-
15521
Optimization and Modeling of Optical Emission Spatial Coverage from Underwater Multi-Faceted Optical Base Stations
Published 2024-12-01“…Additionally, a Multi-Objective Particle Swarm Optimization (MOPSO) algorithm is used to optimize the configuration of the multi-faceted LED array by adjusting the deflection angles of the LED arrays and the emission half-angle of the LEDs at the OBS. …”
Get full text
Article -
15522
Collaborative Transport Strategy for Dual AGVs in Smart Ports: Enhancing Docking Accuracy in No-Load Formations
Published 2025-01-01“…This framework includes a feedback mechanism based on the leader–follower formation model, along with a closed-loop controller utilizing the sliding mode control algorithm. Finally, simulation and physical tests based on real port data verify the proposed strategy’s effectiveness. …”
Get full text
Article -
15523
MULTI-OBJECTIVE OPTIMIZATION OF SHELL KEY PARAMETERS OF ROTATING BUTT SKIRT AND PROTOTYPE DEVELOPMENT
Published 2018-01-01“…The rotating butt skirt is works in the deep water area of the ocean,In order to solve the safety problem of rotating butt skirt working in deep water,In this paper,fixed skirt,direction skirt,angle skirt was took as the research object.Multi-Objective Genetic Algorithm is used to optimize the key parameters of fixed skirt,direction skirt and angle skirt,and we get the optimal parameters of the three. …”
Get full text
Article -
15524
Construction method of double unicast network coding
Published 2020-09-01“…In order to use network coding technology for data transmission in double unicast network,a construction method of double unicast network coding was proposed.The pre-coding strategy was implemented at each source node,the random linear network coding combined to the multi-objective optimization evolutionary algorithm was adopted to design the local coding vector of each channel.At the each sink node,the base vector of zero space of matrix was used to eliminate some information interference,and then the two-level pre-coding strategy was used to control the transmission rate at source.Thus,each sink node could be decoded successfully.With the proposed method,the approximate reachable information rate region of double unicast network coding could be determined and the transmission scheme for each vector in the reachable information rate region could be designed.Theoretical derivation and simulation calculation show the effectiveness of the proposed method.…”
Get full text
Article -
15525
ANN Approach to Predict the Flow Stress of CMn (Nb-Ti-V) Micro Alloyed Steel
Published 2019-06-01“…The optimal ANN model was developed using Levenberg-Marquardt algorithm, and vas formed with two hidden layers with ten neurons in the first and ten neurons in the second. …”
Get full text
Article -
15526
Mjolnir: Extending HAMMER Using a Diffusion Transformation Model and Histogram Equalization for Deformable Image Registration
Published 2009-01-01“…An extensive validation of the algorithm was performed on T1-weighted SPGR MR brain images from the NIREP evaluation database. …”
Get full text
Article -
15527
TriangularSORT: A Deep Learning Approach for Ship Wake Detection and Tracking
Published 2025-01-01“…This paper introduces a novel approach for ship tracking and wake detection utilizing advanced computational techniques, particularly the TriangularSORT algorithm for monitoring vessels. This method enhances effective ship tracking by closely associating the vertices of the triangular wake with the coordinates of the ship. …”
Get full text
Article -
15528
Advanced Techniques and Antenna Design for Pulse Shaping in UWB Cognitive Radio
Published 2012-01-01“…The Parks-McClellan algorithm is employed, a neural network is trained, and a reconfigurable band stop filter is designed to generate an adaptive waveform with nulls at specific frequencies. …”
Get full text
Article -
15529
Least-Norm of the General Solution to Some System of Quaternion Matrix Equations and Its Determinantal Representations
Published 2019-01-01“…Finally, we give determinantal representations (analogs of Cramer’s rule) of the least norm solution to the system using row-column noncommutative determinants. An algorithm and numerical examples are given to elaborate our results.…”
Get full text
Article -
15530
Elliptical Crack Identification in a Nonrotating Shaft
Published 2018-01-01“…Second, once the direct problem is known, the inverse problem is approached. Genetic Algorithm technique has been used to estimate the crack parameters assuming known the natural frequencies of the cracked shaft.…”
Get full text
Article -
15531
Coupled Hydrologic-Mechanical-Damage Analysis and Its Application to Diversion Tunnels of Hydropower Station
Published 2021-01-01“…An inverse analysis program is compiled based on the differential evolution algorithm, and the surrounding rock damage parameters are inverted. …”
Get full text
Article -
15532
Optimal Solutions for Constrained Bimatrix Games with Payoffs Represented by Single-Valued Trapezoidal Neutrosophic Numbers
Published 2021-01-01“…Moreover, an application example is examined to verify the effectiveness and superiority of the developed algorithm. Finally, a comparison analysis between the proposed and the existing approaches is conducted to expose the advantages of our work.…”
Get full text
Article -
15533
Sliding Mode Output Feedback Control of a Flexible Rotor Supported by Magnetic Bearings
Published 2001-01-01“…A new sliding mode feedback algorithm is applied to control the vibration of a flexible rotor supported by magnetic bearings. …”
Get full text
Article -
15534
Modeling and control design of a bronchoscope robotics system
Published 2024-06-01“…Therefore, we use the boundary control algorithm to design a controller capable of suppressing vibration for the inserting tube. …”
Get full text
Article -
15535
A Hybrid Approach for Fast Computation of Multiple Incident Angles Electromagnetic Scattering Problems with Compressive Sensing and Adaptive Cross Approximation
Published 2016-01-01“…The compressive sensing (CS) technique is firstly introduced to the method of moment (MoM) to reduce the number of the right-hand sides (RHS), but since the resulting excitation matrix contains linear dependency and has low-rank characteristics, the adaptive cross approximation (ACA) algorithm is used to recompress such excitation matrix, keeping only the necessary physical information. …”
Get full text
Article -
15536
Vision-Based Tracking of Uncooperative Targets
Published 2011-01-01“…An additional piece of information, the subtended angle, also available from computer vision algorithm is used to improve range estimation accuracy. …”
Get full text
Article -
15537
Cooperative Tracking Control of the Multiple-High-Speed Trains System Using a Tunable Artificial Potential Function
Published 2022-01-01“…In this paper, a novel cooperative tracking control based on a consensus algorithm and artificial potential field theory is proposed to realize the train tracking within a distance range. …”
Get full text
Article -
15538
Deep Grassmannian multiview subspace clustering with contrastive learning
Published 2024-09-01“…A novel approach was proposed in this study, termed deep Grassmannian multiview subspace clustering with contrastive learning (DGMVCL). The proposed algorithm initially utilized a feature extraction module (FEM) to map the original input samples into a feature subspace. …”
Get full text
Article -
15539
Study on the correlation of toughness with chemical composition and tensile test results in microalloyed API pipeline steels
Published 2015-01-01“…In this investigation, an artificial neural network model with feed forward topology and back propagation algorithm was developed to predict the toughness (area underneath of stress-strain curve) of high strength low alloy steels. …”
Get full text
Article -
15540
Addressing Rare Outages in C-V2X With Time-Controlled One-Shot Resource Scheduling
Published 2024-01-01“…This allocation is based on a semi persistent sensing-based scheduling scheme (SPS) algorithm. But, due to this reuse of periodic resources, the possibility of loss of consecutive packets between the same vehicle pair is significant. …”
Get full text
Article