Showing 2,061 - 2,080 results of 3,188 for search '(( improve whole optimization algorithm ) OR ( improved while optimization algorithm ))', query time: 0.80s Refine Results
  1. 2061

    Onboard Decision-making System of Unmanned Mine Truck by WANG Jia, HUANG Jiade, LIU Zhicong, HUANG Peng, LYU Liang

    Published 2022-10-01
    “…This paper adopts the quadratic programming algorithm based on the shortest time and the optimal energy consumption to solve the speed planning, and adopts the hybrid A-star and curve fitting algorithm based on special scenarios to solve the local path planning, so that the operation efficiency can be improved by 10%~20% in the loading and unloading parking scenario. …”
    Get full text
    Article
  2. 2062

    Development and Practice of Cloud Collaborative Platform for Downhole Measurement Tools by Che Yang, Yuan Guangjie, Qian Hongyu, Du Weiqiang, Wang Chenlong, Ding Jiping

    Published 2025-06-01
    “…The measurement tools are mainly single machine version, which is difficult to meet the current requirements for improving drilling quality and efficiency. In the paper, based on the remote operation requirements of coreless magnetic steering tool, a platform architecture of five modules, including simulation rehearsal, virtual training, remote operation, smart tool and intelligent decision, was designed in detail, achieving a whole process digitization from predrilling risk assessment and in-drilling acquisition and processing to post-drilling feedback and optimization, and a visual interface was developed. …”
    Get full text
    Article
  3. 2063

    Impacts of inter-train distances on aerodynamic drag reduction in heavy-haul train groups by LYU Jun, XIANG Tao, SONG Zongying, GAO Guangjun

    Published 2024-09-01
    “…Apparent errors were observed in the coarse grid configuration, while variations in aerodynamic drag acting on the whole train were less than 3% for the medium and fine grids. …”
    Get full text
    Article
  4. 2064

    Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management by Xiaoyi Jiang

    Published 2022-01-01
    “…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
    Get full text
    Article
  5. 2065

    基于萤火虫神经网络的轴承性能退化程度评估 by 刘永前, 徐强, 田德, 龙泉

    Published 2014-01-01
    “…Precise assessment of bearing performance degradation is the foundation and key of predictive maintenance for rotating machinery,and also a new research area nowadays.An optimized BP neural network based on glowworm swarm optimization algorithm is proposed and applied for the first time in the performance degradation assessment of bearings.The glowworm swarm optimization algorithm is applied to obtain the initial weights and thresholds of BP neural network,while power spectral entropy,wavelet entropy,box dimension,correlation dimension,kurtosis and skewness are selected as the fault features.Experiments show that the glowworm swarm optimization algorithm has improved the prediction accuracy of network and the proposed method can precisely assess the performance degradation of rolling bearings,the effectiveness and accuracy of the proposed method in engineering application is validated.…”
    Get full text
    Article
  6. 2066

    Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM by Zhengshan LUO, Haipeng LYU, Jihao LUO

    Published 2025-05-01
    “…The extended search mode was refined by integrating the simplex method, while the optimization capability of the Whale Optimization Algorithm (WOA) was enhanced with Levy flight to improve step length. …”
    Get full text
    Article
  7. 2067

    Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets by WANG Dongchu, FU Yusun, YU Ya

    Published 2025-06-01
    “…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
    Get full text
    Article
  8. 2068

    Multirobot Coverage Path Planning Based on Deep Q-Network in Unknown Environment by Wenhao Li, Tao Zhao, Songyi Dian

    Published 2022-01-01
    “…Online decision-making relies on the sliding-view method and probability statistics to deal with the nonstandard size and unknown environments and the deduction method to improve the efficiency of coverage. Simulation results show that the performance of the proposed online method is close to that of the offline algorithm which needs long time optimization, and the proposed method is more stable as well. …”
    Get full text
    Article
  9. 2069

    A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection by Zheng Huang, Chengling Jiang, Chao Shen, Bin Liu, Tao Huang, Minghui Zhang

    Published 2025-01-01
    “…Based on a breadth-first search strategy, the path obtained is optimized to reduce path complexity. To address the RRT* algorithm’s limitation in dynamic obstacle avoidance, a local path-planning method combining the improved DWA algorithm is proposed, improving efficiency in areas with dense obstacles. …”
    Get full text
    Article
  10. 2070

