGREES of freedom , *ALGORITHMS , *SIGNALS & signaling - Abstract
This paper focuses on the direction-of-arrival (DOA) estimation for noncircular coherently distributed (CD) sources with nested arrays. Usually, for point sources, sparse arrays have the potential to improve the estimation performance of algorithms by obtaining more degrees of freedom. However, algorithms have to be reconsidered for CD sources with sparse arrays and many problems arise. One thorny problem is the disappearance of displacement invariance of the virtual array manifold constructed by the virtualization technique. To deal with this issue, a nested array processing method for CD sources transmitting noncircular signals is proposed in this paper. Firstly, we construct the virtual sum-and-difference co-array by leveraging the noncircular quality of signals with a nested array. Then, an approximation is made to degrade CD sources into point sources. In this way, spatial smoothing techniques can be applied to restore the rank. Finally, in order to reduce the complexity, we modify the reduced-dimension MUSIC to estimate DOAs through a one-dimensional peak-searching procedure. The simulation results prove the superiority of our algorithm against other competitors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Study on the Robust Filter Method of SINS/DVL Integrated Navigation Systems in a Complex Underwater Environment.
- Author
-
Zhu, Tianlong, Li, Jian, Duan, Kun, and Sun, Shouliang
- Subjects
- *
INERTIAL navigation systems , *ADAPTIVE filters , *VELOCITY , *ALGORITHMS , *NAVIGATION - Abstract
This paper proposes an improved adaptive filtering algorithm based on the Sage–Husa adaptive Kalman filtering algorithm to address the issue of measurement noise characteristics impacting the navigation accuracy in strapdown inertial navigation system (SINS)/Doppler Velocity Log (DVL) integrated navigation systems. Addressing the non-positive definite matrix problem prevalent in traditional adaptive filtering algorithms and aiming to enhance measurement noise estimation accuracy, this method incorporates upper and lower thresholds determined by a discrimination factor. In the presence of abnormal measurement data, these thresholds are utilized to adjust the covariance of the innovation, subsequently re-estimating the system's measurement noise through a decision factor based on the innovation. Simulation and experiment results demonstrate that the proposed improved adaptive filtering algorithm outperforms the classical Kalman filter (KF) in terms of navigation accuracy and stability. Furthermore, the filtering performance surpasses that of the Sage–Husa algorithm. The simulation results in this paper show that the relative position positioning error of the improved method is reduced by 49.44% compared with the Sage–Husa filtering method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Research on Real-Time Roundup and Dynamic Allocation Methods for Multi-Dynamic Target Unmanned Aerial Vehicles.
- Author
-
Li, Jinpeng, Wei, Ruixuan, Zhang, Qirui, Shi, Ruqiang, and Jiang, Benqi
- Subjects
- *
RANDOM numbers , *ALGORITHMS , *SUCCESS , *TRACKING radar - Abstract
When multi-dynamic target UAVs escape, the uncertainty of the formation method and the external environment causes difficulties in rounding them up, so suitable solutions are needed to improve the roundup success rate. However, traditional methods can generally only enable the encirclement of a single target, and when the target is scattered and escaping, this will lead to encirclement failure due to the inability to sufficiently allocate UAVs for encirclement. Therefore, in this paper, a real-time roundup and dynamic allocation algorithm for multiple dynamic targets is proposed. A real-time dynamic obstacle avoidance model is established for the roundup problem, drawing on the artificial potential field function. For the escape problem of the rounding process, an optimal rounding allocation strategy is established by drawing on the linear matching method. The algorithm in this paper simulates the UAV in different obstacle environments to round up dynamic targets with different escape methods. The results show that the algorithm is able to achieve the rounding up of multiple dynamic targets in a UAV and obstacle scenario with random initial positions, and the task UAV, which is able to avoid obstacles, can be used in other algorithms for real-time rounding up and dynamic allocation. The results show that the algorithm is able to achieve the rounding up of multi-dynamic targets in scenarios with a random number of UAVs and obstacles with random locations. It results in a 50% increase in the rounding efficiency and a 10-fold improvement in the formation success rate. And the mission UAV is able to avoid obstacles, which can be used in other algorithms for real-time roundup and dynamic allocation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. High-Resolution Reconstruction of Temperature Fields Based on Improved ResNet18.
- Author
-
Ma, Leilei, Ma, Jungang, Zelminbek, Manlidan, and Zhang, Wenjun
- Subjects
- *
TEMPERATURE distribution , *FEATURE extraction , *COMPUTATIONAL complexity , *TEMPERATURE measurements , *DEEP learning , *ALGORITHMS - Abstract
High-precision measurement of temperature value distributions in production scenarios is of great significance for industrial production, but traditional temperature field reconstruction algorithms rely on the design of manual feature extraction methods with high computational complexity and poor generalization ability. In this paper, we propose a high-precision temperature field reconstruction algorithm based on deep learning, using an efficient adaptive feature extraction method for temperature field reconstruction. We design an improved temperature field reconstruction algorithm based on the ResNet18 neural network; introduce the CBAM attention mechanism in the model; and design a feature pyramid, using M-FPN, a multi-scale feature aggregation network fusing PAN and FPN, to make the extracted feature information propagate multi-dimensionally among different layers to improve the feature characterization ability. Finally, the mean square error is used to guide the model to optimize the training so that the model pays more attention to the data and reduces the large error to ensure that the gap between the predicted value and the real value is small. The experimental results show that the reconstruction accuracy of the improved algorithm presented in this paper is significantly better than that of the original algorithm in the case of typical peaked temperature field distributions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. DBSF-Net: Infrared Image Colorization Based on the Generative Adversarial Model with Dual-Branch Feature Extraction and Spatial-Frequency-Domain Discrimination.
- Author
-
Li, Shaopeng, Ma, Decao, Ding, Yao, Xian, Yong, and Zhang, Tao
- Subjects
- *
FEATURE extraction , *INFRARED imaging , *VISIBLE spectra , *STRUCTURAL stability , *ALGORITHMS - Abstract
Thermal infrared cameras can image stably in complex scenes such as night, rain, snow, and dense fog. Still, humans are more sensitive to visual colors, so there is an urgent need to convert infrared images into color images in areas such as assisted driving. This paper studies a colorization method for infrared images based on a generative adversarial model. The proposed dual-branch feature extraction network ensures the stability of the content and structure of the generated visible light image; the proposed discrimination strategy combining spatial and frequency domain hybrid constraints effectively improves the problem of undersaturated coloring and the loss of texture details in the edge area of the generated visible light image. The comparative experiment of the public infrared visible light paired data set shows that the algorithm proposed in this paper has achieved the best performance in maintaining the consistency of the content structure of the generated image, restoring the image color distribution, and restoring the image texture details. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment.
- Author
-
Wang, Zuxi, Wang, Siyang, Chen, Zhong, and Zhou, Boyun
- Subjects
- *
IMAGE encryption , *CRYPTOGRAPHY , *IMAGING systems , *ALGORITHMS , *PIXELS , *DNA - Abstract
The design of a chaotic system and pseudo-random sequence generation method with excellent performance and its application in image encryption have always been attractive and challenging research fields. In this paper, a new model of parameter-variabled coupled chaotic system (PVCCS) is established by interaction coupling between parameters and states of multiple low-dimensional chaotic systems, and a new way to construct more complex hyperchaotic systems from simple low-dimensional systems is obtained. At the same time, based on this model and dynamical DNA codings and operations, a new pseudo-random sequence generation method (PSGM-3DPVCCS/DNA) is proposed, and it is verified that the generated pseudo-random sequence of PSGM-3DPVCCS/DNA has excellent random characteristics. Furthermore, this paper designs a novel pixel chain diffusion image encryption algorithm based on the proposed parameter-variabled coupled chaotic system (PVCCS) in which the hash value of plaintext image is associated with the initial key to participate in the encryption process so that the encryption key is closely associated with plaintext, which improves the security of the algorithm and effectively resists the differential cryptanalysis risk. In addition, an information hiding method is designed to hide the hash value of plaintext image in ciphertext image so that the hash value does not need to be transmitted in each encryption, and the initial key can be reused, which solves the key management problem in application and improves the application efficiency of the encryption algorithm. The experimental analysis shows that the chaotic system constructed in this paper is creative and universal and has more excellent chaotic characteristics than the original low-dimensional system. The sequence generated by the pseudo-random sequence generation method has excellent pseudo-random characteristics and security, and the image encryption algorithm can effectively resist differential cryptanalysis risk, showing advanced encryption performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Idempotent-Aided Factorizations of Regular Elements of a Semigroup.
- Author
-
Ćirić, Miroslav, Ignjatović, Jelena, and Stanimirović, Predrag S.
