-
6741
Observer-Based Event-Triggered Circle Formation Control for First- and Second-Order Multiagent Systems
Published 2020-01-01“…This paper proposes an observer-based event-triggered algorithm to solve circle formation control problems for both first- and second-order multiagent systems, where the communication topology is modeled by a spanning tree-based directed graph with limited resources. …”
Get full text
Article -
6742
Pillar-X: Integrating Self-Learned Image Features to Improve 3D Object Detection
Published 2025-01-01“…The proposed model achieves this while maintaining a speed similar to the baseline algorithm (¿20 Hz). …”
Get full text
Article -
6743
Representation of few-group homogenized cross section by multi-variate polynomial regression
Published 2024-01-01“…Additionally, it can reduce data preparation time because the size of the training set can be smaller than the number of points in the complete Cartesian grid, while still providing a good approximation. Furthermore, its evaluation algorithm can be adapted for GPU utilization, similar to polynomial interpolation with the Newton method [5].…”
Get full text
Article -
6744
Romidepsin Used as Monotherapy in Sequence with Allogeneic Stem Cell Transplant in a Patient with Peripheral T-Cell Lymphoma
Published 2014-01-01“…Despite advances in the field, a clear treatment algorithm for most peripheral T-cell lymphoma (PTCL) subtypes remains to be defined. …”
Get full text
Article -
6745
Prediction of Moisture Content in Kiwi (Actinidia deliciosa) Dried Using Machine Learning Approaches
Published 2025-03-01“…The input for the training algorithm included kiwi slice thickness and drying time, while the output was the moisture content of the product. …”
Get full text
Article -
6746
Meta-learning assisted robust control of universal quantum gates with uncertainties
Published 2025-05-01“…To address these challenges, we propose the meta-reinforcement learning quantum control algorithm (metaQctrl), which leverages a two-layer learning framework to enhance robustness and fidelity. …”
Get full text
Article -
6747
Threshold decoding of hospitals self-original conventional codes
Published 2019-06-01“…It has been established that while preserving the merits of the threshold decoding algorithm, an increase in i (i ≥ 2) times the multiplicity of corrected errors is ensured by binary self-orthogonal codes with an equal transfer rate of codes.…”
Get full text
Article -
6748
Computing the Matrix G of Multi-Dimensional Markov Chains of M/G/1 Type
Published 2025-04-01“…The first component is a nonnegative integer vector, while the second component indicates the state (or phase) of the external environment. …”
Get full text
Article -
6749
Selecting the Strategic Port of “the Belt and Road” Based on the Global Network
Published 2021-01-01“…On the basis of constructing a network of 155 ports in the world, according to the number of ports crossed by the shortest path and betweenness centrality in the network, this paper uses K-Medoids clustering algorithm to train the strategic importance of ports and verifies the reliability of the analysis results. …”
Get full text
Article -
6750
Exploring Stochastic Heat Equations: A Numerical Analysis with Fast Discrete Fourier Transform Techniques
Published 2024-12-01“…Our approach uniquely combines a sixth-order compact finite difference algorithm with fast discrete Fourier transforms. While traditional discrete sine transforms are effective for approximating second-order derivatives, they are inadequate for first-order derivatives. …”
Get full text
Article -
6751
Optimal Utilization of Ports’ Free-of-Charge Times in One Distribution Center and Multiple Ports Inventory Systems
Published 2019-01-01“…Inventory management for the distribution system is to determine the order intervals of the DC and the retailers while minimizing the inventory ordering and holding costs. …”
Get full text
Article -
6752
Kinematic calibration and accuracy compensation method for embodied intelligent disinfection robot
Published 2025-03-01“…Third, an error identification algorithm based on least square method is proposed, and the identification is realized by sampling data. …”
Get full text
Article -
6753
Application-centric congestion control
Published 2025-06-01“…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
Get full text
Article -
6754
Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models
Published 2024-01-01“…This single-signal approach allows the algorithm to accurately classify data without being distracted by different types of signals, in addition to eliminating the curse of dimensionality. …”
Get full text
Article -
6755
MASALAH EIGEN DAN EIGENMODE MATRIKS ATAS ALJABAR MIN-PLUS
Published 2021-12-01“…The representation matrix of a strongly connected graph is called an irreducible matrix, while the representation matrix of a graph that is not strongly connected is called a reduced matrix. …”
Get full text
Article -
6756
Classification of wheat flour levels in powdered spices using visual imaging
Published 2024-12-01“…An image processing algorithm was designed and codded in MATLAB software to process the acquired images. …”
Get full text
Article -
6757
Current Status and Future Potential of Machine Learning in Diagnostic Imaging of Endometriosis : A Literature Review
Published 2025-02-01“…The machine learning algorithm first computes the image characteristics deemed significant for making predictions or diagnoses about unseen images. …”
Get full text
Article -
6758
Understanding dimensions of trust in AI through quantitative cognition: Implications for human-AI collaboration.
Published 2025-01-01“…We collected data from finance and business administration interns using surveys and the After-Action Review method and analyzed them using the gradient descent algorithm. The findings reveal a dual effect of trust in AI on cognition: while functional and emotional trust enhance higher-order cognition, the transparency dimension of cognitive trust inhibits cognitive processes. …”
Get full text
Article -
6759
A new method for the dynamic mesh stiffness calculation of spur gear under centrifugal effect
Published 2025-06-01“…Based on Euler beam theory,a original computational algorithm was proposed to calculate the dynamic mesh stiffness of spur gears considering driven-speed effects by introducing centrifugal effects into the velocity field. …”
Get full text
Article -
6760
Optimizing Power Flow in Photovoltaic-Hybrid Energy Storage Systems: A PSO and DPSO Approach for PI Controller Tuning
Published 2025-01-01“…The proposed control scheme is based on proportional-integral (PI) controllers optimized with particle swarm optimization (PSO) and duplicate particle swarm optimization (DPSO) algorithms. The aim is to reduce peak current and the energy management system’s response time while enhancing the system’s stability during the charging and discharging of the HSS under various operating conditions. …”
Get full text
Article