4,478 results
Search Results
2. Servis povezan s prijelomom Hrvatskog društva za fizikalnu i rehabilitacijsku medicinu Hrvatskoga liječničkog zbora – dokument o stajalištu.
- Author
-
Grazio, Simeon, Nikolić, Tatjana, Luke Vrbanić, Tea Schnurrer, Poljičanin, Ana, and Grubišić, Frane
- Abstract
Copyright of Lijecnicki Vjesnik is the property of Croatian Medical Association and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
3. Risikoadaptierte Prostatakarzinomfrüherkennung 2.0 – Positionspapier der Deutschen Gesellschaft für Urologie 2024.
- Author
-
Michel, Maurice Stephan, Gschwend, Jürgen E., Wullich, Bernd, Krege, Susanne, Bolenz, Christian, Merseburger, Axel S., Krabbe, Laura-Maria, Schultz-Lampel, Daniela, König, Frank, Haferkamp, Axel, and Hadaschik, Boris
- Subjects
MORTALITY prevention ,RISK assessment ,BIOPSY ,PROSTATE-specific antigen ,EARLY detection of cancer ,PROSTATE tumors ,MAGNETIC resonance imaging ,ALGORITHMS - Abstract
Copyright of Die Urologie is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
4. Ethische Aspekte im Rahmen von extrakorporalen Herz-Kreislauf-Unterstützungssystemen (ECLS): Konsensuspapier der DGK, DGTHG und DGAI.
- Author
-
Dutzmann, Jochen, Grahn, Hanno, Boeken, Udo, Jung, Christian, Michalsen, Andrej, Duttge, Gunnar, Muellenbach, Ralf, Schulze, P. Christian, Eckardt, Lars, Trummer, Georg, and Michels, Guido
- Subjects
EXTRACORPOREAL membrane oxygenation ,DECISION making ,RESUSCITATION ,LIFE support systems in critical care ,INFORMED consent (Medical law) ,CARDIAC arrest ,CARDIAC pacemakers ,ALGORITHMS - Abstract
Copyright of Die Anaesthesiologie is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. Optimization of Texture Rendering of 3D Building Model Based on Vertex Importance.
- Author
-
Shen, Wenfei, Huo, Liang, Shen, Tao, Zhang, Miao, and Li, Yucai
- Subjects
TEXTURE mapping ,DATA modeling ,CURVATURE ,ALGORITHMS - Abstract
In 3D building models, a large number of texture maps with different sizes increase the number of model data loading and drawing batches, which greatly reduces the drawing efficiency of the model. Therefore, this paper proposes a texture set mapping method based on vertex importance. Firstly, based on the 2D space boxing algorithm, the texture maps are merged and a series of Mipmap texture maps are generated, and then the vertex curvature, texture variability and location information of each vertex are calculated, normalized, and weighted to get the importance of each vertex, and then finally, different Mipmap-level textures are remapped according to the importance of the vertices. The experiment proves that the algorithm in this paper can reduce the amount of texture data on the one hand, and avoid the rendering pressure brought by the still large amount of data after merging on the other hand, so as to improve the rendering efficiency of the model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Discussion paper: implications for the further development of the successfully in emergency medicine implemented AUD2IT-algorithm.
- Author
-
Przestrzelski, Christopher, Jakob, Antonina, Jakob, Clemens, and Hoffmann, Felix R.
- Subjects
DOCUMENTATION ,CURRICULUM ,HUMAN services programs ,EMERGENCY medicine ,EXPERIENCE ,MEDICAL records ,ELECTRONIC publications ,ALGORITHMS ,PATIENTS' attitudes - Abstract
The AUD2IT-algorithm is a tool to structure the data, which is collected during an emergency treatment. The goal is on the one hand to structure the documentation of the data and on the other hand to give a standardised data structure for the report during handover of an emergency patient. AUD2IT-algorithm was developed to provide residents a documentation aid, which helps to structure the medical reports without getting lost in unimportant details or forgetting important information. The sequence of anamnesis, clinical examination, considering a differential diagnosis, technical diagnostics, interpretation and therapy is rather an academic classification than a description of the real workflow. In a real setting, most of these steps take place simultaneously. Therefore, the application of the AUD2IT-algorithm should also be carried out according to the real processes. A big advantage of the AUD2IT-algorithm is that it can be used as a structure for the entire treatment process and also is entirely usable as a handover protocol within this process to make sure, that the existing state of knowledge is ensured at each point of a team-timeout. PR-E-(AUD2IT)-algorithm makes it possible to document a treatment process that, in principle, does not have to be limited to the field of emergency medicine. Also, in the outpatient treatment the PR-E-(AUD2IT)-algorithm could be used and further developed. One example could be the preparation and allocation of needed resources at the general practitioner. The algorithm is a standardised tool that can be used by healthcare professionals of any level of training. It gives the user a sense of security in their daily work. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Socio‐technical issues in the platform‐mediated gig economy: A systematic literature review: An Annual Review of Information Science and Technology (ARIST) paper.
- Author
-
Dedema, Meredith and Rosenbaum, Howard
- Subjects
INFORMATION science ,TECHNOLOGY ,CORPORATE culture ,ALGORITHMS ,ECONOMICS - Abstract
The gig economy and gig work have grown quickly in recent years and have drawn much attention from researchers in different fields. Because the platform mediated gig economy is a relatively new phenomenon, studies have produced a range of interesting findings; of interest here are the socio‐technical issues that this work has surfaced. This systematic literature review (SLR) provides a snapshot of a range of socio‐technical issues raised in the last 12 years of literature focused on the platform mediated gig economy. Based on a sample of 515 papers gathered from nine databases in multiple disciplines, 132 were coded that specifically studied the gig economy, gig work, and gig workers. Three main socio‐technical themes were identified: (1) the digital workplace, which includes information infrastructure and digital labor that are related to the nature of gig work and the user agency; (2) algorithmic management, which includes platform governance, performance management, information asymmetry, power asymmetry, and system manipulation, relying on a diverse set of technological tools including algorithms and big data analytics; (3) ethical design, as a relevant value set that gig workers expect from the platform, which includes trust, fairness, equality, privacy, and transparency. A social informatics perspective is used to rethink the relationship between gig workers and platforms, extract the socio‐technical issues noted in prior research, and discuss the underexplored aspects of the platform mediated gig economy. The results draw attention to understudied yet critically important socio‐technical issues in the gig economy that suggest short‐ and long‐term opportunities for future research directions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. 基于多目标优化的联邦学习进化.
- Author
-
胡智勇, 于千城, 王之赐, and 张丽丝
- Subjects
FEDERATED learning ,ALGORITHMS ,PRIVACY - Abstract
Copyright of Application Research of Computers / Jisuanji Yingyong Yanjiu is the property of Application Research of Computers Edition and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
9. 39‐3: Invited Paper: Kirameki Display: Technical Approaches to Represent Real Texture with Light Fields.
- Author
-
Sumi, Naoki, Edo, Keiko, Shibazaki, Minoru, and Hagino, Shuji
- Subjects
MATERIALS texture ,DESIGN software ,SOFTWARE architecture ,ALGORITHMS - Abstract
We have developed a "Kirameki display" that can represent a real texture of materials. ("Kirameki" means a shining/glittering sense in Japanese.) In addition, we have investigated an improvement of "texture representation" by optimization of both an optical design and a software algorithm. Lastly, we discuss the future technical fields for texture representation on displays. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. A Multi-Metric Model for analyzing and comparing extractive text summarization approaches and algorithms on scientific papers.
