-
3561
Urban Resilience and Energy Demand in Tropical Climates: A Functional Zoning Approach for Emerging Cities
Published 2025-06-01“…The system’s capacity to adjust and optimize power distribution would be strengthened provided the algorithms were given the freedom to react dynamically to changes or disruptions brought about by distributed generation sources.…”
Get full text
Article -
3562
Temperature Compensation Method for MEMS Ring Gyroscope Based on PSO-TVFEMD-SE-TFPF and FTTA-LSTM
Published 2025-04-01“…This study proposes a novel parallel denoising and temperature compensation fusion algorithm for MEMS ring gyroscopes. First, the particle swarm optimization (PSO) algorithm is used to optimize the time-varying filter-based empirical mode decomposition (TVFEMD), obtaining optimal decomposition parameters. …”
Get full text
Article -
3563
Predicting antimicrobial mechanism-of-action from transcriptomes: A generalizable explainable artificial intelligence approach.
Published 2021-03-01“…Here we describe an explainable artificial intelligence classification methodology that emphasizes prediction performance and human interpretability by using a Hierarchical Ensemble of Classifiers model optimized with a novel feature selection algorithm called Clairvoyance; collectively referred to as a CoHEC model. …”
Get full text
Article -
3564
Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants
Published 2022-01-01“…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
Get full text
Article -
3565
Energy-Efficient UAV Relaying Robust Resource Allocation in Uncertain Adversarial Networks
Published 2021-01-01“…We derive EE UAV relay-user maximization problem in the adversarial wireless networks at last. While the problem is non-convex, we propose an iterative and sub-optimal algorithm to optimize EE UAV relay with constraints, such as ICC, trajectory, speed, acceleration, and transmit power. …”
Get full text
Article -
3566
Impacts of inter-train distances on aerodynamic drag reduction in heavy-haul train groups
Published 2024-09-01“…Apparent errors were observed in the coarse grid configuration, while variations in aerodynamic drag acting on the whole train were less than 3% for the medium and fine grids. …”
Get full text
Article -
3567
Modeling the Stability of the Housing and Construction Complex Based on Organizational and Economic Interaction of Entities
Published 2025-03-01“…A genetic algorithm in MATLAB was used for this purpose. Acceptable options for all participants were selected from a set of Pareto-optimal alternatives based on the preferences of the decision-maker. …”
Get full text
Article -
3568
Development and Practice of Cloud Collaborative Platform for Downhole Measurement Tools
Published 2025-06-01“…In the paper, based on the remote operation requirements of coreless magnetic steering tool, a platform architecture of five modules, including simulation rehearsal, virtual training, remote operation, smart tool and intelligent decision, was designed in detail, achieving a whole process digitization from predrilling risk assessment and in-drilling acquisition and processing to post-drilling feedback and optimization, and a visual interface was developed. …”
Get full text
Article -
3569
Сombat wounds microflora in modern warfare
Published 2025-06-01“…Analysis of the clonal characteristics and antibiotic resistance of the most prevalent wound pathogens among individuals injured in the Russian-Ukrainian war to support microbiota surveillance of combat wounds and optimize treatment strategies. Materials and Methods. …”
Get full text
Article -
3570
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
3571
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3572
Weak Connection Regulation Technology for Source-Storage-Load Collaborative Microgrids Based on Direct Power Control
Published 2025-05-01“…The paper also studied the regional DC power supply and flexible regulation technology, analyzed the flexible characteristics of air conditioners, energy storage, photovoltaic, etc., and verified the power direct-control flexible regulation algorithm and evaluation indexes. From the effect of testing and verification, the whole system enables real-time response and rapid adjustment, thus improving the energy utilization efficiency, reducing the grid-side quota and realizing the local consumption of PV.…”
Get full text
Article -
3573
Precision Dosing in Presence of Multiobjective Therapies by Integrating Reinforcement Learning and PK‐PD Models: Application to Givinostat Treatment of Polycythemia Vera
Published 2025-06-01“…The therapeutic goal is to simultaneously normalize the levels of these efficacy/safety biomarkers, thus inducing a complete hematological response (CHR). An RL algorithm, Q‐Learning (QL), was integrated with a PK‐PD model describing the givinostat effect on PLT, WBC, and HCT to derive both an adaptive dosing protocol (QLpop‐agent) for the whole population and personalized dosing strategies by coupling a specific QL‐agent to each patient (QLind‐agents). …”
Get full text
Article -
3574
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management
Published 2022-01-01“…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
Get full text
Article -
3575
Research on Designing an Industrial Product-Service System with Uncertain Customer Demands
Published 2021-01-01“…This paper presents a design model that integrates an improved affinity propagation (AP) clustering algorithm, quality function development (QFD), and axiomatic design (AD). …”
Get full text
Article -
3576
Preoperative MRI-based radiomics analysis of intra- and peritumoral regions for predicting CD3 expression in early cervical cancer
Published 2025-07-01“…Various machine learning algorithms, including Support Vector Machine (SVM), Logistic Regression, Random Forest, AdaBoost, and Decision Tree, were used to construct radiomics models based on different ROIs, and diagnostic performances were compared to identify the optimal approach. …”
Get full text
Article -
3577
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
3578
Detection of soluble solid content in table grapes during storage based on visible-near-infrared spectroscopy
Published 2025-01-01“…Comparing the modelling results derived from whole-band spectral data with those obtained from selected spectral variables, the optimal spectral prediction model was formulated utilizing PLSR. …”
Get full text
Article -
3579
Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning
Published 2025-01-01“…Experimental results demonstrate that the algorithm achieves improved exploration efficiency and adaptability compared to a real-time scheduling method while maintaining computational feasibility. …”
Get full text
Article -
3580
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01“…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
Get full text
Article