-
3681
A Full-Life-Cycle Modeling Framework for Cropland Abandonment Detection Based on Dense Time Series of Landsat-Derived Vegetation and Soil Fractions
Published 2025-06-01“…Compared to the traditional yearly land cover-based approach (with an overall accuracy of 77.39%), this algorithm can overcome the propagation of classification errors (with product accuracy from 74.47% to 85.11%), especially in terms of improving the ability to capture changes at finer spatial scales. …”
Get full text
Article -
3682
Mapping the air temperature in China from time-normalized MODIS land surface temperature data via zone-based stacking ensemble models
Published 2025-07-01“…First, Terra/MODIS LST was temporally normalized using ERA5 reanalysis data to eliminate the uncertainty caused by differences in observation times. Then, the whole study area was divided into subzones, and nine base models were developed in each zone using machine learning (ML) methods to estimate Ta. …”
Get full text
Article -
3683
A new internal clustering validation index for categorical data based on concentration of attribute values
Published 2019-05-01“…For data with a clustering structure, different results obtained under different algorithms and parameters also need to be further optimized by clustering validation. …”
Get full text
Article -
3684
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
3685
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3686
Digital mapping of peat thickness and extent in Finland using remote sensing and machine learning
Published 2025-03-01“…In this study, we present a workflow for producing peat occurrence maps for the whole of Finland. For this, we used random forest classification to map areas with peat thicknesses of ≥ 10 cm, ≥30 cm, ≥40 cm, and > 60 cm. …”
Get full text
Article -
3687
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
3688
Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning
Published 2025-01-01“…Experimental results demonstrate that the algorithm achieves improved exploration efficiency and adaptability compared to a real-time scheduling method while maintaining computational feasibility. …”
Get full text
Article -
3689
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01“…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
Get full text
Article -
3690
Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation
Published 2021-01-01“…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
Get full text
Article -
3691
Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations
Published 2025-01-01“…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
Get full text
Article -
3692
Gaussian Process Regression with Soft Equality Constraints
Published 2025-01-01“…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
Get full text
Article -
3693
Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty
Published 2024-12-01“…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
Get full text
Article -
3694
A global object-oriented dynamic network for low-altitude remote sensing object detection
Published 2025-05-01“…This study introduces the Global Object-Oriented Dynamic Network (GOOD-Net) algorithm, comprising three fundamental components: an object-oriented, dynamically adaptive backbone network; a neck network designed to optimize the utilization of global information; and a task-specific processing head augmented for detailed feature refinement. …”
Get full text
Article -
3695
An integrated model of threshold-based scaling and fractional admission controlling to improve resource utilization efficiency in 5G core networks.
Published 2025-01-01“…One requirement is utilizing system resources effectively while ensuring stable system performance. Specifically, the need to optimize unused UPF instances to reduce system costs. …”
Get full text
Article -
3696
Energy management in a microgrid equipped with an electric vehicle based on the internet of things considering responsive load
Published 2025-02-01“…A novel Energy-Trading Management Algorithm (ETMA), based on the Meerkat Optimization Algorithm (MOA), is proposed to tackle the complexities of this system. …”
Get full text
Article -
3697
Key Nodes Identification Method in Scale-Free Network Based on Structural Holes
Published 2025-01-01“…The proposed algorithm achieves higher accuracy in structural hole-aware ranking compared to benchmarks while maintaining <inline-formula> <tex-math notation="LaTeX">${ O}\left ({{ m+n.logn }}\right)$ </tex-math></inline-formula> complexity. …”
Get full text
Article -
3698
A Lightweight, Intelligent Autonomous Exploration System for Indoor Robots Using Improved Random Walk With Back-Off Strategies
Published 2025-01-01“…The algorithm maintained a reliable average localization error of 0.005 m while exhibiting memory efficiency by the reduced memory usage by up to 13.7% relative to TB3. …”
Get full text
Article -
3699
Intelligent Energy Management in an Isolated DC Microgrid using Fuzzy Logic
Published 2025-01-01“…The PV system is controlled by a MPPT method implementing the INC algorithm, while the storage system is managed by a PI controller to control battery charging and discharging. …”
Get full text
Article -
3700
MAB-RSP: Data pricing based on Stackelberg game in MCS
Published 2025-07-01“…Experiments demonstrate that the algorithm improves revenue while ensuring balanced benefits for all participants.…”
Get full text
Article