- Author
-
DURSUN, Mehmet Ali and SERTTAŞ, Soydan
- Subjects
TEXT summarization ,EDUCATION research ,ALGORITHMS ,AUTOMATIC summarization ,STATISTICS - Abstract
In today's world, where data and information are increasingly proliferating, text summarization and technologies play a critical role in making large amounts of text data more accessible and meaningful. In business, the news industry, academic research, and many other fields, text summarization helps make quick decisions, access information faster, and manage resources more effectively. Additionally, text summarization research is conducted to further improve these technologies and develop new methods and algorithms to provide better summarization of texts. Therefore, text summarization and research in this field are of great importance in the information age. In this study, a new operating model for text summarization that can be applied to different algorithms is proposed and evaluated. Sixteen summarization algorithms covering six approaches (statistical, graph-based, content-based, pointer-based, position-based, and user-oriented) were implemented and tested on 50 different full-text article datasets. Four evaluation criteria (BLEU, Rouge-N, Rouge-L, METEOR) were used to assess the similarity between the generated summaries and the original summaries. The performance of the algorithms within each approach was averaged and the overall best-performing algorithm was selected. This best algorithm was subjected to further analysis through Topic Modelling and Keyword Extraction to identify key topics and keywords within the summarised text. The proposed model provides a standardized workflow for developing and thoroughly testing summarization algorithms across datasets and evaluation metrics to determine the most appropriate summarization approach. This study demonstrates the effectiveness of the model on a variety of algorithm types and text sources. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Guest editorial: AI for computational audition—sound and music processing.
- Author
-
Li, Zijin, Wang, Wenwu, Zhang, Kejun, and Zhu, Mengyao
- Subjects
ARTIFICIAL intelligence ,INTERDISCIPLINARY research ,TRANSVERSAL lines ,ALGORITHMS - Abstract
Nowadays, the application of artificial intelligence (AI) algorithms and techniques is ubiquitous and transversal. Fields that take advantage of AI advances include sound and music processing. The advances in interdisciplinary research potentially yield new insights that may further advance the AI methods in this field. This special issue aims to report recent progress and spur new research lines in AI-driven sound and music processing, especially within interdisciplinary research scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Millimeter-Wave Radar-Based Identity Recognition Algorithm Built on Multimodal Fusion.
- Author
-
Guo, Jian, Wei, Jingpeng, Xiang, Yashan, and Han, Chong
- Subjects
FEATURE extraction ,HEART rate monitors ,ALGORITHMS ,SIGNAL-to-noise ratio - Abstract
Millimeter-wave radar-based identification technology has a wide range of applications in persistent identity verification, covering areas such as security production, healthcare, and personalized smart consumption systems. It has received extensive attention from the academic community due to its advantages of being non-invasive, environmentally insensitive and privacy-preserving. Existing identification algorithms mainly rely on a single signal, such as breathing or heartbeat. The reliability and accuracy of these algorithms are limited due to the high similarity of breathing patterns and the low signal-to-noise ratio of heartbeat signals. To address the above issues, this paper proposes an algorithm for multimodal fusion for identity recognition. This algorithm extracts and fuses features derived from phase signals, respiratory signals, and heartbeat signals for identity recognition purposes. The spatial features of signals with different modes are first extracted by the residual network (ResNet), after which these features are fused with a spatial-channel attention fusion module. On this basis, the temporal features are further extracted with a time series-based self-attention mechanism. Finally, the feature vectors of the user's vital sign modality are obtained to perform identity recognition. This method makes full use of the correlation and complementarity between different modal signals to improve the accuracy and reliability of identification. Simulation experiments show that the algorithm identity recognition proposed in this paper achieves an accuracy of 94.26% on a 20-subject self-test dataset, which is much higher than that of the traditional algorithm, which is about 85%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Special issue "Discrete optimization: Theory, algorithms and new applications".
- Author
-
Werner, Frank
- Subjects
MATHEMATICAL optimization ,METAHEURISTIC algorithms ,ONLINE algorithms ,LINEAR matrix inequalities ,ALGORITHMS ,ROBUST stability analysis ,NONLINEAR integral equations - Abstract
This document is an editorial for a special issue of the journal AIMS Mathematics on the topic of discrete optimization. The issue includes 21 papers covering a range of subjects, including molecular trees, network systems, variational inequality problems, scheduling, image restoration, spectral clustering, integral equations, convex functions, graph products, optimization algorithms, air quality prediction, humanitarian planning, inertial methods, neural networks, transportation problems, emotion identification, fixed-point problems, structural engineering design, single machine scheduling, and ensemble learning. The papers present new theoretical results, algorithms, and applications in these areas. The guest editor expresses gratitude to the journal staff and reviewers and hopes that readers will find inspiration for their own research. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
14. Research on Denoising Algorithm of Composite Thermal Wave Detection Image Based on Improved Total Variation.
- Author
-
Shen, Xuehui and Huang, Qingjiu
- Subjects
IMAGE denoising ,IMAGE intensifiers ,COMPUTER vision ,ALGORITHMS ,HOUGH transforms ,INFORMATION filtering ,RECOMMENDER systems - Abstract
How to improve the high resolution and remove the noise of composite infrared thermal wave detection image have become important research topics in machine vision. Therefore, this paper proposes a composite image enhancement algorithm based on edge adaptive total variation of direction. Using the improved adaptive directional total variation model to construct the guidance image of the guidance filter can provide better structural information for the guidance filter and conduct the guidance filter. This process is iterated to eliminate noise and ladder effect. Experimental results show that this algorithm is superior to other advanced methods in objective evaluation index and subjective vision. The algorithm proposed in this paper can not only effectively eliminate noise and ladder effect, but also highlight image details and structure information, which proves the effectiveness of this algorithm. Discover the cutting-edge algorithm for high-resolution improvement and noise elimination in infrared thermal wave detection images. Our innovative composite image enhancement technique, based on edge adaptive total variation, outperforms traditional methods. The improved directional model provides better structural information, optimizing the guidance filter process. Experimental results reveal its superiority in objective evaluation and subjective vision. This algorithm effectively eliminates noise and ladder effect while highlighting image details, validating its remarkable effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. A Comprehensive Review of Text Mining Approaches for Predicting Human Behavior using Deep Learning Method.
- Author
-
Mia, Md Tuhin, Ferdus, Mst Zannatun, Rakib Rahat, Md Abdur, Anjum, Nishat, Siddiqua, Cynthia Ummay, and Hossain Raju, Md Azad
- Subjects
HUMAN behavior ,NATURAL language processing ,DATA extraction ,TEXT mining ,ALGORITHMS - Abstract
This article presents a systematic review of research on predicting human behavior through unstructured textual data, employing a comprehensive selection process illustrated in a flow diagram. The review categorizes 82 selected papers into three primary behavioral domains: emotional, social, and cognitive. Each paper undergoes meticulous examination, identifying objectives, algorithms, computational models, and applications. Natural language processing (NLP) emerges as a dominant text mining approach, utilized in over half of the literature, followed by data extraction, report arrangement, and clusterization. The study further employs VOSviewer to visualize the co-occurrence of the term "text mining," revealing prevalent associations and emphasizing the challenges in analyzing unstructured data efficiently. The article contributes to understanding the evolving landscape of behavior analysis through text mining, addressing the need for automated methods in evaluating individuals' attitudes, emotions, or performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Improved lightweight YOLOv5 based on ShuffleNet and its application on traffic signs detection.
- Author
-
Liu, Liwei, Wang, Lei, and Ma, Zhuang
- Subjects
TRAFFIC monitoring ,TRAFFIC signs & signals ,SPEED ,ALGORITHMS - Abstract
Traffic signs detection is an important and challenging task in intelligent driving perception system. This paper proposes an improved lightweight traffic signs detection framework based on YOLOv5. Firstly, the YOLOv5's backbone is replaced with ShuffleNet v2, which simplifies the calculation complexity and reduces the parameters of backbone network. Secondly, aiming at the problem of inconspicuous traffic sign characteristics in complex road environment, we use the CA attention mechanism in this paper to improve the saliency of the object. Finally, aiming at the large-scale difference between the traffic signs and the high proportion of small objects, we design the BCS-FPN to fuse multi-scale features and improve the representation ability of the small-scale objects. The TT-100K dataset is also analyzed and the dataset is collated. We test on the collated TT-100K dataset for the improved YOLOv5 in this paper. And the results show that compared with YOLOv5s, the mAP of our algorithm is equivalent to that of YOLOv5s, and the speed is improved by 20.8%. This paper also has carried on the experiment on embedded devices, experimental results show that our framework in computing power less embedded devices has a better effect. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Robot Operating Systems–You Only Look Once Version 5–Fleet Efficient Multi-Scale Attention: An Improved You Only Look Once Version 5-Lite Object Detection Algorithm Based on Efficient Multi-Scale Attention and Bounding Box Regression Combined with Robot Operating Systems
- Author
-
Wang, Haiyan, Shi, Zhan, Gao, Guiyuan, Li, Chuang, Zhao, Jian, and Xu, Zhiwei
- Subjects
OBJECT recognition (Computer vision) ,COMPUTER performance ,ALGORITHMS ,ROBOTICS ,ROBOTS - Abstract
This paper primarily investigates enhanced object detection techniques for indoor service mobile robots. Robot operating systems (ROS) supply rich sensor data, which boost the models' ability to generalize. However, the model's performance might be hindered by constraints in the processing power, memory capacity, and communication capabilities of robotic devices. To address these issues, this paper proposes an improved you only look once version 5 (YOLOv5)-Lite object detection algorithm based on efficient multi-scale attention and bounding box regression combined with ROS. The algorithm incorporates efficient multi-scale attention (EMA) into the traditional YOLOv5-Lite model and replaces the C3 module with a lightweight C3Ghost module to reduce computation and model size during the convolution process. To enhance bounding box localization accuracy, modified precision-defined intersection over union (MPDIoU) is employed to optimize the model, resulting in the ROS–YOLOv5–FleetEMA model. The results indicated that relative to the conventional YOLOv5-Lite model, the ROS–YOLOv5–FleetEMA model enhanced the mean average precision (mAP) by 2.7% post-training, reduced giga floating-point operations per second (GFLOPS) by 13.2%, and decreased the params by 15.1%. In light of these experimental findings, the model was incorporated into ROS, leading to the development of a ROS-based object detection platform that offers rapid and precise object detection capabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Improved Convolutional Neural Network Algorithm for Student Behavior Detection in the Classroom.