- Subjects
- *
MATRIX decomposition , *ALGORITHMS , *MATRICES (Mathematics) , *FACTORIZATION - Abstract
In the present paper, we introduce the concept of idempotent-aided factorization (I.-A. factorization) of a regular element of a semigroup, which can be understood as a semigroup-theoretical extension of full-rank factorization of matrices over a field. I.-A. factorization of a regular element d is defined by means of an idempotent e from its Green's D -class as decomposition into the product d = u v , so that the element u belongs to the Green's R -class of the element d and the Green's L -class of the idempotent e, while the element v belongs to the Green's L -class of the element d and the Green's R -class of the idempotent e. The main result of the paper is a theorem which states that each regular element of a semigroup possesses an I.-A. factorization with respect to each idempotent from its Green's D -class. In addition, we prove that when one of the factors is given, then the other factor is uniquely determined. I.-A. factorizations are then used to provide new existence conditions and characterizations of group inverses and (b , c) -inverses in a semigroup. In our further research, these factorizations will be applied to matrices with entries in a field, and efficient algorithms for realization of such factorizations will be provided. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Two-Stage Satellite Combined-Task Scheduling Based on Task Merging Mechanism.
- Author
-
Yu, Jing, Guo, Jiawei, Xing, Lining, Song, Yanjie, and Liu, Zhaohui
- Subjects
- *
ANT algorithms , *FIREWORKS , *ALGORITHMS , *SCHEDULING - Abstract
Satellites adopt a single-task observation mode in traditional patterns. Although this mode boasts high imaging accuracy, it is accompanied by a limited number of observed tasks and a low utilization rate of satellite resources. This limitation becomes particularly pronounced when dealing with extensive and densely populated observation task sets because the inherent mobility of satellites often leads to conflicts among numerous tasks. To address this issue, this paper introduces a novel multi-task merging mechanism aimed at enhancing the observation rate of satellites by resolving task conflicts. Initially, this paper presents a task merging method based on the proposed multitask merging mechanism, referred to as the constrained graph (CG) task merging approach. This method can merge tasks while adhering to the minimal requirements specified by users. Subsequently, a multi-satellite merging scheduling model is established based on the combined task set. Considering the satellite combined-task scheduling problem (SCTSP), an enhanced fireworks algorithm (EFWA) is proposed that incorporates the CG task synthesis mechanism. This algorithm incorporates local search strategies and a population disturbance mechanism to enhance both the solution quality and convergence speed. Finally, the efficacy of the CG algorithm was validated through a multitude of simulation experiments. Moreover, the effectiveness of the EFWA is confirmed via extensive comparisons with other algorithms, including the basic ant colony optimization (ACO) algorithm, enhanced ant colony optimization (EACO) algorithm, fireworks algorithm (FWA), and EFWA. When the number of tasks in the observation area are dense, such as in the case where the number of tasks is 700, the CG + EFWA (CG is adopted in the task merging stage and EFWA is adopted in the satellite combined-task scheduling stage) method improves observation benefits by 70.35% (compared to CG + EACO, CG is adopted in the task merging stage and EACO is adopted in the satellite combined-task scheduling stage), 78.93% (compared to MS + EFWA, MS is adopted in the task merging stage and EFWA is adopted in the satellite combined-task scheduling stage), and 39.03% (compared to MS + EACO, MS is adopted in the task merging stage and EACO is adopted in the satellite combined-task scheduling stage). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Solving the Robust Shortest Path Problem with Multimodal Transportation.
- Author
-
Guo, Jinzuo, Liu, Tianyu, Song, Guopeng, and Guo, Bo
- Subjects
- *
CONTAINERIZATION , *ALGORITHMS - Abstract
This paper explores the challenges of finding robust shortest paths in multimodal transportation networks. With the increasing complexity and uncertainties in modern transportation systems, developing efficient and reliable routing strategies that can adapt to various disruptions and modal changes is essential. By incorporating practical constraints in parameter uncertainty, this paper establishes a robust shortest path mixed-integer programming model based on a multimodal transportation network under transportation time uncertainty. To solve robust shortest path problems with multimodal transportation, we propose a modified Dijkstra algorithm that integrates parameter uncertainty with multimodal transportation. The effectiveness of the proposed multimodal transportation shortest path algorithm is verified using empirical experiments on test sets of different scales and a comparison of the runtime using a commercial solver. The experimental results on the multimodal transportation networks demonstrate the effectiveness of our approach in providing robust and efficient routing solutions. The results demonstrate that the proposed method can generate optimal solutions to the robust shortest path problem in multimodal transportation under time uncertainty and has practical significance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Multi-Objective Optimization and Reconstruction of Distribution Networks with Distributed Power Sources Based on an Improved BPSO Algorithm.
- Author
-
Lu, Dan, Li, Wenfeng, Zhang, Linjuan, Fu, Qiang, Jiao, Qingtao, and Wang, Kai
- Subjects
- *
POWER distribution networks , *PARTICLE swarm optimization , *POWER resources , *GENETIC algorithms , *PROBLEM solving , *ALGORITHMS - Abstract
The continuous integration of distributed power into the distribution network has increased the complexity of the distribution network and created challenges in distribution-network reconfiguration. In order to make the distribution network operate in the optimal mode, this paper establishes a multi-objective reconfiguration-optimization model that takes into account active network loss, voltage offset, number of switching actions and distributed power output. For a distribution network with a distributed power supply, it is easy for the traditional binary particle swarm optimization algorithm to fall into a local optimum. In order to improve the convergence speed of the algorithm and avoid premature convergence, this paper adopts an improved binary particle swarm optimization algorithm to solve the problem. The IEEE33 node system is used as an example for simulation verification. The experimental results show that the algorithm improves the convergence speed and global search ability, effectively reduces the system network loss, and greatly improves the voltage level of each node. It improves the stability and economy of distribution-network operation and can effectively solve the problem of multi-objective reconfiguration. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. A Highly Efficient Compressive Sensing Algorithm Based on Root-Sparse Bayesian Learning for RFPA Radar.
- Author
-
Wang, Ju, Shan, Bingqi, Duan, Song, and Zhang, Qin
- Subjects
- *
EXPECTATION-maximization algorithms , *COMPUTATIONAL complexity , *PARAMETER estimation , *RADAR , *ALGORITHMS - Abstract
Off-grid issues and high computational complexity are two major challenges faced by sparse Bayesian learning (SBL)-based compressive sensing (CS) algorithms used for random frequency pulse interval agile (RFPA) radar. Therefore, this paper proposes an off-grid CS algorithm for RFPA radar based on Root-SBL to address these issues. To effectively cope with off-grid issues, this paper derives a root-solving formula inspired by the Root-SBL algorithm for velocity parameters applicable to RFPA radar, thus enabling the proposed algorithm to directly solve the velocity parameters of targets during the fine search stage. Meanwhile, to ensure computational feasibility, the proposed algorithm utilizes a simple single-level hierarchical prior distribution model and employs the derived root-solving formula to avoid the refinement of velocity grids. Moreover, during the fine search stage, the proposed algorithm combines the fixed-point strategy with the Expectation-Maximization algorithm to update the hyperparameters, further reducing computational complexity. In terms of implementation, the proposed algorithm updates hyperparameters based on the single-level prior distribution to approximate values for the range and velocity parameters during the coarse search stage. Subsequently, in the fine search stage, the proposed algorithm performs a grid search only in the range dimension and uses the derived root-solving formula to directly solve for the target velocity parameters. Simulation results demonstrate that the proposed algorithm maintains low computational complexity while exhibiting stable performance for parameter estimation in various multi-target off-grid scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Shift Pruning-Based SCL Decoding for Polar Codes.
- Author
-
Wang, Desheng, Yin, Jihang, Xu, Yonggang, Yang, Xuan, Yan, Jiaqi, and Hua, Gang
- Subjects
- *
CHANNEL coding , *5G networks , *ALGORITHMS - Abstract
In the context of the high-speed development of 5G communications, high-performance decoding schemes for polar codes are a hot spot in channel coding research. Shift pruning successive cancellation list (SP-SCL) decoding aims to recover the correct path by shift pruning in the extra SCL decoding. However, the current SP-SCL decoding is inflexible in determining the shift positions. In this paper, a flexible shift pruning SCL (FSP-SCL) decoding is proposed. Firstly, the reasons for movement and the eliminated states of the correct path are analyzed in detail using the path metric range (P M R) , and on this basis, the validity of the method adopted in this paper for determining the shift priority of the information bits is verified. Secondly, the FSP-SCL decoding proposes two methods for determining the shift positions. One is the log-likelihood ratio (LLR) threshold method, which compares the LLR values of the eliminated paths on the shift bit with the corresponding LLR threshold to determine the shift positions. The other is the path distance method. It combines the minimum distance between the eliminated paths and the received vector with the path metrics to determine the shift positions. Both methods are more flexible and practical, as they can calculate the corresponding shift positions online based on a specific shift bit, avoiding the high complexity caused by the simulation method. Finally, this paper designs various experimental schemes to verify the decoding performance of the FSP-SCL. The experimental results show that in terms of error-correction performance, the LLR threshold-based FSP-SCL (FSPL (LLR threshold)) decoding, the path distance-based FSP-SCL (FSPL (path distance)) decoding and the existing SP-SCL decoding are roughly equal overall. In terms of decoding complexity, FSPL (LLR threshold) decoding is slightly better than FSPL (path distance) decoding, and the decoding complexity of both is lower than that of SP-SCL decoding, with the difference being more pronounced in the medium to high SNR regions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. an-QNA: An Adaptive Nesterov Quasi-Newton Acceleration-Optimized CMOS LNA for 65 nm Automotive Radar Applications.
