-
4161
Сombat wounds microflora in modern warfare
Published 2025-06-01“…Analysis of the clonal characteristics and antibiotic resistance of the most prevalent wound pathogens among individuals injured in the Russian-Ukrainian war to support microbiota surveillance of combat wounds and optimize treatment strategies. Materials and Methods. …”
Get full text
Article -
4162
Electric Bus Charging Schedules Relying on Real Data-Driven Targets Based on Hierarchical Deep Reinforcement Learning
Published 2025-01-01“…As a result, the high-level agent learns an effective policy for prescribing the charging targets for every charging period, while the low-level agent learns an optimal policy for setting the charging power of every time step within a single charging period, with the aim of minimizing the charging costs while meeting the charging target. …”
Get full text
Article -
4163
Personal air cleaning by a user-tracking robot equipped with a nanofiber air cleaner in a large work space
Published 2025-03-01“…Experiments were conducted to measure the clean air delivery rate (CADR) of the nanofiber air cleaner, evaluate the accuracy of the user-tracking algorithm, and determine the optimal deflector setup and user-to-robot distance. …”
Get full text
Article -
4164
ZZ-YOLOv11: A Lightweight Vehicle Detection Model Based on Improved YOLOv11
Published 2025-05-01“…Experimental data on the optimized KITTI and BDD100K datasets show that the detection accuracy of the ZZ-YOLO algorithm is 70.9%, the mAP (mean Average Precision) @0.5 is 58%, the model-parameter quantity is 14.1GFLOPs compared to the original algorithm, the detection accuracy is increased by 5.7%, and the average precision is increased by 2.3%. …”
Get full text
Article -
4165
A cooperative jamming resource allocation method based on PSO-SSNOA
Published 2025-05-01“…This approach innovatively integrates Particle Swarm Optimization (PSO) with the Nutcracker Optimization Algorithm (NOA), while enhancing the nutcracker’s behavioral patterns through seasonal adaptation strategies. …”
Get full text
Article -
4166
Obstacle Avoidance of Surface Agent Formation Based on Streamline Traction at Fixed-Time
Published 2024-11-01“…The optimal guiding angular velocity signal is obtained through quadratic programming, ensuring that the SA steers towards the designated position while avoiding obstacles. …”
Get full text
Article -
4167
Hybrid precoding method for mmWave massive MIMO systems based on LFM
Published 2019-06-01“…Analog-digital hybrid precoding is a key technology for millimeter wave massive MIMO systems that reduce hardware costs while balancing system performance.However,the traditional hybrid precoding scheme often needed to find a suitable codebook for precoding,and some codebooks were not easy to obtain or had deviations in actual situations.An analog-digital hybrid precoding method based on latent factor model (LFM) in machine learning without codebook was proposed for this problem.The LFM decomposition and stochastic gradient descent method were used to approximate the designed precoding matrix to the optimal full digital precoding matrix for good performance.The simulation results show that compared with the hybrid precoding design method based on orthogonal matching pursuit (OMP) algorithm,this method not only does not need a codebook,but also has better performance than the hybrid precoding algorithm based on OMP algorithm,which is closer to optimal full digital precoding method.…”
Get full text
Article -
4168
Classification-based point cloud denoising and 3D reconstruction of roadways
Published 2025-05-01“…The reconstruction algorithm could reduce holes effectively while maintaining the accuracy and smoothness of the roadway model. …”
Get full text
Article -
4169
Enhancing Spreading Factor Assignment in LoRaWAN with a Geometric Distribution Approach for Practical Node Distributions
Published 2024-09-01“…While the GD algorithm consistently demonstrated superior DER values across varying coverage areas and payload sizes, it incurred a slight increase in energy consumption due to node allocations to higher SFs. …”
Get full text
Article -
4170
Indoor Positioning System based on SSA-ELM Neural Network for Visible Light
Published 2025-02-01“…【Objective】The Extreme Learning Machine (ELM) neural network algorithm in the traditional indoor Visible Light Positioning (VLP) system suffers from unstable convergence and a tendency to get stuck in local optimal states, resulting in decreased positioning accuracy. …”