- Author
-
Yihua Liu and Weirong Wang
- Subjects
CONVOLUTIONAL neural networks ,PSYCHOLOGY of students ,FEATURE extraction ,BISPECIFIC antibodies ,ALGORITHMS ,HUMAN fingerprints - Abstract
The performance of the existing student classroom behavior detection model is affected by various aspects such as dataset, algorithm and height as well as the differences between different classrooms, and there are problems such as a single dataset, low accuracy and low efficiency. In order to improve the accuracy of student classroom behavior detection algorithm, this paper proposes a student classroom behavior detection method based on improved convolutional neural network algorithm. Firstly, the student behavior detection dataset is constructed, and the student classroom behavior detection technology scheme is designed; secondly, in order to improve the detection accuracy, the features are extracted by using the new jumping bi-directional paths, and the attention mechanism module is added at different positions to improve the path aggregation network; weekly, the embedding positions of the attention mechanism strategy are determined by analyzing multiple sets of experiments, and the proposed student classroom behavior detection algorithm's effectiveness and superiority. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. A Study of an Anomaly Detection System for Small Hydropower Data considering Multivariate Time Series.
- Author
-
Yang, Bo, Lyu, Zhongliang, Wei, Hua, and Wei, Chun
- Subjects
WATER power ,DATA management ,TIME series analysis ,RELIABILITY in engineering ,ALGORITHMS - Abstract
Data anomaly detection in small hydropower stations is an important research area because it positively affects the reliability of optimal scheduling and subsequent analytical studies of small hydropower station clusters. Although many anomaly detection algorithms have been introduced in the data preprocessing stage in various research areas, there is still little research on effective and highly reliable anomaly detection systems for practical applications in small hydropower stations. Therefore, this paper proposes a real‐time data anomaly detection system for small hydropower clusters (RDADS‐SHC) considering multiple time series. It addresses the difficulties of timely detection, alerting, and management of real‐time data anomalies (errors, omissions, and so on) in existing small hydropower stations. It proposes a real‐time data anomaly detection algorithm for small hydropower stations integrated with the Z‐score and dynamic time warping, which can detect and process abnormal information more accurately and efficiently, thereby improving the stability and reliability of data sampling. The paper proposes a Keepalived‐based hot‐standby RDADS‐SHC deployment model with m (m ≥ 2) units. It can automatically remove and restart faulty services and switch to their standbys, which significantly improve the reliability of the proposed system, ensuring the safe and stable operation of related functional services. This paper can detect anomalous data more accurately, and the system is more stable and reliable in a cluster detection environment. The actual operation has shown that compared with existing anomaly detection systems, the architecture and algorithms proposed in this paper can detect anomalous data more accurately, and the system is more stable and reliable in the small hydropower cluster detection environment. It solves abnormal data management in small hydropower stations and provides reliable support for subsequent analysis and decision‐making. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. A review on over-sampling techniques in classification of multi-class imbalanced datasets: insights for medical problems.
- Author
-
Yuxuan Yang, Khorshidi, Hadi Akbarzadeh, and Aickelin, Uwe
- Subjects
DATABASE management ,PREDICTION models ,MEDICAL informatics ,STATISTICAL sampling ,ARTIFICIAL intelligence ,RESEARCH bias ,MACHINE learning ,ALGORITHMS - Abstract
There has been growing attention to multi-class classification problems, particularly those challenges of imbalanced class distributions. To address these challenges, various strategies, including data-level re-sampling treatment and ensemble methods, have been introduced to bolster the performance of predictive models and Artificial Intelligence (AI) algorithms in scenarios where excessive level of imbalance is present. While most research and algorithm development have been focused on binary classification problems, in health informatics there is an increased interest in the field to address the problem of multi-class classification in imbalanced datasets. Multi-class imbalance problems bring forth more complex challenges, as a delicate approach is required to generate synthetic data and simultaneously maintain the relationship between the multiple classes. The aim of this review paper is to examine over-sampling methods tailored for medical and other datasets with multi-class imbalance. Out of 2,076 peer-reviewed papers identified through searches, 197 eligible papers were chosen and thoroughly reviewed for inclusion, narrowing to 37 studies being selected for in-depth analysis. These studies are categorised into four categories: metric, adaptive, structure-based, and hybrid approaches. The most significant finding is the emerging trend toward hybrid resampling methods that combine the strengths of various techniques to effectively address the problem of imbalanced data. This paper provides an extensive analysis of each selected study, discusses their findings, and outlines directions for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Multi-Level Image Segmentation Combining Chaotic Initialized Chimp Optimization Algorithm and Cauchy Mutation.
- Author
-
Li, Shujing, Li, Zhangfei, Cheng, Wenhui, Qi, Chenyang, and Li, Linguo
- Subjects
OPTIMIZATION algorithms ,THRESHOLDING algorithms ,DIAGNOSTIC imaging ,ALGORITHMS ,UNIFORMITY ,IMAGE segmentation - Abstract
To enhance the diversity and distribution uniformity of initial population, as well as to avoid local extrema in the Chimp Optimization Algorithm (CHOA), this paper improves the CHOA based on chaos initialization and Cauchy mutation. First, Sin chaos is introduced to improve the random population initialization scheme of the CHOA, which not only guarantees the diversity of the population, but also enhances the distribution uniformity of the initial population. Next, Cauchy mutation is added to optimize the global search ability of the CHOA in the process of position (threshold) updating to avoid the CHOA falling into local optima. Finally, an improved CHOA was formed through the combination of chaos initialization and Cauchy mutation (CICMCHOA), then taking fuzzy Kapur as the objective function, this paper applied CICMCHOA to natural and medical image segmentation, and compared it with four algorithms, including the improved Satin Bowerbird optimizer (ISBO), Cuckoo Search (ICS), etc. The experimental results deriving from visual and specific indicators demonstrate that CICMCHOA delivers superior segmentation effects in image segmentation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Lane Attribute Classification Based on Fine-Grained Description.
- Author
-
He, Zhonghe, Gong, Pengfei, Ye, Hongcheng, and Gan, Zizheng
- Subjects
TRAFFIC monitoring ,ROAD markings ,PROBLEM solving ,ANNOTATIONS ,ALGORITHMS ,INTELLIGENT transportation systems - Abstract
As an indispensable part of the vehicle environment perception task, road traffic marking detection plays a vital role in correctly understanding the current traffic situation. However, the existing traffic marking detection algorithms still have some limitations. Taking lane detection as an example, the current detection methods mainly focus on the location information detection of lane lines, and they only judge the overall attribute of each detected lane line instance, thus lacking more fine-grained dynamic detection of lane line attributes. In order to meet the needs of intelligent vehicles for the dynamic attribute detection of lane lines and more perfect road environment information in urban road environment, this paper constructs a fine-grained attribute detection method for lane lines, which uses pixel-level attribute sequence points to describe the complete attribute distribution of lane lines and then matches the detection results of the lane lines. Realizing the attribute judgment of different segment positions of lane instances is called the fine-grained attribute detection of lane lines (Lane-FGA). In addition, in view of the lack of annotation information in the current open-source lane data set, this paper constructs a lane data set with both lane instance information and fine-grained attribute information by combining manual annotation and intelligent annotation. At the same time, a cyclic iterative attribute inference algorithm is designed to solve the difficult problem of lane attribute labeling in areas without visual cues such as occlusion and damage. In the end, the average accuracy of the proposed algorithm reaches 97% on various types of lane attribute detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. USVs Path Planning for Maritime Search and Rescue Based on POS-DQN: Probability of Success-Deep Q-Network.