- Author
-
Aras, Unal, Woo, Lee Sun, Delwar, Tahesin Samira, Siddique, Abrar, Jana, Anindya, Lee, Yangwon, and Ryu, Jee-Youl
- Subjects
- *
LOW noise amplifiers , *ROAD vehicle radar , *SPEED , *NOISE , *ALGORITHMS - Abstract
An adaptive Nesterov quasi-Newton acceleration (an-QNA)-optimized low-noise amplifier (LNA) is proposed in this paper. An optimized single-ended-to-differential two-stage LNA circuit is presented. It includes an improved post-linearization (IPL) technique to enhance the linearity. Traditional methods like conventional quasi-Newton (c-QN) often suffer from slow convergence and the tendency to get trapped in local minima. However, the proposed an-QNA method significantly accelerates the convergence speed. Furthermore, in this paper, modifications have been made to the an-QNA algorithm using a quadratic estimation to guarantee global convergence. The optimized an-QNA-based LNA, using standard 65 nm CMOS technology, achieves a simulated gain of 17.5 dB, a noise figure (NF) of 3.7 dB, and a 1 dB input compression point (IP1dB) of −13.1 dBm. It is also noted that the optimized LNA achieves a measured gain of 12.9 dB and an NF of 4.98 dB, and the IP1dB is −17.8 dB. The optimized LNA has a chip area of 0.67 mm2. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. YOLO-BFRV: An Efficient Model for Detecting Printed Circuit Board Defects.
- Author
-
Liu, Jiaxin, Kang, Bingyu, Liu, Chao, Peng, Xunhui, and Bai, Yan
- Subjects
- *
PRINTED circuits , *SPINE , *SPEED , *ALGORITHMS - Abstract
The small area of a printed circuit board (PCB) results in densely distributed defects, leading to a lower detection accuracy, which subsequently impacts the safety and stability of the circuit board. This paper proposes a new YOLO-BFRV network model based on the improved YOLOv8 framework to identify PCB defects more efficiently and accurately. First, a bidirectional feature pyramid network (BIFPN) is introduced to expand the receptive field of each feature level and enrich the semantic information to improve the feature extraction capability. Second, the YOLOv8 backbone network is refined into a lightweight FasterNet network, reducing the computational load while improving the detection accuracy of minor defects. Subsequently, the high-speed re-parameterized detection head (RepHead) reduces inference complexity and boosts the detection speed without compromising accuracy. Finally, the VarifocalLoss is employed to enhance the detection accuracy for densely distributed PCB defects. The experimental results demonstrate that the improved model increases the mAP by 4.12% compared to the benchmark YOLOv8s model, boosts the detection speed by 45.89%, and reduces the GFLOPs by 82.53%, further confirming the superiority of the algorithm presented in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Recent Advances in 3D Object Detection for Self-Driving Vehicles: A Survey.
- Author
-
Fawole, Oluwajuwon A. and Rawat, Danda B.
- Subjects
- *
OBJECT recognition (Computer vision) , *COMPUTER vision , *MULTISENSOR data fusion , *DEEP learning , *ALGORITHMS - Abstract
The development of self-driving or autonomous vehicles has led to significant advancements in 3D object detection technologies, which are critical for the safety and efficiency of autonomous driving. Despite recent advances, several challenges remain in sensor integration, handling sparse and noisy data, and ensuring reliable performance across diverse environmental conditions. This paper comprehensively surveys state-of-the-art 3D object detection techniques for autonomous vehicles, emphasizing the importance of multi-sensor fusion techniques and advanced deep learning models. Furthermore, we present key areas for future research, including enhancing sensor fusion algorithms, improving computational efficiency, and addressing ethical, security, and privacy concerns. The integration of these technologies into real-world applications for autonomous driving is presented by highlighting potential benefits and limitations. We also present a side-by-side comparison of different techniques in a tabular form. Through a comprehensive review, this paper aims to provide insights into the future directions of 3D object detection and its impact on the evolution of autonomous driving. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Time Sequence Deep Learning Model for Ubiquitous Tabular Data with Unique 3D Tensors Manipulation.
- Author
-
Gicic, Adaleta, Đonko, Dženana, and Subasi, Abdulhamit
- Subjects
- *
ARTIFICIAL neural networks , *MACHINE learning , *ALGORITHMS , *DATA modeling - Abstract
Although deep learning (DL) algorithms have been proved to be effective in diverse research domains, their application in developing models for tabular data remains limited. Models trained on tabular data demonstrate higher efficacy using traditional machine learning models than DL models, which are largely attributed to the size and structure of tabular datasets and the specific application contexts in which they are utilized. Thus, the primary objective of this paper is to propose a method to use the supremacy of Stacked Bidirectional LSTM (Long Short-Term Memory) deep learning algorithms in pattern discovery incorporating tabular data with customized 3D tensor modeling in feeding neural networks. Our findings are empirically validated using six diverse, publicly available datasets each varying in size and learning objectives. This paper proves that the proposed model based on time-sequence DL algorithms, which were generally described as inadequate when dealing with tabular data, yields satisfactory results and competes effectively with other algorithms specifically designed for tabular data. An additional benefit of this approach is its ability to preserve simplicity while ensuring fast model training also with large datasets. Even with extremely small datasets, models can be applied to achieve exceptional predictive results and fully utilize their capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Multi-Robot Collaborative Mapping with Integrated Point-Line Features for Visual SLAM.
- Author
-
Xia, Yu, Wu, Xiao, Ma, Tao, Zhu, Liucun, Cheng, Jingdi, and Zhu, Junwu
- Subjects
- *
VISUAL odometry , *MOBILE operating systems , *MOBILE robots , *ALGORITHMS , *PHOTOGRAMMETRY , *ROBOTS - Abstract
Simultaneous Localization and Mapping (SLAM) enables mobile robots to autonomously perform localization and mapping tasks in unknown environments. Despite significant progress achieved by visual SLAM systems in ideal conditions, relying solely on a single robot and point features for mapping in large-scale indoor environments with weak-texture structures can affect mapping efficiency and accuracy. Therefore, this paper proposes a multi-robot collaborative mapping method based on point-line fusion to address this issue. This method is designed for indoor environments with weak-texture structures for localization and mapping. The feature-extraction algorithm, which combines point and line features, supplements the existing environment point feature-extraction method by introducing a line feature-extraction step. This integration ensures the accuracy of visual odometry estimation in scenes with pronounced weak-texture structure features. For relatively large indoor scenes, a scene-recognition-based map-fusion method is proposed in this paper to enhance mapping efficiency. This method relies on visual bag of words to determine overlapping areas in the scene, while also proposing a keyframe-extraction method based on photogrammetry to improve the algorithm's robustness. By combining the Perspective-3-Point (P3P) algorithm and Bundle Adjustment (BA) algorithm, the relative pose-transformation relationships of multi-robots in overlapping scenes are resolved, and map fusion is performed based on these relative pose relationships. We evaluated our algorithm on public datasets and a mobile robot platform. The experimental results demonstrate that the proposed algorithm exhibits higher robustness and mapping accuracy. It shows significant effectiveness in handling mapping in scenarios with weak texture and structure, as well as in small-scale map fusion. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Deep Learning-Based Intelligent Detection Device for Insulation Pull Rod Defects.
- Author
-
Yu, Hua, Niu, Shu, Li, Shuai, Yang, Gang, Wang, Xuan, Luo, Hanhua, Fan, Xianhao, and Li, Chuanyang
- Subjects
- *
OBJECT recognition (Computer vision) , *INTELLIGENT buildings , *DEEP learning , *ALGORITHMS , *SPEED , *HARDWARE - Abstract
This paper proposes a deep learning-based intelligent detection device for insulation pull rod defects, addressing the issues of low detection accuracy, poor timeliness of intelligent analysis, and the difficulty in preserving detection results. Firstly, by constructing the pull rod defects dataset and training the YOLOv5s network, along with commonly used object detection algorithms in industrial defect detection, the feasibility of deep learning networks for insulation pull rod defects detection is explored. Secondly, the trained model is combined to build an intelligent detection device for pull rod defects, integrating insulation pull rod image acquisition and defect detection into a unified system. The research results demonstrate that the YOLOv5s network can quickly and accurately detect pull rod defects. On the test set constructed in this paper, the detection performance metric mAP@0.5:0.95 of the trained model reached 54.7%. Specifically, the mAP@0.5 score was 86.9% at a threshold of 0.5. The detection speed FPS reached 169.5, significantly improving the detection efficiency and accuracy compared to traditional object detection algorithms. By establishing an organic connection between the image hardware acquisition device and the deep learning network, the existing problems of inefficient detection and difficult storage of detection results in pull rod defects detection methods are effectively addressed. This research provides new insights for detecting insulation pull rod defects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. A Parameterization Approach for the Dielectric Response Model of Oil Paper Insulation Using FDS Measurements.
