Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
data processing » image processing (Expand Search)
movement update » movement data (Expand Search)
box algorithm » best algorithm (Expand Search), _ algorithm (Expand Search), ii algorithm (Expand Search)
develop box » develop low (Expand Search), develop post (Expand Search), develop next (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
data processing » image processing (Expand Search)
movement update » movement data (Expand Search)
box algorithm » best algorithm (Expand Search), _ algorithm (Expand Search), ii algorithm (Expand Search)
develop box » develop low (Expand Search), develop post (Expand Search), develop next (Expand Search)
-
1
-
2
Assignment of Hungarian Algorithm.
Published 2025“…In this paper, a new tracking mechanism is proposed for real-time tracking, which is based on the 2D LiDAR data structure with the Simple Online and Real-Time Tracking (SORT) algorithm. …”
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
Algorithm flowchart of OFEO.
Published 2025“…Again, addressing the limitations of traditional Kalman filtering in nonlinear motion trajectory prediction, a novel adaptive forgetting Kalman filter algorithm (FSA) is devised to enhance the precision of model prediction and the effectiveness of parameter updates to adjust to the uncertain movement speed and trajectory of pedestrians in real scenarios. …”
-
16
Example of S-box.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”
-
17
-
18
-
19
-
20