- Author
-
Liu, Lu, Shan, Qihe, and Xu, Qi
- Subjects
DEEP reinforcement learning ,RESCUE work ,AUTONOMOUS vehicles ,PROBLEM solving ,ALGORITHMS - Abstract
Efficient maritime search and rescue (SAR) is crucial for responding to maritime emergencies. In traditional SAR, fixed search path planning is inefficient and cannot prioritize high-probability regions, which has significant limitations. To solve the above problems, this paper proposes unmanned surface vehicles (USVs) path planning for maritime SAR based on POS-DQN so that USVs can perform SAR tasks reasonably and efficiently. Firstly, the search region is allocated as a whole using an improved task allocation algorithm so that the task region of each USV has priority and no duplication. Secondly, this paper considers the probability of success (POS) of the search environment and proposes a POS-DQN algorithm based on deep reinforcement learning. This algorithm can adapt to the complex and changing environment of SAR. It designs a probability weight reward function and trains USV agents to obtain the optimal search path. Finally, based on the simulation results, by considering the complete coverage of obstacle avoidance and collision avoidance, the search path using this algorithm can prioritize high-probability regions and improve the efficiency of SAR. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Target Detection on Water Surfaces Using Fusion of Camera and LiDAR Based Information.
- Author
-
Li, Yongguo, Wang, Yuanrong, Xie, Jia, Xu, Caiyin, and Zhang, Kun
- Subjects
LIDAR ,AUTONOMOUS vehicles ,WATER use ,DETECTORS ,ALGORITHMS - Abstract
To address the challenges of missed detections in water surface target detection using solely visual algorithms in unmanned surface vehicle (USV) perception, this paper proposes a method based on the fusion of visual and LiDAR point-cloud projection for water surface target detection. Firstly, the visual recognition component employs an improved YOLOv7 algorithm based on a self-built dataset for the detection of water surface targets. This algorithm modifies the original YOLOv7 architecture to a Slim-Neck structure, addressing the problem of excessive redundant information during feature extraction in the original YOLOv7 network model. Simultaneously, this modification simplifies the computational burden of the detector, reduces inference time, and maintains accuracy. Secondly, to tackle the issue of sample imbalance in the self-built dataset, slide loss function is introduced. Finally, this paper replaces the original Complete Intersection over Union (CIoU) loss function with the Minimum Point Distance Intersection over Union (MPDIoU) loss function in the YOLOv7 algorithm, which accelerates model learning and enhances robustness. To mitigate the problem of missed recognitions caused by complex water surface conditions in purely visual algorithms, this paper further adopts the fusion of LiDAR and camera data, projecting the three-dimensional point-cloud data from LiDAR onto a two-dimensional pixel plane. This significantly reduces the rate of missed detections for water surface targets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Research on a Recognition Algorithm for Traffic Signs in Foggy Environments Based on Image Defogging and Transformer.
- Author
-
Liu, Zhaohui, Yan, Jun, and Zhang, Jinzhao
- Subjects
TRAFFIC signs & signals ,TRAFFIC monitoring ,ALGORITHMS ,AUTONOMOUS vehicles - Abstract
The efficient and accurate identification of traffic signs is crucial to the safety and reliability of active driving assistance and driverless vehicles. However, the accurate detection of traffic signs under extreme cases remains challenging. Aiming at the problems of missing detection and false detection in traffic sign recognition in fog traffic scenes, this paper proposes a recognition algorithm for traffic signs based on pix2pixHD+YOLOv5-T. Firstly, the defogging model is generated by training the pix2pixHD network to meet the advanced visual task. Secondly, in order to better match the defogging algorithm with the target detection algorithm, the algorithm YOLOv5-Transformer is proposed by introducing a transformer module into the backbone of YOLOv5. Finally, the defogging algorithm pix2pixHD is combined with the improved YOLOv5 detection algorithm to complete the recognition of traffic signs in foggy environments. Comparative experiments proved that the traffic sign recognition algorithm proposed in this paper can effectively reduce the impact of a foggy environment on traffic sign recognition. Compared with the YOLOv5-T and YOLOv5 algorithms in moderate fog environments, the overall improvement of this algorithm is achieved. The precision of traffic sign recognition of the algorithm in the fog traffic scene reached 78.5%, the recall rate was 72.2%, and mAP@0.5 was 82.8%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Critical lab values: A 50-year perspective honoring the MLO anniversary of publishing the laboratory panic values paper.
- Author
-
Lundberg, George D.
- Subjects
SERIAL publications ,GENERATIVE artificial intelligence ,DOCUMENTATION ,LABORATORIES ,MEDICARE ,LEADERSHIP ,DECISION making ,SPECIAL days ,PUBLISHING ,ATTITUDES of medical personnel ,COLLECTION & preservation of biological specimens ,TIME ,LABOR supply ,ALGORITHMS - Abstract
The article focuses on the significance of critical laboratory values and their role in preventing life-threatening situations, highlighting the historical development of a systematic approach to manage these values. Topics include the implementation of the original critical value system at Los Angeles County/USC Medical Center, the contributions of Dr. Sol Bernstein to laboratory utilization, and the broader sociologic and economic factors influencing this advancement in the 1960s.
- Published
- 2024
27. Determining the Moho topography using an improved inversion algorithm: a case study from the South China Sea.
- Author
-
Zhang, Hui, Yu, Hangtao, Xu, Chuang, Li, Rui, Bie, Lu, He, Qingyin, Liu, Yiqi, Lu, Jinsong, Xiao, Yinan, Lyu, Yang, Eldosouky, Ahmed M., and Loureiro, Afonso
- Subjects
MOHOROVICIC discontinuity ,OPTIMIZATION algorithms ,TOPOGRAPHY ,ALGORITHMS - Abstract
The Parker-Oldenburg method, as a classical frequency-domain algorithm, has been widely used in Moho topographic inversion. The method has two indispensable hyperparameters, which are the Moho density contrast and the average Moho depth. Accurate hyperparameters are important prerequisites for inversion of fine Moho topography. However, limited by the nonlinear terms, the hyperparameters estimated by previous methods have obvious deviations. For this reason, this paper proposes a new method to improve the existing ParkerOldenburg method by taking advantage of the invasive weed optimization algorithm in estimating hyperparameters. The synthetic test results of the new method show that, compared with the trial and error method and the linear regression method, the new method estimates the hyperparameters more accurately, and the computational efficiency performs excellently, which lays the foundation for the inversion of more accurate Moho topography. In practice, the method is applied to the Moho topographic inversion in the South China Sea. With the constraints of available seismic data, the crust-mantle density contrast and the average Moho depth in the South China Sea are determined to be 0.535 g/cm
3 and 21.63 km, respectively, and the Moho topography of the South China Sea is inverted based on this. The results of the Moho topography show that the Moho depth in the study area ranges from 5.7 km to 32.3 km, with more obvious undulations. Among them, the shallowest part of the Moho topography is mainly located in the southern part of the Southwestern sub-basin and the southern part of the Manila Trench, with a depth of about 6 km. Compared with the CRUST 1.0 model and the model calculated by the improved Bott's method, the RMS between the Moho model and the seismic point difference in this paper is smaller, which proves that the method in this paper has some advantages in Moho topographic inversion. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
28. A term extraction algorithm based on machine learning and comprehensive feature strategy.
- Author
-
Gong, Xiuliang, Cheng, Bo, Hu, Xiaomei, and Bo, Wen
- Subjects
MACHINE learning ,NATURAL language processing ,ALGORITHMS ,RANDOM fields ,ONTOLOGIES (Information retrieval) ,DATABASES ,MACHINE translating - Abstract
Manual term extraction is similar to literal meaning: A translator browses text, classifies words, and prepares for translation. Terminology, as a centralized carrier of expertise, creation, popularization, and disappearance, dynamically reflects the development and evolution of an industry. The automatic extraction of terminology is a key technology for creating a professional terminology database, and it is also a key topic in the field of natural language processing. The purpose of this paper is to study how to analyse a term extraction algorithm based on machine learning and a comprehensive feature strategy. Focusing on the problems of poor generality and single statistical features of current term extraction algorithms, this paper proposes an improved domain ontology term extraction algorithm based on a comprehensive feature strategy. Moreover, automatic term extraction experiments based on a word-based maximum entropy model and a conditional random field model based on machine learning are conducted in this paper. Its word-based conditional random field model outperforms the maximum entropy model. The experimental results show that the algorithm based on the comprehensive feature strategy improves the accuracy by 8.6% compared with the TF-IDF algorithm and the C-value term extraction algorithm. This algorithm can be used to effectively extract the terms in a text and has good generality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Autonomous localized path planning algorithm for UAVs based on TD3 strategy.
