skip to main content
10.1145/3640115.3640213acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

Planning and Optimization of Indoor Climbing Routes

Published:26 March 2024Publication History

ABSTRACT

Indoor rock climbing, as a challenging and fun sport, has become more and more popular among sports enthusiasts in recent years, and in order to successfully complete the climb, it is necessary to select suitable routes and evaluate the difficulty of the routes. This study focuses on rock climbing route planning, evaluation and optimization. Canny edge detection is used to preprocess the image to obtain the coordinates of the rock point locations, K-means clustering is used to classify the rock points based on the rock point location-based model, DFS algorithm is used for data analysis, and multiple linear regression modelling is used to optimize the climbing routes using the A* algorithm by taking into account a number of key variables, including the weather, the temperature, and the density of the rock points, and to determine the best climbing route profile..

References

  1. ZIQI X, XIAOQIANG J, MEIJIAO W, Edge detection algorithm of medical image based on Canny operator [J]. Journal of Physics: Conference Series, 2021, 1955: 012080 (6 pp.)- (6 pp.).Google ScholarGoogle ScholarCross RefCross Ref
  2. BRITTO RAMESH KUMAR S, BHUVANESHWARI A. An Efficient Britwari Technique to Enhance Canny Edge Detection Algorithm using Deep Learning [J]. ICTACT Journal on Soft Computing, 2022: 2634-9.Google ScholarGoogle Scholar
  3. KARTHICK C N, NIRMALA P. Smart Edge Detection Technique in X ray Images for Improving PSNR using Canny Edge Detection Algorithm with Gaussian Filter in Comparison with Laplacian Algorithm [J]. Cardiometry, 2022, (25): 1744-50.Google ScholarGoogle Scholar
  4. KIEU S T H, BADE A, HIJAZI M H A. Modified canny edge detection technique for identifying endpoints [J]. Journal of Physics: Conference Series, 2022: 012023 (6 pp.)- (6 pp.).Google ScholarGoogle Scholar
  5. WU C, MA H, JIANG H, An Improved Canny Edge Detection Algorithm with Iteration Gradient Filter; proceedings of the 6th International Conference on Imaging, Signal Processing and Communications (ICISPC), Electr Network, F 2022Google ScholarGoogle Scholar
  6. Jul 22-24, 2022 [C]. 2022.Google ScholarGoogle Scholar
  7. WU C, MA H, JIANG H, An Improved Canny Edge Detection Algorithm with Iteration Gradient Filter [M]. 2022.Google ScholarGoogle Scholar
  8. KONG Y, TAN F, ZHAO X, Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-73.Google ScholarGoogle Scholar
  9. SHI J. Innovating the Instruction of Mathematical Concepts: How Does the Integrated Use of Digital Games and Language-Based Teaching Matter? [J]. Frontiers in Psychology, 2022, 13.Google ScholarGoogle Scholar
  10. YUAN F, XU D, ZHANG D. A survey of differential privacy algorithms for the k-means problem [J]. Operations Research Transaction, 2022, 26(3): 1-16.Google ScholarGoogle Scholar
  11. AZHAR A, HASHIM H. A Review of Wind Clustering Methods Based on the Wind Speed and Trend in Malaysia [J]. Energies, 2023, 16(8).Google ScholarGoogle Scholar
  12. PALLAVI, JOSHI S, SINGH D, Comprehensive Review of Orthogonal Regression and Its Applications in Different Domains [J]. Archives of Computational Methods in Engineering, 2022, 29(6): 4027-47.Google ScholarGoogle ScholarCross RefCross Ref
  13. GUO W, YANG L, YOU J, Method for Steiner minimum tree based on deep reinforcement learning (DRL) for X-structure obstacles, involves using deep-first search (DFS) algorithm to remove loops of OAXSMT to obtain wiring results in post-processing stage, CN115577671-A [P/OL].Google ScholarGoogle Scholar
  14. TIAN X, LI Q. Network intrusion detection method based on depth first search (DFS) and association rule algorithm, involves training feature set based on association rule algorithm and obtaining current network data and inputting into classifier for network intrusion detection, CN113949530-A [P/OL].Google ScholarGoogle Scholar
  15. YU P, LIU J, LUO H, Multi-mode fusion and depth-first search-locally linear embedding algorithm based brain stroke intra-hospital complications prediction model constructing method, involves collecting diagnosis data when cut-off complication occurs in patient hospitalization, CN113724876-A [P/OL].Google ScholarGoogle Scholar
  16. DAVISON M L, DAVENPORT E C, JIA H. Linear Equality Constraints: Reformulations of Criterion Related Profile Analysis with Extensions to Moderated Regression for Multiple Groups [J]. Psychological Methods, 2023, 28(3): 600-12.Google ScholarGoogle ScholarCross RefCross Ref
  17. ERKE S, BIN D, YIMING N, An improved A-Star based path planning algorithm for autonomous land vehicles [J]. International Journal of Advanced Robotic Systems, 2020, 17(5).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICITEE '23: Proceedings of the 6th International Conference on Information Technologies and Electrical Engineering
    November 2023
    764 pages
    ISBN:9798400708299
    DOI:10.1145/3640115

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 March 2024

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)5

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format