- Author
-
Yang, Feng, Du, Lin, Yang, Lijun, Wei, Chao, Wang, Youyuan, Ran, Liman, and He, Peng
- Subjects
- *
DIELECTRICS , *HIGH voltages , *ALGORITHMS , *ELECTRIC capacity , *ELECTRIC potential - Abstract
To facilitate better interpretation of dielectric response measurements--thereby directing numerical evidence for condition assessments of oil-paper-insulated equipment in high-voltage alternating current (HVAC) transmission systems--a novel approach is presented to estimate the parameters in the extended Debye model (EDM) using wideband frequency domain spectroscopy (FDS). A syncretic algorithm that integrates a genetic algorithm (GA) and the Levenberg-Marquardt (L-M) algorithm is introduced in the present study to parameterize EDM using the FDS measurements of a real-life 126 kV oil-impregnated paper (OIP) bushing under different controlled temperatures. As for the uncertainty of the EDM structure due to variable branch quantity, Akaike's information criterion (AIC) is employed to determine the model orders. For verification, comparative analysis of FDS reconstruction and results of FDS transformation to polarization--depolarization current (PDC)/return voltage measurement (RVM) are presented. The comparison demonstrates good agreement between the measured and reconstructed spectroscopies of complex capacitance and tan δover the full tested frequency band (10-4 Hz-10³ Hz) with goodness of fit over 0.99. Deviations between the tested and modelled PDC/RVM from FDS are then discussed. Compared with the previous studies to parameterize the model using time domain dielectric responses, the proposed method solves the problematic matching between EDM and FDS especially in a wide frequency band, and therefore assures a basis for quantitative insulation condition assessment of OIP-insulated apparatus in energy systems. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
23. Review on Security Range Perception Methods and Path-Planning Techniques for Substation Mobile Robots.
- Author
-
Zheng, Jianhua, Chen, Tong, He, Jiahong, Wang, Zhunian, and Gao, Bingtuan
- Subjects
- *
DEEP learning , *IMAGE processing , *INDUSTRIAL safety , *MAGNETIC fields , *ALGORITHMS - Abstract
The use of mobile robots in substations improves maintenance efficiency and ensures the personal safety of staff working at substations, which is a trend in the development of technologies. Strong electric and solid magnetic fields around high-voltage equipment in substations may lead to the breakdown and failure of inspection devices. Therefore, safe operation range measurement and coordinated planning are key factors in ensuring the safe operation of substations. This paper first summarizes the current developments that are occurring in the field of fixed and mobile safe operating range sensing methods for substations, such as ultra-wideband technology, the two-way time flight method, and deep learning image processing algorithms. Secondly, this paper introduces path-planning algorithms based on safety range sensing and analyzes the adaptability of global search methods based on a priori information, local planning algorithms, and sensor information in substation scenarios. Finally, in view of the limitations of the existing range awareness and path-planning methods, we investigate the problems that occur in the dynamic changes in equipment safety zones and the frequent switching of operation scenarios in substations. Furthermore, we explore a new type of barrier and its automatic arrangement system to improve the performance of distance control and path planning in substation scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A Fast Algorithm for 3D Focusing Inversion of Magnetic Data and Its Application in Geothermal Exploration.
- Author
-
Dai, Weiming, Jia, Hongfa, Jiang, Niande, Liu, Yanhong, Zhou, Weihui, Zhu, Zhiying, and Zhou, Shuai
- Subjects
- *
CONJUGATE gradient methods , *MATRIX effect , *ALGORITHMS , *GEOTHERMAL resources - Abstract
This paper presents a fast focusing inversion algorithm of magnetic data based on the conjugate gradient method, which can be used to describe the underground target geologic body efficiently and clearly. The proposed method realizes an effect similar to matrix compression by changing the computation order, calculating the inner product of vectors and equivalent expansion of expressions. Model tests show that this strategy successfully reduces the computation time of a single iteration of the conjugate gradient method, so the three-dimensional magnetic data inversion is realized under a certain number of iterations. In this paper, the detailed calculation steps of the proposed inversion method are given, and the effectiveness and high efficiency of the proposed fast focusing inversion method are verified by three theoretical model tests and a set of measured data. Finally, the fast focus inversion algorithm is applied to the magnetic data of Gonghe Basin, Qinghai Province, to describe the spatial distribution range of deep hot dry rock, which provides a direction for the continuous exploration of geothermal resources in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Pointer Meter Reading Method Based on YOLOv8 and Improved LinkNet.
- Author
-
Lu, Xiaohu, Zhu, Shisong, and Lu, Bibo
- Subjects
- *
FEATURE extraction , *ROTATIONAL motion , *ANGLES , *READING , *ALGORITHMS - Abstract
In order to improve the reading efficiency of pointer meter, this paper proposes a reading method based on LinkNet. Firstly, the meter dial area is detected using YOLOv8. Subsequently, the detected images are fed into the improved LinkNet segmentation network. In this network, we replace traditional convolution with partial convolution, which reduces the number of model parameters while ensuring accuracy is not affected. Remove one pair of encoding and decoding modules to further compress the model size. In the feature fusion part of the model, the CBAM (Convolutional Block Attention Module) attention module is added and the direct summing operation is replaced by the AFF (Attention Feature Fusion) module, which enhances the feature extraction capability of the model for the segmented target. In the subsequent rotation correction section, this paper effectively addresses the issue of inaccurate prediction by CNN networks for axisymmetric images within the 0–360° range, by dividing the rotation angle prediction into classification and regression steps. It ensures that the final reading part receives the correct angle of image input, thereby improving the accuracy of the overall reading algorithm. The final experimental results indicate that our proposed reading method has a mean absolute error of 0.20 and a frame rate of 15. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Optimal Asymptotic Tracking Control for Nonzero-Sum Differential Game Systems with Unknown Drift Dynamics via Integral Reinforcement Learning.
- Author
-
Jing, Chonglin, Wang, Chaoli, Song, Hongkai, Shi, Yibo, and Hao, Longyan
- Subjects
- *
LEAST squares , *REINFORCEMENT learning , *DIFFERENTIAL games , *NASH equilibrium , *ALGORITHMS , *HAMILTON-Jacobi equations , *TRACKING algorithms - Abstract
This paper employs an integral reinforcement learning (IRL) method to investigate the optimal tracking control problem (OTCP) for nonlinear nonzero-sum (NZS) differential game systems with unknown drift dynamics. Unlike existing methods, which can only bound the tracking error, the proposed approach ensures that the tracking error asymptotically converges to zero. This study begins by constructing an augmented system using the tracking error and reference signal, transforming the original OTCP into solving the coupled Hamilton–Jacobi (HJ) equation of the augmented system. Because the HJ equation contains unknown drift dynamics and cannot be directly solved, the IRL method is utilized to convert the HJ equation into an equivalent equation without unknown drift dynamics. To solve this equation, a critic neural network (NN) is employed to approximate the complex value function based on the tracking error and reference information data. For the unknown NN weights, the least squares (LS) method is used to design an estimation law, and the convergence of the weight estimation error is subsequently proven. The approximate solution of optimal control converges to the Nash equilibrium, and the tracking error asymptotically converges to zero in the closed system. Finally, we validate the effectiveness of the proposed method in this paper based on MATLAB using the ode45 method and least squares method to execute Algorithm 2. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. A Distorted-Image Quality Assessment Algorithm Based on a Sparse Structure and Subjective Perception.