- Author
-
Feiyu, Zhao, Dayan, Li, Zhengxu, Wang, Jianlin, Mao, and Niya, Wang
- Subjects
DRONE aircraft ,ALGORITHMS ,PROBLEM solving - Abstract
Unmanned Aerial Vehicles are useful tools for many applications. However, autonomous path planning for Unmanned Aerial Vehicles in unfamiliar environments is a challenging problem when facing a series of problems such as poor consistency, high influence by the native controller of the Unmanned Aerial Vehicles. In this paper, we investigate reinforcement learning-based autonomous local path planning methods for Unmanned Aerial Vehicles with high autonomous decision-making capability and locally high portability. We propose an autonomous local path planning algorithm based on the TD3 strategy to solve the problem of local obstacle avoidance and path planning in unfamiliar environments using autonomous decision-making of Unmanned Aerial Vehicles. The simulation results on Gazebo show that our method can effectively realize the autonomous local path planning task for Unmanned Aerial Vehicles, the success rate of path planning with our method can reach 93% under the interference of no obstacles, and 92% in the environment with obstacles. Finally, our method can be used for autonomous path planning of Unmanned Aerial Vehicles in unfamiliar environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Privacy-Preserving Federated Deep Learning Diagnostic Method for Multi-Stage Diseases.
- Author
-
Jinbo Yang, Hai Huang, Lailai Yin, Jiaxing Qu, and Wanjuan Xie
- Subjects
ARTIFICIAL neural networks ,MACHINE learning ,INTEGRATED circuits ,DATA privacy ,ALGORITHMS ,NATURAL languages ,DEEP learning - Abstract
Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources, including clinical symptoms, physical signs, biochemical test results, imaging findings, pathological examination data, and even genetic data. When applying machine learning modeling to predict and diagnose multi-stage diseases, several challenges need to be addressed. Firstly, the model needs to handle multimodal data, as the data used by doctors for diagnosis includes image data, natural language data, and structured data. Secondly, privacy of patients' data needs to be protected, as these data contain the most sensitive and private information. Lastly, considering the practicality of the model, the computational requirements should not be too high. To address these challenges, this paper proposes a privacy-preserving federated deep learning diagnostic method for multi-stage diseases. This method improves the forward and backward propagation processes of deep neural network modeling algorithms and introduces a homomorphic encryption step to design a federated modeling algorithm without the need for an arbiter. It also utilizes dedicated integrated circuits to implement the hardware Paillier algorithm, providing accelerated support for homomorphic encryption in modeling. Finally, this paper designs and conducts experiments to evaluate the proposed solution. The experimental results show that in privacy-preserving federated deep learning diagnostic modeling, the method in this paper achieves the same modeling performance as ordinary modeling without privacy protection, and has higher modeling speed compared to similar algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Online Social Network Information Source Identification Algorithm Based on Multi-Attribute Topological Clustering.
- Author
-
Dong, Ming, Lu, Yujuan, Tan, Zhenhua, and Zhang, Bin
- Subjects
ONLINE social networks ,INFORMATION resources ,INFORMATION networks ,INFORMATION dissemination ,ALGORITHMS ,IDENTIFICATION - Abstract
This paper focuses on the problem of information source identification in online social networks (OSNs). By analyzing the research situation of source identification problems and challenges (such as the randomness of the information dissemination process and complexity of the underlying network topology), this paper studies the problem of multiple source diffusion and proposes a source identification algorithm based on multi-attribute topological clustering (MaTC). The basic idea of the algorithm is to decompose the multi-source problems into a series of single-source problems by using clustering partitioning to improve accuracy and efficiency. Firstly, it estimates the number of source nodes, which is also the number of network partitions, then characterizes the combination of multiple attribute structures as an attribute index of topological clustering, performs an analysis of the distribution of real source nodes in each partition to evaluate the accuracy of the clustering partition, and finally uses Jordan centrality within each partition for single-source identification. Through comparative experiments, it is verified that the proposed MaTC algorithm is superior to the comparison algorithms in evaluating indicators. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Path planning algorithm for percutaneous puncture lung mass biopsy procedure based on the multi-objective constraints and fuzzy optimization.
- Author
-
Zhang, Jiayu, Zhang, Jing, Han, Ping, Chen, Xin-Zu, Zhang, Yu, Li, Wen, Qin, Jing, and He, Ling
- Subjects
OPTIMIZATION algorithms ,LUNGS ,ALGORITHMS ,COMPUTED tomography ,BIOPSY ,HUMAN fingerprints - Abstract
Objective. The percutaneous puncture lung mass biopsy procedure, which relies on preoperative CT (Computed Tomography) images, is considered the gold standard for determining the benign or malignant nature of lung masses. However, the traditional lung puncture procedure has several issues, including long operation times, a high probability of complications, and high exposure to CT radiation for the patient, as it relies heavily on the surgeon's clinical experience. Approach. To address these problems, a multi-constrained objective optimization model based on clinical criteria for the percutaneous puncture lung mass biopsy procedure has been proposed. Additionally, based on fuzzy optimization, a multidimensional spatial Pareto front algorithm has been developed for optimal path selection. The algorithm finds optimal paths, which are displayed on 3D images, and provides reference points for clinicians' surgical path planning. Main results. To evaluate the algorithm's performance, 25 data sets collected from the Second People's Hospital of Zigong were used for prospective and retrospective experiments. The results demonstrate that 92% of the optimal paths generated by the algorithm meet the clinicians' surgical needs. Significance. The algorithm proposed in this paper is innovative in the selection of mass target point, the integration of constraints based on clinical standards, and the utilization of multi-objective optimization algorithm. Comparison experiments have validated the better performance of the proposed algorithm. From a clinical standpoint, the algorithm proposed in this paper has a higher clinical feasibility of the proposed pathway than related studies, which reduces the dependency of the physician's expertise and clinical experience on pathway planning during the percutaneous puncture lung mass biopsy procedure. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. A Lightweight Remote Sensing Small Target Image Detection Algorithm Based on Improved YOLOv8.
- Author
-
Nie, Haijiao, Pang, Huanli, Ma, Mingyang, and Zheng, Ruikai
- Subjects
OBJECT recognition (Computer vision) ,ALGORITHMS ,REMOTE-sensing images ,REMOTE sensing - Abstract
In response to the challenges posed by small objects in remote sensing images, such as low resolution, complex backgrounds, and severe occlusions, this paper proposes a lightweight improved model based on YOLOv8n. During the detection of small objects, the feature fusion part of the YOLOv8n algorithm retrieves relatively fewer features of small objects from the backbone network compared to large objects, resulting in low detection accuracy for small objects. To address this issue, firstly, this paper adds a dedicated small object detection layer in the feature fusion network to better integrate the features of small objects into the feature fusion part of the model. Secondly, the SSFF module is introduced to facilitate multi-scale feature fusion, enabling the model to capture more gradient paths and further improve accuracy while reducing model parameters. Finally, the HPANet structure is proposed, replacing the Path Aggregation Network with HPANet. Compared to the original YOLOv8n algorithm, the recognition accuracy of mAP@0.5 on the VisDrone data set and the AI-TOD data set has increased by 14.3% and 17.9%, respectively, while the recognition accuracy of mAP@0.5:0.95 has increased by 17.1% and 19.8%, respectively. The proposed method reduces the parameter count by 33% and the model size by 31.7% compared to the original model. Experimental results demonstrate that the proposed method can quickly and accurately identify small objects in complex backgrounds. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. RF-KELM indoor positioning algorithm based on WiFi RSS fingerprint.
