|
|
|
Jun Tie, Weibo Wu, Lu Zheng, Lifeng Wu and Ting Chen
When aiming at the problems such as missed detection or misdetection of recognizing green walnuts in the natural environment directly by using target detection algorithms, a method is proposed based on improved UNet3+ for green walnut image segmentation,...
ver más
|
|
|
|
|
|
|
Sergio Jesús González-Ambriz, Rolando Menchaca-Méndez, Sergio Alejandro Pinacho-Castellanos and Mario Eduardo Rivero-Ángeles
This paper presents the spectral gap-based topology control algorithm (SGTC) for wireless backhaul networks, a novel approach that employs the Laplacian Spectral Gap (LSG) to find expander-like graphs that optimize the topology of the network in terms of...
ver más
|
|
|
|
|
|
|
Efstathios Konstantinos Anastasiadis and Ioannis Antoniou
We extend network analysis to directed criminal networks in the context of asymmetric links. We computed selected centralities, centralizations and the assortativity of a drug trafficking network with 110 nodes and 295 edges. We also monitored the centra...
ver más
|
|
|
|
|
|
|
Wen Tian, Xuefang Zhou, Jianan Yin, Yuchen Li and Yining Zhang
The complex layout of the airport surface, coupled with interrelated vehicle behaviors and densely mixed traffic flows, frequently leads to operational conflict risks. To address this issue, research was conducted on the recognition of characteristics an...
ver más
|
|
|
|
|
|
|
Mojtaba Nayyeri, Modjtaba Rouhani, Hadi Sadoghi Yazdi, Marko M. Mäkelä, Alaleh Maskooki and Yury Nikulin
One of the main disadvantages of the traditional mean square error (MSE)-based constructive networks is their poor performance in the presence of non-Gaussian noises. In this paper, we propose a new incremental constructive network based on the correntro...
ver más
|
|
|
|
|
|
|
Longxin Yao, Yun Lu, Mingjiang Wang, Yukun Qian and Heng Li
The construction of complex networks from electroencephalography (EEG) proves to be an effective method for representing emotion patterns in affection computing as it offers rich spatiotemporal EEG features associated with brain emotions. In this paper, ...
ver más
|
|
|
|
|
|
|
Tatyana Aksenovich and Vasiliy Selivanov
During geomagnetic storms, which are a result of solar wind?s interaction with the Earth?s magnetosphere, geomagnetically induced currents (GICs) begin to flow in the long, high-voltage electrical networks on the Earth?s surface. It causes a number of ne...
ver más
|
|
|
|
|
|
|
Dariush Ashtab, Mehdi Gholamalifard, Parviz Jokar, Andrey G. Kostianoy and Aleksander V. Semenov
Protected areas are referred to around the world as the basis of conservation strategies. Designation of marine protected areas (MPAs) is to preserve marine biodiversity and protect species, habitats in the seas, and oceans. The simulated annealing algor...
ver más
|
|
|
|
|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Shi-Yi Jin, Dong-Hyun Seo, Yeon-Jin Kim, Yong-Eun Kim, Samuel Woo and Jin-Gyun Chung
To authenticate a controller area network (CAN) data frame, a message authentication code (MAC) must be sent along with the CAN frame, but there is no space reserved for the MAC in the CAN frame. Recently, difference-based compression (DBC) algorithms ha...
ver más
|
|
|
|