- Author
-
Yang, Yang, Liu, Chang, Wu, Hui, and Yu, Dingguo
- Subjects
- *
PEARSON correlation (Statistics) , *COMPUTATIONAL complexity , *PERCEIVED quality , *IMAGING systems , *ALGORITHMS - Abstract
Most image quality assessment (IQA) algorithms based on sparse representation primarily focus on amplitude information, often overlooking the structural composition of images. However, structural composition is closely linked to perceived image quality, a connection that existing methods do not adequately address. To fill this gap, this paper proposes a novel distorted-image quality assessment algorithm based on a sparse structure and subjective perception (IQA-SSSP). This algorithm evaluates the quality of distorted images by measuring the sparse structure similarity between a reference and distorted images. The proposed method has several advantages. First, the sparse structure algorithm operates with reduced computational complexity, leading to faster processing speeds, which makes it suitable for practical applications. Additionally, it efficiently handles large-scale data, further enhancing the assessment process. Experimental results validate the effectiveness of the algorithm, showing that it achieves a high correlation with human visual perception, as reflected in both objective and subjective evaluations. Specifically, the algorithm yielded a Pearson correlation coefficient of 0.929 and a mean squared error of 8.003, demonstrating its robustness and efficiency. By addressing the limitations of existing IQA methods and introducing a more holistic approach, this paper offers new perspectives on IQA. The proposed algorithm not only provides reliable quality assessment results but also closely aligns with human visual experience, thereby enhancing both the objectivity and accuracy of image quality evaluations. This research offers significant theoretical support for the advancement of sparse representation in IQA. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Task-Importance-Oriented Task Selection and Allocation Scheme for Mobile Crowdsensing.
- Author
-
Chang, Sha, Wu, Yahui, Deng, Su, Ma, Wubin, and Zhou, Haohao
- Subjects
- *
CROWDSENSING , *RESOURCE allocation , *ALGORITHMS - Abstract
In Mobile Crowdsensing (MCS), sensing tasks have different impacts and contributions to the whole system or specific targets, so the importance of the tasks is different. Since resources for performing tasks are usually limited, prioritizing the allocation of resources to more important tasks can ensure that key data or information can be collected promptly and accurately, thus improving overall efficiency and performance. Therefore, it is very important to consider the importance of tasks in the task selection and allocation of MCS. In this paper, a task queue is established, the importance of tasks, the ability of participants to perform tasks, and the stability of the task queue are considered, and a novel task selection and allocation scheme (TSAS) in the MCS system is designed. This scheme introduces the Lyapunov optimization method, which can be used to dynamically keep the task queue stable, balance the execution ability of participants and the system load, and perform more important tasks in different system states, even when the participants are limited. In addition, the Double Deep Q-Network (DDQN) method is introduced to improve on the traditional solution of the Lyapunov optimization problem, so this scheme has a certain predictive ability and foresight on the impact of future system states. This paper also proposes action-masking and iterative training methods for the MCS system, which can accelerate the training process of the neural network in the DDQN and improve the training effect. Experiments show that the TSAS based on the Lyapunov optimization method and DDQN performs better than other algorithms, considering the long-term stability of the queue, the number and importance of tasks to be executed, and the congestion degree of tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. End-to-End Autonomous Driving Decision Method Based on Improved TD3 Algorithm in Complex Scenarios.
- Author
-
Xu, Tao, Meng, Zhiwei, Lu, Weike, and Tong, Zhongwen
- Subjects
- *
DECISION making , *ALGORITHMS , *CRITICS , *CAMERAS , *SPEED - Abstract
The ability to make informed decisions in complex scenarios is crucial for intelligent automotive systems. Traditional expert rules and other methods often fall short in complex contexts. Recently, reinforcement learning has garnered significant attention due to its superior decision-making capabilities. However, there exists the phenomenon of inaccurate target network estimation, which limits its decision-making ability in complex scenarios. This paper mainly focuses on the study of the underestimation phenomenon, and proposes an end-to-end autonomous driving decision-making method based on an improved TD3 algorithm. This method employs a forward camera to capture data. By introducing a new critic network to form a triple-critic structure and combining it with the target maximization operation, the underestimation problem in the TD3 algorithm is solved. Subsequently, the multi-timestep averaging method is used to address the policy instability caused by the new single critic. In addition, this paper uses Carla platform to construct multi-vehicle unprotected left turn and congested lane-center driving scenarios and verifies the algorithm. The results demonstrate that our method surpasses baseline DDPG and TD3 algorithms in aspects such as convergence speed, estimation accuracy, and policy stability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Research on a Train Safety Driving Method Based on Fusion of an Incremental Clustering Algorithm and Lightweight Shared Convolution.
- Author
-
Wang, Hongping, Liu, Xin, Song, Linsen, Zhang, Yiwen, Rong, Xin, and Wang, Yitian
- Subjects
- *
POINT cloud , *TRAFFIC safety , *RELIABILITY in engineering , *ALGORITHMS , *RECOGNITION (Psychology) - Abstract
This paper addresses the challenge of detecting unknown or unforeseen obstacles in railway track transportation, proposing an innovative detection strategy that integrates an incremental clustering algorithm with lightweight segmentation techniques. In the detection phase, the paper innovatively employs the incremental clustering algorithm as a core method, combined with dilation and erosion theories, to expand the boundaries of point cloud clusters, merging adjacent point cloud elements into unified clusters. This method effectively identifies and connects spatially adjacent point cloud clusters while efficiently eliminating noise from target object point clouds, thereby achieving more precise recognition of unknown obstacles on the track. Furthermore, the effective integration of this algorithm with lightweight shared convolutional semantic segmentation algorithms enables accurate localization of obstacles. Experimental results using two combined public datasets demonstrate that the obstacle detection average recall rate of the proposed method reaches 90.3%, significantly enhancing system reliability. These findings indicate that the proposed detection strategy effectively improves the accuracy and real-time performance of obstacle recognition, thereby presenting important practical application value for ensuring the safe operation of railway tracks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Ensemble Learning Improves the Efficiency of Microseismic Signal Classification in Landslide Seismic Monitoring.
- Author
-
Xin, Bingyu, Huang, Zhiyong, Huang, Shijie, and Feng, Liang
- Subjects
- *
SIGNAL classification , *DATABASES , *RANDOM forest algorithms , *DECISION trees , *ALGORITHMS , *LANDSLIDES - Abstract
A deep-seated landslide could release numerous microseismic signals from creep-slip movement, which includes a rock-soil slip from the slope surface and a rock-soil shear rupture in the subsurface. Machine learning can effectively enhance the classification of microseismic signals in landslide seismic monitoring and interpret the mechanical processes of landslide motion. In this paper, eight sets of triaxial seismic sensors were deployed inside the deep-seated landslide, Jiuxianping, China, and a large number of microseismic signals related to the slope movement were obtained through 1-year-long continuous monitoring. All the data were passed through the seismic event identification mode, the ratio of the long-time average and short-time average. We selected 11 days of data, manually classified 4131 data into eight categories, and created a microseismic event database. Classical machine learning algorithms and ensemble learning algorithms were tested in this paper. In order to evaluate the seismic event classification performance of each algorithmic model, we evaluated the proposed algorithms through the dimensions of the accuracy, precision, and recall of each model. The validation results demonstrated that the best performing decision tree algorithm among the classical machine learning algorithms had an accuracy of 88.75%, while the ensemble algorithms, including random forest, Gradient Boosting Trees, Extreme Gradient Boosting, and Light Gradient Boosting Machine, had an accuracy range from 93.5% to 94.2% and also achieved better results in the combined evaluation of the precision, recall, and F1 score. The specific classification tests for each microseismic event category showed the same results. The results suggested that the ensemble learning algorithms show better results compared to the classical machine learning algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. A Survey of Autonomous Vehicle Behaviors: Trajectory Planning Algorithms, Sensed Collision Risks, and User Expectations.
- Author
-
Xia, Taokai and Chen, Hui
- Subjects
- *
ALGORITHMS , *COMPARATIVE studies - Abstract
Autonomous vehicles are rapidly advancing and have the potential to revolutionize transportation in the future. This paper primarily focuses on vehicle motion trajectory planning algorithms, examining the methods for estimating collision risks based on sensed environmental information and approaches for achieving user-aligned trajectory planning results. It investigates the different categories of planning algorithms within the scope of local trajectory planning applications for autonomous driving, discussing and differentiating their properties in detail through a review of the recent studies. The risk estimation methods are classified and introduced based on their descriptions of the sensed collision risks in traffic environments and their integration with trajectory planning algorithms. Additionally, various user experience-oriented methods, which utilize human data to enhance the trajectory planning performance and generate human-like trajectories, are explored. The paper provides comparative analyses of these algorithms and methods from different perspectives, revealing the interconnections between these topics. The current challenges and future prospects of the trajectory planning tasks in autonomous vehicles are also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Lane Attribute Classification Based on Fine-Grained Description.