- Author
-
Hou, Bingnan and Wang, Yanchun
- Subjects
HUMAN fingerprints ,MACHINE learning ,ALGORITHMS ,FINGERPRINT databases ,SIGNAL processing ,ELECTRONIC data processing - Abstract
WiFi-based fingerprint indoor positioning technology has been widely concerned, but it has been facing the challenge of lack of robustness to signal changes, and the positioning service requires fast and accurate positioning estimation. Therefore, an random forest-kernel extreme learning machine (RF-KELM) positioning algorithm with good comprehensive performance is proposed in this paper. Both offline and online phases are included by this algorithm. In the offline phase, the original data of WiFi fingerprint is first transformed into a form more suitable for positioning. Then, access point (AP) selection is performed on the fingerprint database containing many useless APs, in which an RF which can evaluate the importance of features is used. Finally, the KELM is trained with the sub-database that have undergone data transformation and AP selection. In the online phase, firstly, the obtained signal is processed, and then the trained KELM is used to predict the position of the data processed signal. In this paper, the performance of the proposed RF-KELM positioning algorithm is thoroughly tested on a publicly available dataset, and the experimental results demonstrate that the proposed algorithm not only has high positioning accuracy and robustness, but also takes only 0.08 s to position online. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Optimization of Sewing Equipment Based on Improved Genetic-ant Colony Hybrid Algorithm.
- Author
-
Ning Rao, Wenbing Jin, Yuemei Yang, Yihui Liao, and Liangjing OuYang
- Subjects
ANT algorithms ,SEWING supplies ,OPTIMIZATION algorithms ,TRAVELING salesman problem ,ANT colonies ,ANT behavior ,CUTTING stock problem ,ALGORITHMS - Abstract
The optimization of the cutting path of the sample can effectively reduce the cutting time, thereby improving the production efficiency of numerical control processing. This paper comprehensively considers the impact of the cutting order and the position of the knife entry point on the cutting path, converts the cutting path problem into a type of traveling salesman problem (TSP), and proposes an improved genetic-particle swarm optimization algorithm. The selection mechanism of the algorithm combines the elitist retention strategy and roulette wheel selection method to accelerate the search for the optimal solution; the mutation strategy designs a linear decreasing mutation rate, which enhances the global search ability; at the same time, introduces the ant colony optimization algorithm to process the fitness function, adjusts the population evolution difference, and speeds up the optimization process. Through this hybrid algorithm, the cutting order of the sample can be quickly optimized, and the nearest neighbor algorithm is used to determine the position of the knife entry point. Tests are conducted on clothing patterning charts and standard examples. Compared with several commonly used algorithms, experimental results verify the feasibility and effectiveness of this algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Avoiding the Digital Age is Hurting Research Efforts: A greater shift from paper records and physical assets is achievable.
- Author
-
HOLLAN, MIKE
- Subjects
DIGITAL technology ,ARTIFICIAL intelligence ,LIFE sciences ,AUTOMATIC data collection systems ,ELECTRONIC data interchange ,ELECTRONIC health records ,MACHINE learning ,DRUG development ,ALGORITHMS - Abstract
The article offers information on the importance of data in drug development and the life sciences industry. Topics include the use of new technologies like AI and machine learning for data collection and analysis, the persistence of paper-based processes in the industry, and challenges such as the "first-mile problem" in data collection and management.
- Published
- 2024
37. Deep Learning Algorithms for Traffic Forecasting: A Comprehensive Review and Comparison with Classical Ones.
- Author
-
Afandizadeh, Shahriar, Abdolahi, Saeid, Mirzahossein, Hamid, and Li, Ruimin
- Subjects
MACHINE learning ,TRAFFIC estimation ,TRANSPORTATION management system ,DEEP learning ,INTELLIGENT transportation systems ,ALGORITHMS ,FORECASTING ,TRAFFIC safety - Abstract
Accurate and timely forecasting of critical components is pivotal in intelligent transportation systems and traffic management, crucially mitigating congestion and enhancing safety. This paper aims to comprehensively review deep learning algorithms and classical models employed in traffic forecasting. Spanning diverse traffic datasets, the study encompasses various scenarios, offering a nuanced understanding of traffic forecasting methods. Reviewing 111 seminal research works since the 1980s, encompassing both deep learning and classical models, the paper begins by detailing the data sources utilized in transportation systems. Subsequently, it delves into the theoretical underpinnings of prevalent deep learning algorithms and classical models prevalent in traffic forecasting. Furthermore, it investigates the application of these algorithms and models in forecasting key traffic characteristics, informed by their utility in transport and traffic analyses. Finally, the study elucidates the merits and drawbacks of proposed models through applied research in traffic forecasting. Findings indicate that while deep learning algorithms and classic models serve as valuable tools, their suitability varies across contexts, necessitating careful consideration in future studies. The study underscores research opportunities in road traffic forecasting, providing a comprehensive guide for future endeavors in this domain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Multi-Robot Collaborative Mapping with Integrated Point-Line Features for Visual SLAM.
- Author
-
Xia, Yu, Wu, Xiao, Ma, Tao, Zhu, Liucun, Cheng, Jingdi, and Zhu, Junwu
- Subjects
VISUAL odometry ,MOBILE operating systems ,MOBILE robots ,ALGORITHMS ,PHOTOGRAMMETRY ,ROBOTS - Abstract
Simultaneous Localization and Mapping (SLAM) enables mobile robots to autonomously perform localization and mapping tasks in unknown environments. Despite significant progress achieved by visual SLAM systems in ideal conditions, relying solely on a single robot and point features for mapping in large-scale indoor environments with weak-texture structures can affect mapping efficiency and accuracy. Therefore, this paper proposes a multi-robot collaborative mapping method based on point-line fusion to address this issue. This method is designed for indoor environments with weak-texture structures for localization and mapping. The feature-extraction algorithm, which combines point and line features, supplements the existing environment point feature-extraction method by introducing a line feature-extraction step. This integration ensures the accuracy of visual odometry estimation in scenes with pronounced weak-texture structure features. For relatively large indoor scenes, a scene-recognition-based map-fusion method is proposed in this paper to enhance mapping efficiency. This method relies on visual bag of words to determine overlapping areas in the scene, while also proposing a keyframe-extraction method based on photogrammetry to improve the algorithm's robustness. By combining the Perspective-3-Point (P3P) algorithm and Bundle Adjustment (BA) algorithm, the relative pose-transformation relationships of multi-robots in overlapping scenes are resolved, and map fusion is performed based on these relative pose relationships. We evaluated our algorithm on public datasets and a mobile robot platform. The experimental results demonstrate that the proposed algorithm exhibits higher robustness and mapping accuracy. It shows significant effectiveness in handling mapping in scenarios with weak texture and structure, as well as in small-scale map fusion. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Deep Learning-Based Intelligent Detection Device for Insulation Pull Rod Defects.
- Author
-
Yu, Hua, Niu, Shu, Li, Shuai, Yang, Gang, Wang, Xuan, Luo, Hanhua, Fan, Xianhao, and Li, Chuanyang
- Subjects
OBJECT recognition (Computer vision) ,INTELLIGENT buildings ,DEEP learning ,ALGORITHMS ,SPEED ,HARDWARE - Abstract
This paper proposes a deep learning-based intelligent detection device for insulation pull rod defects, addressing the issues of low detection accuracy, poor timeliness of intelligent analysis, and the difficulty in preserving detection results. Firstly, by constructing the pull rod defects dataset and training the YOLOv5s network, along with commonly used object detection algorithms in industrial defect detection, the feasibility of deep learning networks for insulation pull rod defects detection is explored. Secondly, the trained model is combined to build an intelligent detection device for pull rod defects, integrating insulation pull rod image acquisition and defect detection into a unified system. The research results demonstrate that the YOLOv5s network can quickly and accurately detect pull rod defects. On the test set constructed in this paper, the detection performance metric mAP@0.5:0.95 of the trained model reached 54.7%. Specifically, the mAP@0.5 score was 86.9% at a threshold of 0.5. The detection speed FPS reached 169.5, significantly improving the detection efficiency and accuracy compared to traditional object detection algorithms. By establishing an organic connection between the image hardware acquisition device and the deep learning network, the existing problems of inefficient detection and difficult storage of detection results in pull rod defects detection methods are effectively addressed. This research provides new insights for detecting insulation pull rod defects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Harmonics reduction and power quality improvement in distributed power flow controller by SVPWM and MGWO technique.
