The growth in penetration of renewable energy sources leads to reduction in the number of grid-tied dis-patchable synchronous generators. Since the contributions of non-dispatchable, renewable energy-based generators ...
详细信息
In many previous work, weakly supervised video anomaly detection is formulated as a multiple instance learning (MIL) problem, which represents the video as a bag of multiple instances. However, most MIL-based framewor...
详细信息
The remaining useful life (RUL) of lithium-ion batteries is a key indicator for the optimal design of battery management systems and ensuring equipment safety. Most existing RUL prediction methods retain only the tren...
详细信息
Automated visual quality inspection using machine vision is now widely used to reduce wastage and ensure better quality of products. Numerous algorithms using computer vision were made to solve specific issues in the ...
详细信息
A count of crowds tries to determine the total number of persons in crowded places in order to avoid disruption of the safety system and maintain crowd safety. Accurate estimation of the size of crowds is a challengin...
详细信息
Wireless sensor networks are among the most common communication tools used in military and civilian fields. These networks consist of many tiny devices called sensor nodes. Each node has processing capability and dif...
Wireless sensor networks are among the most common communication tools used in military and civilian fields. These networks consist of many tiny devices called sensor nodes. Each node has processing capability and different types of memory, transmitter, radio frequency receiver, and power supply. In addition, nodes house sensors and actuators. Batteries usually power sensor nodes and need to operate longer without their presence. In most cases, changing or recharging the battery for sensor nodes is very difficult or even impossible. Designing routing protocols in wireless sensor networks is challenging due to network limitations, with an emphasis on energy efficiency. The proposed method uses a hierarchical routing mechanism to optimize routing using asymmetric clustering. The sensor nodes are asymmetrically clustered in the proposed method, and the cluster heads are selected using the Jellyfish Search (JS) optimizer algorithm. The problem of optimal clustering is an optimization problem, so in this research, the Jellyfish Search algorithm is used to provide the most optimal clusters in routing. Due to the utilization of a search mechanism based on chaos theory in the Jellyfish Search optimization, the proposed method exhibits high accuracy in clustering and optimal routing within wireless sensor networks. Evaluations indicate that the proposed method achieves lower energy consumption and longer network lifetime compared to GWO, MO-PSO, WGWO, and HMBCR algorithms.
computer vision is one of the state-of-The-Art technologies for object detection problems. Accurate detection of obstacles could assist blind and visually impaired people to n avigate safely while they walk. However, ...
详细信息
In recent times, the increment of mobile phone usage has resulted in a huge number of spam messages. Spammers continuously apply more and more new tricks that cause managing or preventing spam messages a challenging t...
详细信息
In this era, wireless networks are economically feasible and flexible to establish in healthcare, defense, surveillance, and traffic monitoring, fire detection. Effective intruder detection systems utilize advanced te...
详细信息
The Hadamard transform is an ancient method for efficient data compression, especially for medical image data. Thus, the proposed work consists of analyzing the filter performance using a novel Hadamard transform to a...
详细信息
暂无评论