    Real-time urban regional route planning model for connected vehicles based on V2X communication by Pangwei Wang, Hui Deng, Juan Zhang, Mingfang Zhang

    Published 2020-11-01
    “…Second, according to the topology structure of the current regional road network, all predicted routes are listed based on the Dijkstra algorithm. Third, the predicted travel time of each alternative route is calculated, while the predicted route with the least travel time is selected as the optimal route. …”
    Get full text
    Article
  11. 2071

    Understanding the flowering process of litchi through machine learning predictive models by SU Zuanxian, NING Zhenchen, WANG Qing, CHEN Houbin

    Published 2025-05-01
    “…The algorithms (RF and STR) with the smallest Mean Absolute Error (MAE) and the highest residual error (RMSE) and the highest correlation coefficient (RP2) were selected for further parameter optimization and evaluation. …”
    Get full text
    Article
  12. 2072

    Tennis Timing Assessment by a Machine Learning-Based Acoustic Detection System: A Pilot Study by Lucio Caprioli, Amani Najlaoui, Francesca Campoli, Aatheethyaa Dhanasekaran, Saeid Edriss, Cristian Romagnoli, Andrea Zanela, Elvira Padua, Vincenzo Bonaiuto, Giuseppe Annino

    Published 2025-01-01
    “…<b>Results:</b> The ML algorithm showed a detection accuracy higher than 95%, while the average accuracy of the whole system that was applied on-court was 85%. …”
    Get full text
    Article
  13. 2073

    铰链四杆刚体导引机构综合的区间逃逸粒子群算法 by 易建, 何兵, 车林仙

    Published 2008-01-01
    “…Aimed at this weakness,the improved PSO algorithm,the Escape PSO Based on the interval search (EPSObIS),is presented to make the optimal problem for rigid-body guidance synthesis of hinged 4-bar linkages. …”
    Get full text
    Article
  14. 2074

    Research on the cooperative offloading strategy of sensory data based on delay and energy constraints by Peiyan YUAN, Saike SHAO, Ran WEI, Junna ZHANG, Xiaoyan ZHAO

    Published 2023-03-01
    “…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
    Get full text
    Article
  15. 2075

    Bio-inspired clustering scheme for Internet of Drones application in industrial wireless sensor network by Farooq Aftab, Ali Khan, Zhongshan Zhang

    Published 2019-11-01
    “…The results indicate that the proposed scheme has improved 60% and 38% with respect to ant colony optimization and grey wolf optimization, respectively, in terms of average cluster building time while average energy consumption has improved 23% and 33% when compared to the ant colony optimization and grey wolf optimization, respectively.…”
    Get full text
    Article
  16. 2076

    Exploration of Energy-Saving Chilling Landscape Design Based on Algo for Group Intelligence by Zhuo Li

    Published 2022-01-01
    “…The experimental results show that the algo for group intelligence outperforms another algorithm in terms of solving ability to the extent that the average optimization ability is improved by 13.45%, so the algo for group intelligence demonstrates its superior ability to take into account both local and global search. …”
    Get full text
    Article
  17. 2077

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  18. 2078

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  19. 2079

    Adaptive Safe Data Driven Control Strategy for Closed Loop System by Wen Ruchun

    Published 2025-01-01
    “…Finally, some simulation results are given to show our theoretical results on adaptive safe data driven control and its improved switching form. Generally, this new paper extends our previous contributions about data driven control to complete its synthesis research, combining some advanced factors together from both the academic theory and practice, for example, adaptation, safety, optimization theory and algorithm, switching logic together.…”
    Get full text
    Article
  20. 2080

    Hybrid precoding and power allocation for mmWave NOMA systems based on time delay line arrays by Gangcan SUN, Xinli WU, Wanming HAO, Zhengyu ZHU

    Published 2022-06-01
    “…Methods:To reduce inter-user interference,an improved K-means algorithm is proposed to group users and select a cluster head for each group of users, which maximizes the correlation of user channels in the same cluster and reduces the correlation between users in different clusters as much as possible;Then,a low-complexity analog precoding is designed to maximize the array gain of the antenna based on the relevant user channel matrix composed of the cluster head set, followed by a digital precoding designed to eliminate inter-user interference with the maximum equivalent channel gain between beams using a forced-zero technique; Finally, an EE maximization problem is formed to optimize the transmit power under users'quality of services and total transmit power constraints,and a two-layer iterative algorithm is proposed for the resulting non-convex optimization problem. …”
    Get full text
    Article