- Author
-
Bandopadhyay, Subhasis, Bandyopadhyay, Atanu, Mondal, Ashoke, and Sadhu, Pradip kumar
- Subjects
ELECTRICAL load ,VECTOR spaces ,VOLTAGE ,ALGORITHMS - Abstract
The Distributed power flow controller can be considered as advance power flow controller which is combination of series and shunt compensator without DC link. In this paper Space vector Pulse width Modulation employs in Distributed power flow Controller for Harmonics Reduction and power quality improvement. A new technique SVPWM adopted which reduces the harmonics and the same time improves power quality and increase transient stability. In this paper a new technique of Multi objective Grey wolf algorithm used to optimize the controller parameter of DPFC. For the design of PI controller GWO algorithm can be used for better optimistic performance of DPFC. As a result of that power quality and voltage profile improves drastically and the same time harmonics also reduced remarkable level of 4.62% of Voltage THD and 1.8% of current THD. The simulation result and hardware model Prove the feasibility of proposed Configuration. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Reinforcement Machine Learning for Sparse Array Antenna Optimization with PPO.
- Author
-
Mohammad-Ali-Nezhad, Sajad and Kassem, Mohammad H.
- Subjects
ANTENNA arrays ,ANTENNAS (Electronics) ,TELECOMMUNICATION systems ,MACHINE learning ,ALGORITHMS - Abstract
This paper focuses on optimizing the radiation pattern of sparse array antennas using reinforcement learning, with many algorithms. The paper aims to leverage Proximal Policy Optimization’s (PPO’s) advantages in optimization and its effectiveness in handling stochastic transitions and rewards to achieve a reduced number of elements while maintaining desired signal performance and minimizing unnecessary side lobe signals. By removing a few of the antennas using reinforcement learning and PPO optimization, the same results as a complete array have been obtained. The anticipated outcomes of this research hold the promise of significantly enhancing the effectiveness and utility of sparse array antennas in communication systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Determining Critical Cascading Effects of Flooding Events on Transportation Infrastructure Using Data Mining Algorithms.
- Author
-
Assaad, Rayan H., Mohammadi, Mohsen, and Assaf, Ghiwa
- Subjects
INFRASTRUCTURE (Economics) ,DATA mining ,ASSOCIATION rule mining ,FLOOD warning systems ,CLUSTER analysis (Statistics) ,ALGORITHMS - Abstract
Transportation infrastructures and operations can be severely impacted during flood events, leading to significant disruptions to the flow of goods and services. Although numerous studies have evaluated the direct impacts of flood events on the performance of transportation infrastructures, the indirect impacts or cascading effects have been rarely assessed. Hence, this paper examines the cascading effects of floods on transportation infrastructure using data mining algorithms. First, 33 effects of flood events on transportation infrastructure have been identified based on data collected for multiple flood events in New York and New Jersey. Second, association rule mining analysis was implemented to identify the key co-occurrences between flooding and the different events. Third, network analysis was conducted to quantify the co-occurrences or key combinations among the events. Fourth, cluster analysis was used to group or prioritize the cascading effects and co-occurring events into highly connected clusters to identify the most critical ones based on two scenarios: (1) without consideration of co-occurrences (Scenario 1); and (2) with consideration of co-occurrences (Scenario 2). The findings provided insights that while some cascading impacts could be individually critical/frequent (under Scenario 1), other cascading impacts could also result due to a combination of different effects that might not be perceived to be critical on the individual level but rather become critical when combined with other cascading events (under Scenario 2). The outcomes of this paper demonstrate the importance of considering the co-occurrences between the events and cascading effects, rather than analyzing them in isolation. This study adds to the body of knowledge by offering an analytical approach that could be used to identify and prioritize critical cascading effects of flood events on the operations and performance of transportation infrastructures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Predictive power control strategy without grid voltage sensors of the Vienna rectifier.
- Author
-
Yang, Tao, Chen, Lan, and Miao, Yiru
- Subjects
SOFT power (Social sciences) ,VOLTAGE ,PROBLEM solving ,DETECTORS ,ELECTRIC current rectifiers ,ALGORITHMS ,PULSE width modulation transformers - Abstract
This paper proposes a predictive power control strategy for the three‐phase, six‐switch Vienna rectifier without grid voltage sensors to reduce the hardware cost and complexity of a high‐power PWM rectifier system. Firstly, an algorithm for calculating the AC‐side voltage in the αβ coordinate system is derived according to the operating principle of the Vienna rectifier, and a voltage observer is constructed by combining a second‐order low‐pass filter to estimate the grid voltage. Secondly, a soft start method is designed to solve the problem that the rectifier is prone to inrush current when it is started. Furthermore, the control method of grid voltage sensorless is combined with predictive power control with good dynamic characteristics and simple parameter settings to form the control strategy proposed in this paper. Finally, simulation analysis and experimental verification are carried out on the proposed control strategy. Simulation and experimental results show that the grid voltage estimation has high accuracy, a good surge current suppression effect, unit power factor operation, low input current harmonic content, and good dynamic and steady‐state performance. Therefore, the correctness and effectiveness of the strategy proposed in this paper are verified. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. A Distorted-Image Quality Assessment Algorithm Based on a Sparse Structure and Subjective Perception.
- Author
-
Yang, Yang, Liu, Chang, Wu, Hui, and Yu, Dingguo
- Subjects
PEARSON correlation (Statistics) ,COMPUTATIONAL complexity ,PERCEIVED quality ,IMAGING systems ,ALGORITHMS - Abstract
Most image quality assessment (IQA) algorithms based on sparse representation primarily focus on amplitude information, often overlooking the structural composition of images. However, structural composition is closely linked to perceived image quality, a connection that existing methods do not adequately address. To fill this gap, this paper proposes a novel distorted-image quality assessment algorithm based on a sparse structure and subjective perception (IQA-SSSP). This algorithm evaluates the quality of distorted images by measuring the sparse structure similarity between a reference and distorted images. The proposed method has several advantages. First, the sparse structure algorithm operates with reduced computational complexity, leading to faster processing speeds, which makes it suitable for practical applications. Additionally, it efficiently handles large-scale data, further enhancing the assessment process. Experimental results validate the effectiveness of the algorithm, showing that it achieves a high correlation with human visual perception, as reflected in both objective and subjective evaluations. Specifically, the algorithm yielded a Pearson correlation coefficient of 0.929 and a mean squared error of 8.003, demonstrating its robustness and efficiency. By addressing the limitations of existing IQA methods and introducing a more holistic approach, this paper offers new perspectives on IQA. The proposed algorithm not only provides reliable quality assessment results but also closely aligns with human visual experience, thereby enhancing both the objectivity and accuracy of image quality evaluations. This research offers significant theoretical support for the advancement of sparse representation in IQA. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. A Fast Algorithm for 3D Focusing Inversion of Magnetic Data and Its Application in Geothermal Exploration.
- Author
-
Dai, Weiming, Jia, Hongfa, Jiang, Niande, Liu, Yanhong, Zhou, Weihui, Zhu, Zhiying, and Zhou, Shuai
- Subjects
CONJUGATE gradient methods ,MATRIX effect ,ALGORITHMS ,GEOTHERMAL resources - Abstract
This paper presents a fast focusing inversion algorithm of magnetic data based on the conjugate gradient method, which can be used to describe the underground target geologic body efficiently and clearly. The proposed method realizes an effect similar to matrix compression by changing the computation order, calculating the inner product of vectors and equivalent expansion of expressions. Model tests show that this strategy successfully reduces the computation time of a single iteration of the conjugate gradient method, so the three-dimensional magnetic data inversion is realized under a certain number of iterations. In this paper, the detailed calculation steps of the proposed inversion method are given, and the effectiveness and high efficiency of the proposed fast focusing inversion method are verified by three theoretical model tests and a set of measured data. Finally, the fast focus inversion algorithm is applied to the magnetic data of Gonghe Basin, Qinghai Province, to describe the spatial distribution range of deep hot dry rock, which provides a direction for the continuous exploration of geothermal resources in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Pre-Processing Event Logs by Chaotic Filtering Approaches Based on the Direct Following Relationship.