Get full text
Article -
4171
Stability Study of Distributed Drive Vehicles Based on Estimation of Road Adhesion Coefficient and Multi-Parameter Control
Published 2025-01-01“…First, a seven-degree-of-freedom (7-DOF) vehicle dynamics model is established and optimized with a layered control strategy. The upper-level control module calculates the desired yaw rate and sideslip angle using the two-degree-of-freedom (2-DOF) vehicle model and estimates the road adhesion coefficient by using the singular-value optimized cubature Kalman filtering (CKF) algorithm; the middle-level utilizes the second-order sliding mode controller (SOSMC) as a direct yaw moment controller in order to track the desired yaw rate and sideslip angle while also employing a joint distribution algorithm to control the torque distribution based on vehicle stability parameters, thereby enhancing system robustness; and the lower-level controller performs optimal torque allocation based on the optimal tire loading rate as the objective. …”
Get full text
Article -
4172
GREEN ECONOMY AND HOLISTIC PLANNING BY ARTIFICIAL INTELLIGENCEAPPLICATION
Published 2024-10-01“…On the one hand, IT such as machine learning, data analytics, and optimization algorithms offer immense potential to enhance resource efficiency, optimize energy systems, and facilitate sustainable decision-making processes. …”
Get full text
Article -
4173
LazyAct: Lazy actor with dynamic state skip based on constrained MDP.
Published 2025-01-01“…Inspired by human decision-making patterns, which involve reasoning only on critical states in continuous decision-making tasks without considering all states, we introduce the LazyAct algorithm. This algorithm significantly reduces the number of inferences while preserving the quality of the policy. …”
Get full text
Article -
4174
A User-Priority-Driven Multi-UAV Cooperative Reconnaissance Strategy
Published 2021-01-01“…This reconnaissance process is formulated as a cooperative path planning problem, where the optimization objective is maximizing users’ total satisfaction, while an intelligent algorithm is proposed to solve this problem effectively. …”
Get full text
Article -
4175
A Sleep Scheduling Mechanism with PSO Collaborative Evolution for Wireless Sensor Networks
Published 2015-03-01“…This paper proposes a particle swarm optimization sleep scheduling mechanism for use in wireless sensor networks based on sleep scheduling algorithm. …”
Get full text
Article -
4176
Inverse Strategies for Identifying the Parameters of Constitutive Laws of Metal Sheets
Published 2016-01-01“…It highlights that the identification procedure is dictated by the loading conditions, the geometry of the sample, the type of experimental results selected for the analysis, the cost function, and optimization algorithm used. Also, the type of constitutive law (isotropic and/or kinematic hardening laws and/or anisotropic yield criterion), whose parameters are intended to be identified, affects the whole identification procedure.…”
Get full text
Article -
4177
Steatotic liver disease: radiological and ultrasound point of view
Published 2025-01-01“…All patients were examined with a single diagnostic algorithm consisting of 5 stages: clinical and laboratory stage, physical examination, ultrasound, dual-energy X-ray absorptiometry in the “Whole Body” mode, retrospective analysis of MDCT and/or MRI studies. …”
Get full text
Article -
4178
Vulnerability Assessment in Karst Aquifers with EPIK and COP Indices Calibration
Published 2025-05-01“…In order to calibrate the GQI qualitative index with the zoning of the springs in the region, whale optimization algorithms were used. In this calibration, the weights and ranks of the two vulnerability indices were determined. …”
Get full text
Article -
4179
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
4180
Digital three-stage recursive-separable image processing filter with variable sizes of scanning multielement aperture
Published 2024-12-01“…The study established that the processing time of a test image using the developed filter is on average 5 times less than the time taken by the classical two-dimensional convolution algorithm. The optimal coefficients for magnifying the central element and raising the positive part of the aperture of a digital filter were determined, enabling the efficiency of its use to be enabled.Conclusions. …”
Get full text
Article