- Author
-
He, Zhonghe, Gong, Pengfei, Ye, Hongcheng, and Gan, Zizheng
- Subjects
- *
TRAFFIC monitoring , *ROAD markings , *PROBLEM solving , *ANNOTATIONS , *ALGORITHMS , *INTELLIGENT transportation systems - Abstract
As an indispensable part of the vehicle environment perception task, road traffic marking detection plays a vital role in correctly understanding the current traffic situation. However, the existing traffic marking detection algorithms still have some limitations. Taking lane detection as an example, the current detection methods mainly focus on the location information detection of lane lines, and they only judge the overall attribute of each detected lane line instance, thus lacking more fine-grained dynamic detection of lane line attributes. In order to meet the needs of intelligent vehicles for the dynamic attribute detection of lane lines and more perfect road environment information in urban road environment, this paper constructs a fine-grained attribute detection method for lane lines, which uses pixel-level attribute sequence points to describe the complete attribute distribution of lane lines and then matches the detection results of the lane lines. Realizing the attribute judgment of different segment positions of lane instances is called the fine-grained attribute detection of lane lines (Lane-FGA). In addition, in view of the lack of annotation information in the current open-source lane data set, this paper constructs a lane data set with both lane instance information and fine-grained attribute information by combining manual annotation and intelligent annotation. At the same time, a cyclic iterative attribute inference algorithm is designed to solve the difficult problem of lane attribute labeling in areas without visual cues such as occlusion and damage. In the end, the average accuracy of the proposed algorithm reaches 97% on various types of lane attribute detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. A Phase-Only Optimization Null Control Method for FDA-MIMO Based on ADMM.
- Author
-
Xiao, Mengxuan, Hu, Taiyang, Shao, Xiaolang, Wu, Yifan, and Xiao, Zelong
- Subjects
- *
ALGORITHMS , *HARDWARE - Abstract
This paper investigates null control within the transmit–receive beampattern of Frequency Diverse Array-Multiple-Input and Multiple-Output (FDA-MIMO) systems, presenting a novel phase-only optimization approach for achieving null control in FDA-MIMO. We employ an alternating multiplier framework, which transforms the intricate and inherent constant modulus constraint and numerous amplitude constraints in optimization into more manageable projection problems. By employing a phase-only optimization strategy, the intricate hardware and computational burdens associated with null control in FDA-MIMO are effectively alleviated. The simulation results indicate that the algorithm proposed in this paper exhibits excellent null control ability while precisely maintaining constant modulus constraints, and it possesses an extremely high computational efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Evaluation and Improvement of a CALIPSO-Based Algorithm for Cloud Base Height in China.
- Author
-
Li, Ruolin and Ma, Xiaoyan
- Subjects
- *
CLOUD computing , *LIDAR , *ALGORITHMS , *AEROSOLS , *ALTITUDES , *TROPOSPHERIC aerosols - Abstract
Clouds are crucial in regulating the Earth's energy budget. Global cloud top heights have been easily retrieved from satellite measurements, but there are few methods for determining cloud base height (CBH) from satellite measurements. The Cloud Base Altitude Spatial Extrapolator (CBASE) algorithm was proposed to derive the height of the lower-troposphere liquid cloud base by using the Cloud-Aerosol Lidar with Orthogonal polarization cloud aerosol LiDAR (CALIOP) profiles and weather observations at airports from aviation routine and special weather report (METARs and SPECIs, called METAR) observation data in the United States. A modification to the CBASE algorithm over China (CNMETAR-CBASE) is presented in this paper. In this paper, the ability of the CBASE algorithm to calculate CBH in China is evaluated, and METAR observations over China (CNMETAR) were then used to modify the CBASE algorithm. The results including CNMETAR observation data in China can better retrieve CBH over China compared with the results using the original CBASE algorithm, and the accuracy of the global CBH results has been improved. Overestimations of CBH with the original algorithm range from 500 to 800 m in China, which have been reduced to about 300 m with an improved algorithm. The deviations calculated by the algorithm also have a significant reduction, from 480 m (CBASE) to 420 m (CNMETAR-CBASE). In conclusion, the modified CBASE algorithm not only calculates the CBH more accurately in China but also improves the results of the global CBH retrieved from satellites. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. A Survey on Biomimetic and Intelligent Algorithms with Applications.
- Author
-
Li, Hao, Liao, Bolin, Li, Jianfeng, and Li, Shuai
- Subjects
- *
BIOLOGICALLY inspired computing , *BIOMIMETIC materials , *ALGORITHMS , *FEATURE extraction , *GENETIC algorithms , *RESEARCH personnel - Abstract
The question "How does it work" has motivated many scientists. Through the study of natural phenomena and behaviors, many intelligence algorithms have been proposed to solve various optimization problems. This paper aims to offer an informative guide for researchers who are interested in tackling optimization problems with intelligence algorithms. First, a special neural network was comprehensively discussed, and it was called a zeroing neural network (ZNN). It is especially intended for solving time-varying optimization problems, including origin, basic principles, operation mechanism, model variants, and applications. This paper presents a new classification method based on the performance index of ZNNs. Then, two classic bio-inspired algorithms, a genetic algorithm and a particle swarm algorithm, are outlined as representatives, including their origin, design process, basic principles, and applications. Finally, to emphasize the applicability of intelligence algorithms, three practical domains are introduced, including gene feature extraction, intelligence communication, and the image process. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Mathematical Model of Gasification of Solid Fuel.
- Author
-
Djuric, Slavko, Nogo, Srdjan, Varupa, Enes, and Kuzmic, Goran
- Subjects
- *
CASHEW nuts , *SOLID waste , *PHASE equilibrium , *ENGINEERING models , *CHEMICAL reactions - Abstract
This paper presents an innovative mathematical model of solid fuel gasification, which is not described in the available literature. The calculation of the components of the heterogeneous phase (including both solid and gaseous phases) as well as the calculation of the homogeneous phase (only gaseous components) is based on the balance of the total amounts of carbon, oxygen, hydrogen, and nitrogen entering the reactor space. Additionally, this paper introduces a new method for calculating the composition of the gaseous phase, based on reducing the heterogeneous mixture (composed of solid and gaseous phases) to a homogeneous gaseous phase. This approach to calculating the gaseous phase composition in the solid fuel gasification process has not been found by the authors in the cited literature. This paper also presents a model for calculating the heterogeneous and gaseous phases using the number of moles that participate in the assumed chemical reactions of the solid fuel gasification process. This approach to calculating the composition of the heterogeneous and gaseous phases of the solid fuel gasification process is also not represented in the cited literature. For comparison with the literature data, municipal solid waste (MSW) and cashew nut shell (Cashew Shell Char (CNSC)) were used as fuels in the calculation of gasification composition. The results of the calculation of the gaseous phase composition using the model presented in the paper show good agreement with the data from the literature. The calculation of the composition of the heterogeneous mixture during the steam gasification of MSW (α = 0.4) shows the presence of a solid phase (carbon) up to approximately 735 °C. At that temperature, the synthetic gas contains only gaseous components: CO = 33.10%, H2 = 52.70%, CH4 = 2.54%, CO2 = 4.97, H2O = 5.93% and N2 = 0.76%. Increasing the temperature above 735 °C eliminates the solid phase from the equilibrium mixture. The literature data on solid fuel gasification generally do not consider the proportion of the solid phase (carbon) in the equilibrium mixture. To satisfy the material balance at the input and output of the gasification reactor, it is necessary to determine the proportion of the solid phase (carbon) in the equilibrium mixture. Since the proportion of the solid phase (carbon) in the heterogeneous equilibrium mixture can only be determined through measurement, the development and application of a mathematical model in engineering practice is of great importance, so this developed model can be considered a useful tool for simulating the influence of process parameters on gas characteristics. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Satellite Autonomous Mission Planning Based on Improved Monte Carlo Tree Search.
- Author
-
Li, Zichao, Li, You, and Luo, Rongzheng
- Subjects
- *
ALGORITHMS , *TREES , *SPEED , *CRITICS , *ACTORS , *ANT algorithms - Abstract
This paper improves the timeliness of satellite mission planning to cope with the rapid response to changes. In this paper, satellite mission planning is investigated. Firstly, the satellite dynamics model and mission planning model are established, and an improved Monte Carlo tree (Improved-MCTS) algorithm is proposed, which utilizes the Monte Carlo tree search in combination with the state uncertainty network (State-UN) to reduce the time of exploring the nodes (At the MCTS selection stage, the exploration of nodes specifically refers to the algorithm needing to decide whether to choose nodes that have already been visited (exploitation) or nodes that have not been visited yet (exploration)). The results show that this algorithm performs better in terms of profit (in this paper, the observation task is given a weight of 0–1, and each planned task will receive a profit; that is, a profit will be assigned at the initial moment) and convergence speed compared to the ant colony algorithm (ACO) and the asynchronous advantage actor critic (A3C). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. MFC-RMA (Matrix Factorization and Constraints- Role Mining Algorithm): An Optimized Role Mining Algorithm.
