-
5641
Spatial Estimation of Trophic State for Reservoir Using Ground Monitoring and Remote Sensing Data
Published 2025-01-01“…The results of correlation analysis between ground monitoring values and spectral values from remote sensing algorithms showed that the two parameters, SD and TP, correlated best with the NIR/BLUE algorithm. …”
Get full text
Article -
5642
A multitasking ant system for multi-depot pick-up and delivery location routing problem with time window
Published 2025-01-01“…In the first stage, a clustering algorithm based on spatio-temporal feature is used to group similar customer pairs, and the clustering centers are set as warehouses. …”
Get full text
Article -
5643
Selection and Resource Allocation Strategies for Chatbot Technologies in Higher Education: An Optimization Model Approach
Published 2025-01-01“…Additionally, we devised an algorithm for scenarios where RNUD values vary significantly, effectively isolating optimal solutions by excluding suboptimal choices. …”
Get full text
Article -
5644
A Low-Duty-Cycle and Congestion-Robust Design of Adaptive Wi-Fi 7 Multi-Link Operation Control Over User Side
Published 2025-01-01“…We have devised an adaptive algorithm that dynamically adjusts MLO configurations based on periodic measurements at the MAC/IP layers. …”
Get full text
Article -
5645
Rapid Identification of Saline–Alkali Stress-Tolerant Peanut Varieties Based on Multimodal Data
Published 2025-01-01“…The experimental results show that the multimodal method is superior to the single-modal data and the BO algorithm significantly improves the performance of the model. …”
Get full text
Article -
5646
Suggested Guidelines for the Treatment of Mycosis Fungoides in Countries with Limited Resources
Published 2023-01-01“…We suggest a practical algorithm for the treatment of MF for patients with dark phenotype living in countries with limited resources.…”
Get full text
Article -
5647
Inverse and Forward Kinematics and CAD-Based Simulation of a 5-DOF Delta-Type Parallel Robot with Actuation Redundancy
Published 2024-12-01“…Numerical simulations illustrate the algorithm and show how the actuated coordinates change along the considered trajectory. …”
Get full text
Article -
5648
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01“…A DNP3-based cyber-physical co-simulation testbed is developed to test the proposed algorithm using the IEEE 13-node test feeder.…”
Get full text
Article -
5649
Robust Optimization of Planar Constrained Mechanical System with Varying Joint Clearance Size Based on Sensitivity Analysis
Published 2020-01-01“…In the algorithm, a multiobjective robust optimization model derived from the mean and variance of the objective function is constructed. …”
Get full text
Article -
5650
Artificial Neural Network-Based System for PET Volume Segmentation
Published 2010-01-01“…ANN performance evaluation using different training algorithms in both spatial and wavelet domains with a different number of neurons in the hidden layer is also presented. …”
Get full text
Article -
5651
3D Curvelet-Based Segmentation and Quantification of Drusen in Optical Coherence Tomography Images
Published 2017-01-01“…To address this need, a fully automated algorithm was developed to segment drusen area and volume from SD-OCT images. …”
Get full text
Article -
5652
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
Published 2021-01-01“…Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. …”
Get full text
Article -
5653
Acute ischemic stroke lesion segmentation in non-contrast CT images using 3D convolutional neural networks
Published 2023-10-01“…In this paper, an automatic algorithm aimed at volumetric segmentation of acute ischemic stroke lesion in non-contrast computed tomography brain 3D images is proposed. …”
Get full text
Article -
5654
Cyclic Peak Extraction from a Spatial Likelihood Map for Multi-Array Multi-Target Bearing-Only Localization
Published 2025-01-01“…Then, a multi-target cyclic peak extraction algorithm based on a statistical dual-threshold is proposed, which eliminates false peaks by cyclic extraction of target positions, so as to reduce false targets. …”
Get full text
Article -
5655
Flexible Bus Route Optimization Scheduling Model
Published 2021-01-01“…Finally, the practicabilities of the model and algorithm are verified by an example. Analysis results show that for 102 travel demands of 15 randomly generated demand points, completing all services requires 17–21 vehicles with average travel time of 24.59 minutes each. …”
Get full text
Article -
5656
Nonlinear Failure Analysis of Critical Area of Transmission Towers Based on the Continuum Damage Theory
Published 2024-01-01“…A material subroutine for elastic-plastic-damage constitutive equations is developed using commercial software, and thorough verification ensures the accuracy of both the subroutine and the algorithm. The proposed algorithm is then applied to analyze the damage in critical areas of a tower, simulating the plasticity-damage coupling evolution of the main leg during the collapse of the transmission tower. …”
Get full text
Article -
5657
Preference learning based deep reinforcement learning for flexible job shop scheduling problem
Published 2025-01-01“…The ablation study further highlights the advantages of each key component in the PBMP algorithm across performance metrics.…”
Get full text
Article -
5658
Fast Flexible Direct Power Flow for Unbalanced and Balanced Distribution Systems
Published 2022-01-01“…Finally, to validate the proposed algorithm, the proposed strategy is applied to numerous balanced and unbalanced distribution systems.…”
Get full text
Article -
5659
Experimental validation of the analytical modelling of a digitally created duffing acoustic nonlinear oscillator at low amplitudes
Published 2025-01-01“…The experimental implementation is done using a real-time-based algorithm retrieving the measured pressure from a microphone and giving the electrical current to send to a loudspeaker as an output thanks to a Runge-Kutta-like algorithm. …”
Get full text
Article -
5660
Dynamic Identification of Critical Transmission Lines in Power Systems With Wind Power Integration Based on Maximum Influence Theory
Published 2025-01-01“…Based on the influence maximization model in time-sequence cascading faults graph (IMTG), the line fault influence calculation algorithm (LFIC) and improved critical line identification algorithm (ILIT) are proposed to identify the critical transmission lines. …”
Get full text
Article