- Author
-
Lv, Tengzi, Gong, Xiugang, Gong, Na, and Li, Kaiyu
- Subjects
PROCESS mining ,SAWLOGS ,ALGORITHMS - Abstract
Process discovery aims to discover process models from event logs to describe actual business processes. The quality of event logs has an impact on the quality of process models, so preprocessing methods can be used to improve the quality of event logs. Chaotic activities may exist in real business scenarios, and the occurrence of chaotic activities is independent of other activities in the process and can occur at any location in the event log at any frequency. Therefore, chaotic activities seriously affect the model quality of process discovery. Filtering chaotic activities in event logs can effectively improve the quality of event logs and thus improve the quality of process models. The traditional chaotic activity filtering algorithm makes it difficult to balance accuracy and time performance. Therefore, a direct method for filtering chaotic activities is proposed in this paper. By analyzing the relationship between activities, chaotic activities are identified in the log according to the characteristics of chaotic activities and the direct following relationship of activities as the judgment condition, and the filtering of chaotic activities in the event log is realized. In addition, this paper proposes an indirect chaotic activity filtering method, which identifies and filters chaotic activities in the log by analyzing the influence of the existence of different activities on the overall chaos degree of the log. The proposed method is compared with the traditional chaotic activity filtering method on several simulation/real data sets, and the accuracy and running time between the multi-group event logs and the process models generated before and after chaotic activity filtering are analyzed, further verifying the effectiveness and feasibility of the proposed method. By summarizing the experimental results, it is found that the accuracy of the proposed chaotic activity filtering methods is greater than that of the frequency-based filtering method and is close to that of the entropy-based chaotic activity filtering methods. Moreover, compared with other filtering methods used in the experiment, the chaotic activity filtering method proposed in this paper can improve the efficiency by 23.4% on average for simulation logs, and by 84.25% on average for real event logs. It is concluded that compared with other filtering methods, the proposed chaotic activity filtering methods have higher accuracy and can effectively improve the time performance of chaotic activity filtering. Therefore, the chaotic activity filtering method proposed in this paper can balance the accuracy and time performance, and can ensure the integrity of the filtered event log to a certain extent. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. UWB-Based Human-Following System with Obstacle and Crevasse Avoidance for Polar-Exploration Robots.
- Author
-
Kwon, Ji-Wook, Lee, Hyoujun, Lee, Jongdeuk, Lee, Na-Hyun, Kim, Jong Chan, Uhm, Taeyoung, and Choi, Young-Ho
- Subjects
EXTREME environments ,ROBOTS ,EXPLORERS ,ALGORITHMS ,SUCCESS - Abstract
This paper introduces a UWB-based human-following system for polar-exploration robots, integrating obstacle and crevasse avoidance functions to enhance the safety and efficiency of explorers in extreme environments. The proposed system determines the relative position of the explorer using UWB anchors and tags. It also utilizes real-time local obstacle mapping and path-planning algorithms to find safe paths that avoid collisions with obstacles. Simulation and real-world experiments confirm that the proposed system operates effectively in polar environments, reducing the operational burden on explorers and increasing mission success rates. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Pointer Meter Reading Method Based on YOLOv8 and Improved LinkNet.
- Author
-
Lu, Xiaohu, Zhu, Shisong, and Lu, Bibo
- Subjects
FEATURE extraction ,ROTATIONAL motion ,ANGLES ,READING ,ALGORITHMS - Abstract
In order to improve the reading efficiency of pointer meter, this paper proposes a reading method based on LinkNet. Firstly, the meter dial area is detected using YOLOv8. Subsequently, the detected images are fed into the improved LinkNet segmentation network. In this network, we replace traditional convolution with partial convolution, which reduces the number of model parameters while ensuring accuracy is not affected. Remove one pair of encoding and decoding modules to further compress the model size. In the feature fusion part of the model, the CBAM (Convolutional Block Attention Module) attention module is added and the direct summing operation is replaced by the AFF (Attention Feature Fusion) module, which enhances the feature extraction capability of the model for the segmented target. In the subsequent rotation correction section, this paper effectively addresses the issue of inaccurate prediction by CNN networks for axisymmetric images within the 0–360° range, by dividing the rotation angle prediction into classification and regression steps. It ensures that the final reading part receives the correct angle of image input, thereby improving the accuracy of the overall reading algorithm. The final experimental results indicate that our proposed reading method has a mean absolute error of 0.20 and a frame rate of 15. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. A multi-channel spatial information feature based human pose estimation algorithm.
- Author
-
Xie, Yinghong, Hao, Yan, Han, Xiaowei, Gao, Qiang, and Yin, Biao
- Subjects
COMPUTER vision ,FIX-point estimation ,HUMAN body ,ALGORITHMS ,HUMAN beings - Abstract
Human pose estimation is an important task in computer vision, which can provide key point detection of human body and obtain bone information. At present, human pose estimation is mainly utilized for detection of large targets, and there is no solution for detection of small targets. This paper proposes a multi-channel spatial information feature based human pose (MCSF-Pose) estimation algorithm to address the issue of medium and small targets inaccurate detection of human key points in scenarios involving occlusion and multiple poses. The MCSF-Pose network is a bottom-up regression network. Firstly, an UP-Focus module is designed to expand the feature information while reducing parameter computation during the up-sampling process. Then, the channel segmentation strategy is adopted to cut the features, and the feature information of multiple dimensions is retained through different convolutional groups, which reduces the parameter lightweight network model and makes up for the loss of the feature information associated with the depth of the network. Finally, the three-layer PANet structure is designed to reduce the complexity of the model. With the aid of the structure, it also to improve the detection accuracy and anti-interference ability of human key points. The experimental results indicate that the proposed algorithm outperforms YOLO-Pose and other human pose estimation algorithms on COCO2017 and MPII human pose datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Improvement and Fusion of D*Lite Algorithm and Dynamic Window Approach for Path Planning in Complex Environments.
- Author
-
Gao, Yang, Han, Qidong, Feng, Shuo, Wang, Zhen, Meng, Teng, and Yang, Jingshuai
- Subjects
MOBILE robots ,AUTONOMOUS robots ,COST functions ,SCHEDULING ,ALGORITHMS ,POTENTIAL field method (Robotics) - Abstract
Effective path planning is crucial for autonomous mobile robots navigating complex environments. The "global–local" coupled path planning algorithm exhibits superior global planning capabilities and local adaptability. However, these algorithms often fail to fully realize their potential due to low efficiency and excessive constraints. To address these issues, this study introduces a simpler and more effective integration strategy. Specifically, this paper proposes using a bi-layer map and a feasible domain strategy to organically combine the D*Lite algorithm with the Dynamic Window Approach (DWA). The bi-layer map effectively reduces the number of nodes in global planning, enhancing the efficiency of the D*Lite algorithm. The feasible domain strategy decreases constraints, allowing the local algorithm DWA to utilize its local planning capabilities fully. Moreover, the cost functions of both the D*Lite algorithm and DWA have been refined, enabling the fused algorithm to cope with more complex environments. This paper conducts simulation experiments across various settings and compares our method with A_DWA, another "global–local" coupled approach, which combines A* and DWA. D_DWA significantly outperforms A_DWA in complex environments, despite a 7.43% increase in path length. It reduces the traversal of risk areas by 71.95%, accumulative risk by 80.34%, global planning time by 26.98%, and time cost by 35.61%. Additionally, D_DWA outperforms the A_Q algorithm, a coupled approach validated in real-world environments, which combines A* and Q-learning, achieving reductions of 1.34% in path length, 67.14% in traversal risk area, 78.70% in cumulative risk, 34.85% in global planning time, and 37.63% in total time cost. The results demonstrate the superiority of our proposed algorithm in complex scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.