- Author
-
Zhu, Fubao, Yang, Chenguang, Zhu, Liang, Zuo, Hongqiang, and Gu, Jingzhong
- Subjects
- *
BOOLEAN matrices , *MATRIX decomposition , *SECURITY management , *ALGORITHMS , *SYMMETRY - Abstract
Role-based access control (RBAC) is a widely adopted access control model in various domains for defining security management. Role mining is closely related to role-based access control, as the latter employs role assignments to offer a flexible and scalable approach to managing permissions within an organization. The edge role mining problem (Edge RMP), a variant of the role mining problem (RMP), has long been recognized as an effective strategy for role assignment. Role mining, which groups users with similar access permissions into the same role, bears some resemblance to symmetry. Symmetry categorizes objects or graphics with identical characteristics into one group. Both involve a certain form of "classification" or "induction". Edge-RMP reduces the associations between users and permissions, thereby lowering the security risks faced by the system. While an algorithm based on Boolean matrix factorization exists for this problem, it fails to further refine the resulting user–role assignment (UA) and role–permission assignment (PA) relationships. Additionally, this algorithm does not address constraint-related issues, such as cardinality constraints, user exclusion constraints, and user capabilities. Furthermore, it demonstrates significant redundancy of roles when handling large datasets, leaving room for further optimization of Edge-RMP results. To address these concerns, this paper proposes the MFC-RMA algorithm based on Boolean matrix factorization. The method achieves significant optimization of Edge-RMP results by handling relationships between roles possessing various permissions. Furthermore, this paper clusters, compresses, modifies, and optimizes the original data based on the similarity between users, ensuring its usability for role mining. Both theoretical and practical considerations are taken into account for different types of constraints, and algorithms are devised to reallocate roles incorporating these constraints, thereby generating UA and PA matrices. The proposed approach yields optimal numbers of generated roles and the sum of the minimum number of generated edges to address the aforementioned issues. Experimental results demonstrate that the algorithm reduces management overhead, provides efficient execution results, and ensures the accuracy of generated roles. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. IRBEVF-Q: Optimization of Image–Radar Fusion Algorithm Based on Bird's Eye View Features.
- Author
-
Cai, Ganlin, Chen, Feng, and Guo, Ente
- Subjects
- *
OBJECT recognition (Computer vision) , *ALGORITHMS , *VIDEO coding , *AUTONOMOUS vehicles , *CAMERAS , *PROBLEM solving - Abstract
In autonomous driving, the fusion of multiple sensors is considered essential to improve the accuracy and safety of 3D object detection. Currently, a fusion scheme combining low-cost cameras with highly robust radars can counteract the performance degradation caused by harsh environments. In this paper, we propose the IRBEVF-Q model, which mainly consists of BEV (Bird's Eye View) fusion coding module and an object decoder module.The BEV fusion coding module solves the problem of unified representation of different modal information by fusing the image and radar features through 3D spatial reference points as a medium. The query in the object decoder, as a core component, plays an important role in detection. In this paper, Heat Map-Guided Query Initialization (HGQI) and Dynamic Position Encoding (DPE) are proposed in query construction to increase the a priori information of the query. The Auxiliary Noise Query (ANQ) then helps to stabilize the matching. The experimental results demonstrate that the proposed fusion model IRBEVF-Q achieves an NDS of 0.575 and a mAP of 0.476 on the nuScenes test set. Compared to recent state-of-the-art methods, our model shows significant advantages, thus indicating that our approach contributes to improving detection accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Research and Implementation of Indoor Positioning Algorithm Based on Bluetooth 5.1 AOA and AOD.
- Author
-
Xiao, Kun, Hao, Fuzhong, Zhang, Weijian, Li, Nuannuan, and Wang, Yintao
- Subjects
- *
RESEARCH implementation , *BLUETOOTH technology , *ANTENNA arrays , *ALGORITHMS , *LEAST squares , *MIMO radar - Abstract
With the addition of Bluetooth AOA/AOD direction-finding capabilities in the Bluetooth 5.1 protocol and the introduction of antenna array technology into the Bluetooth platform to further enhance positioning accuracy, Bluetooth has gradually become a research hotspot in the field of indoor positioning due to its standard protocol specifications, rich application ecosystem, and outstanding advantages such as low power consumption and low cost compared to other indoor positioning technologies. However, current indoor positioning based on Bluetooth AOA/AOD suffers from overly simplistic core algorithm implementations. When facing different application scenarios, the standalone AOA or AOD algorithms exhibit weak applicability, and they also encounter challenges such as poor positioning accuracy, insufficient real-time performance, and significant effects of multipath propagation. These existing problems and deficiencies render Bluetooth lacking an efficient implementation solution for indoor positioning. Therefore, this paper proposes a study on Bluetooth AOA and AOD indoor positioning algorithms. Through an analysis of the principles of Bluetooth's newly added direction-finding functionality and combined with research on array signal DOA estimation algorithms, the paper ultimately integrates the least squares algorithm to optimize positioning errors in terms of accuracy and incorporates an anti-multipath interference algorithm to address the impacts of multipath effects in different scenarios. Experimental testing demonstrates that the indoor positioning algorithms applicable to Bluetooth AOA and AOD can effectively mitigate accuracy errors and overcome multipath effects, exhibiting strong applicability and significant improvements in real-time performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Analysis of the Generalization Ability of Defogging Algorithms on RICE Remote Sensing Images.
- Author
-
Miao, Guisheng, Zhang, Zhongpeng, and Wang, Zhanbei
- Subjects
- *
RICE , *ALGORITHMS , *GENERALIZATION , *REMOTE sensing , *RESEARCH personnel - Abstract
This paper explores the generalization ability of defogging algorithms on RICE (A Remote Sensing Image Dataset for Cloud Removal) remotely sensed images. RICE is a dataset of remotely sensed images used for removing clouds, allowing the researcher to better evaluate the performance of defogging algorithms for cloud removal from remotely sensed images. In this paper, four classical defogging algorithms, including AOD-Net, FFA-Net, dark channel prior, and DehazeFormer, are selected and applied to the task of de-cloud in RICE remote sensing images. The performance of these algorithms on the RICE dataset is analyzed by comparing the experimental results, and their differences, advantages, and disadvantages in dealing with de-clouded remote sensing images are explored. The experimental results show that the four defogging algorithms are capable of performing well on uniform thin cloud images, but there is a color distortion and the performance is weak when it comes to inhomogeneous clouds as well as thick clouds. So, the generalization ability of the algorithms is weak when the defogging algorithms are applied to the problem of cloud removal. Finally, this paper proposes improvement ideas for the de-cloud problem of RICE remote sensing images and looks forward to possible future research directions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. A High-Performance Anti-Noise Algorithm for Arrhythmia Recognition.
- Author
-
Feng, Jianchao, Si, Yujuan, Zhang, Yu, Sun, Meiqi, and Yang, Wenke
- Subjects
- *
BLIND source separation , *INDEPENDENT component analysis , *ARRHYTHMIA , *SIGNAL separation , *PRINCIPAL components analysis , *ALGORITHMS - Abstract
In recent years, the incidence of cardiac arrhythmias has been on the rise because of changes in lifestyle and the aging population. Electrocardiograms (ECGs) are widely used for the automated diagnosis of cardiac arrhythmias. However, existing models possess poor noise robustness and complex structures, limiting their effectiveness. To solve these problems, this paper proposes an arrhythmia recognition system with excellent anti-noise performance: a convolutionally optimized broad learning system (COBLS). In the proposed COBLS method, the signal is convolved with blind source separation using a signal analysis method based on high-order-statistic independent component analysis (ICA). The constructed feature matrix is further feature-extracted and dimensionally reduced using principal component analysis (PCA), which reveals the essence of the signal. The linear feature correlation between the data can be effectively reduced, and redundant attributes can be eliminated to obtain a low-dimensional feature matrix that retains the essential features of the classification model. Then, arrhythmia recognition is realized by combining this matrix with the broad learning system (BLS). Subsequently, the model was evaluated using the MIT-BIH arrhythmia database and the MIT-BIH noise stress test database. The outcomes of the experiments demonstrate exceptional performance, with impressive achievements in terms of the overall accuracy, overall precision, overall sensitivity, and overall F1-score. Specifically, the results indicate outstanding performance, with figures reaching 99.11% for the overall accuracy, 96.95% for the overall precision, 89.71% for the overall sensitivity, and 93.01% for the overall F1-score across all four classification experiments. The model proposed in this paper shows excellent performance, with 24 dB, 18 dB, and 12 dB signal-to-noise ratios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Modelling and Mitigating Wind Turbine Clutter in Space–Air Bistatic Radar.
- Author
-
Zhang, Shuo, Zhang, Shuangxi, Qiao, Ning, Wang, Yongliang, and Du, Qinglei
- Subjects
- *
WIND turbines , *WIND power plants , *OPTICS , *ALGORITHMS , *BISTATIC radar - Abstract
The extensive deployment of wind farms has significantly impacted the detection capabilities of space–air bistatic radar (SABR) systems. Although space–time adaptive processing techniques are available, their performance is significantly degraded, and even unable to suppress clutter. This paper explores the geometric configuration of the SABR system and the selection of detection areas, establishing a space–time clutter model that addresses the effects of wind turbine clutter (WTC). Expressions for spatial and Doppler frequencies have been derived to deeply analyze the characteristics of clutter spreading. Building on this, the paper extends two-dimensional space–time data to three-dimensional azimuth–elevation–Doppler data. It proposes a three-dimensional space–time multi-beam (STMB) strategy incorporating the Ordering Points to Identify the Clustering Structure (OPTICS) clustering algorithm to suppress WTC effectively. This algorithm selects WTC samples and applies OPTICS clustering to the clutter-suppressed data to achieve this effect. Simulation experiments further verify the effectiveness of the algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Dynamic Programming-Based Track-before-Detect Algorithm for Weak Maneuvering Targets in Range–Doppler Plane.
- Author
-
Wu, Xinghui, Ding, Jieru, Wang, Zhiyi, and Wang, Min
- Subjects
- *
CARTESIAN coordinates , *EVOLUTION equations , *DYNAMIC programming , *MODEL airplanes , *ALGORITHMS , *TRACKING algorithms - Abstract
This paper focuses on detecting and tracking maneuvering weak targets in the range–Doppler (RD) plane with the track-before-detect (TBD) algorithm based on dynamic programming (DP). Traditional DP-TBD algorithms integrate target detection and tracking in their framework while searching the paths provided by a predefined model of the kinematic properties within the constraints allowed. However, both the approximate motion model used in the RD plane and the model mismatch caused when the target undergoes a maneuver can degrade the TBD performance sharply. To address these issues, this paper accurately describes the evolution of the RD equation based on Constant Acceleration (CA) and Coordinated Turn (CT) motion models with the process noise in the Cartesian coordinate system, and it also employs a recursive method to estimate the parameters in the equations for efficient energy accumulation and path searches. Facing the situation that targets energy accumulation during the DP iteration process will lead to an expansion of the target energy accumulation process. This paper designs a more efficient Optimization Function (OF) to inhibit the expansion effect, improve the resolution of the nearby targets, and increase the detection probability of the weak targets simultaneously. In addition, to search the trajectory more efficiently and accurately, we improved the process of DP multi-frame accumulation, thus reducing the computation amount of large-scale searches. Finally, the effectiveness of the proposed method for CA and CT motion target detection and tracking is verified by many of the simulation experiments that were conducted in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Research on a Recognition Algorithm for Traffic Signs in Foggy Environments Based on Image Defogging and Transformer.
- Author
-
Liu, Zhaohui, Yan, Jun, and Zhang, Jinzhao
- Subjects
- *
TRAFFIC signs & signals , *TRAFFIC monitoring , *ALGORITHMS , *AUTONOMOUS vehicles - Abstract
The efficient and accurate identification of traffic signs is crucial to the safety and reliability of active driving assistance and driverless vehicles. However, the accurate detection of traffic signs under extreme cases remains challenging. Aiming at the problems of missing detection and false detection in traffic sign recognition in fog traffic scenes, this paper proposes a recognition algorithm for traffic signs based on pix2pixHD+YOLOv5-T. Firstly, the defogging model is generated by training the pix2pixHD network to meet the advanced visual task. Secondly, in order to better match the defogging algorithm with the target detection algorithm, the algorithm YOLOv5-Transformer is proposed by introducing a transformer module into the backbone of YOLOv5. Finally, the defogging algorithm pix2pixHD is combined with the improved YOLOv5 detection algorithm to complete the recognition of traffic signs in foggy environments. Comparative experiments proved that the traffic sign recognition algorithm proposed in this paper can effectively reduce the impact of a foggy environment on traffic sign recognition. Compared with the YOLOv5-T and YOLOv5 algorithms in moderate fog environments, the overall improvement of this algorithm is achieved. The precision of traffic sign recognition of the algorithm in the fog traffic scene reached 78.5%, the recall rate was 72.2%, and mAP@0.5 was 82.8%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Millimeter-Wave Radar-Based Identity Recognition Algorithm Built on Multimodal Fusion.
- Author
-
Guo, Jian, Wei, Jingpeng, Xiang, Yashan, and Han, Chong
- Subjects
- *
FEATURE extraction , *HEART rate monitors , *ALGORITHMS , *SIGNAL-to-noise ratio - Abstract
Millimeter-wave radar-based identification technology has a wide range of applications in persistent identity verification, covering areas such as security production, healthcare, and personalized smart consumption systems. It has received extensive attention from the academic community due to its advantages of being non-invasive, environmentally insensitive and privacy-preserving. Existing identification algorithms mainly rely on a single signal, such as breathing or heartbeat. The reliability and accuracy of these algorithms are limited due to the high similarity of breathing patterns and the low signal-to-noise ratio of heartbeat signals. To address the above issues, this paper proposes an algorithm for multimodal fusion for identity recognition. This algorithm extracts and fuses features derived from phase signals, respiratory signals, and heartbeat signals for identity recognition purposes. The spatial features of signals with different modes are first extracted by the residual network (ResNet), after which these features are fused with a spatial-channel attention fusion module. On this basis, the temporal features are further extracted with a time series-based self-attention mechanism. Finally, the feature vectors of the user's vital sign modality are obtained to perform identity recognition. This method makes full use of the correlation and complementarity between different modal signals to improve the accuracy and reliability of identification. Simulation experiments show that the algorithm identity recognition proposed in this paper achieves an accuracy of 94.26% on a 20-subject self-test dataset, which is much higher than that of the traditional algorithm, which is about 85%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. HeMoDU: High-Efficiency Multi-Object Detection Algorithm for Unmanned Aerial Vehicles on Urban Roads.
- Author
-
Shi, Hanyi, Wang, Ningzhi, Xu, Xinyao, Qian, Yue, Zeng, Lingbin, and Zhu, Yi
- Subjects
- *
OBJECT recognition (Computer vision) , *ALGORITHMS , *DEEP learning , *TRAFFIC monitoring - Abstract
Unmanned aerial vehicle (UAV)-based object detection methods are widely used in traffic detection due to their high flexibility and extensive coverage. In recent years, with the increasing complexity of the urban road environment, UAV object detection algorithms based on deep learning have gradually become a research hotspot. However, how to further improve algorithmic efficiency in response to the numerous and rapidly changing road elements, and thus achieve high-speed and accurate road object detection, remains a challenging issue. Given this context, this paper proposes the high-efficiency multi-object detection algorithm for UAVs (HeMoDU). HeMoDU reconstructs a state-of-the-art, deep-learning-based object detection model and optimizes several aspects to improve computational efficiency and detection accuracy. To validate the performance of HeMoDU in urban road environments, this paper uses the public urban road datasets VisDrone2019 and UA-DETRAC for evaluation. The experimental results show that the HeMoDU model effectively improves the speed and accuracy of UAV object detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Monogenity and Power Integral Bases: Recent Developments.
- Author
-
Gaál, István
- Subjects
- *
ALGEBRAIC number theory , *ALGEBRAIC numbers , *ALGEBRAIC fields , *POLYNOMIALS , *INTEGRALS - Abstract
Monogenity is a classical area of algebraic number theory that continues to be actively researched. This paper collects the results obtained over the past few years in this area. Several of the listed results were presented at a series of online conferences titled "Monogenity and Power Integral Bases". We also give a collection of the most important methods used in several of these papers. A list of open problems for further research is also given. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. LOD2-Level+ Low-Rise Building Model Extraction Method for Oblique Photography Data Using U-NET and a Multi-Decision RANSAC Segmentation Algorithm.
- Author
-
He, Yufeng, Wu, Xiaobian, Pan, Weibin, Chen, Hui, Zhou, Songshan, Lei, Shaohua, Gong, Xiaoran, Xu, Hanzeyu, and Sheng, Yehua
- Subjects
- *
ARCHITECTURAL details , *DIGITAL elevation models , *POINT cloud , *PHOTOGRAPHY , *ALGORITHMS - Abstract
Oblique photography is a regional digital surface model generation technique that can be widely used for building 3D model construction. However, due to the lack of geometric and semantic information about the building, these models make it difficult to differentiate more detailed components in the building, such as roofs and balconies. This paper proposes a deep learning-based method (U-NET) for constructing 3D models of low-rise buildings that address the issues. The method ensures complete geometric and semantic information and conforms to the LOD2 level. First, digital orthophotos are used to perform building extraction based on U-NET, and then a contour optimization method based on the main direction of the building and the center of gravity of the contour is used to obtain the regular building contour. Second, the pure building point cloud model representing a single building is extracted from the whole point cloud scene based on the acquired building contour. Finally, the multi-decision RANSAC algorithm is used to segment the building detail point cloud and construct a triangular mesh of building components, followed by a triangular mesh fusion and splicing method to achieve monolithic building components. The paper presents experimental evidence that the building contour extraction algorithm can achieve a 90.3% success rate and that the resulting single building 3D model contains LOD2 building components, which contain detailed geometric and semantic information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.