-
3961
Improved Cylinder-Based Tree Trunk Detection in LiDAR Point Clouds for Forestry Applications
Published 2025-01-01“…While cylinder fitting algorithms provide a three-dimensional (3D) solution for trunk detection, their performance in complex forest environments remains limited due to sensitivity to parameters like distance thresholds. …”
Get full text
Article -
3962
Electric Bus Charging Schedules Relying on Real Data-Driven Targets Based on Hierarchical Deep Reinforcement Learning
Published 2025-01-01“…As a result, the high-level agent learns an effective policy for prescribing the charging targets for every charging period, while the low-level agent learns an optimal policy for setting the charging power of every time step within a single charging period, with the aim of minimizing the charging costs while meeting the charging target. …”
Get full text
Article -
3963
Personal air cleaning by a user-tracking robot equipped with a nanofiber air cleaner in a large work space
Published 2025-03-01“…Experiments were conducted to measure the clean air delivery rate (CADR) of the nanofiber air cleaner, evaluate the accuracy of the user-tracking algorithm, and determine the optimal deflector setup and user-to-robot distance. …”
Get full text
Article -
3964
ZZ-YOLOv11: A Lightweight Vehicle Detection Model Based on Improved YOLOv11
Published 2025-05-01“…Experimental data on the optimized KITTI and BDD100K datasets show that the detection accuracy of the ZZ-YOLO algorithm is 70.9%, the mAP (mean Average Precision) @0.5 is 58%, the model-parameter quantity is 14.1GFLOPs compared to the original algorithm, the detection accuracy is increased by 5.7%, and the average precision is increased by 2.3%. …”
Get full text
Article -
3965
A cooperative jamming resource allocation method based on PSO-SSNOA
Published 2025-05-01“…This approach innovatively integrates Particle Swarm Optimization (PSO) with the Nutcracker Optimization Algorithm (NOA), while enhancing the nutcracker’s behavioral patterns through seasonal adaptation strategies. …”
Get full text
Article -
3966
Obstacle Avoidance of Surface Agent Formation Based on Streamline Traction at Fixed-Time
Published 2024-11-01“…The optimal guiding angular velocity signal is obtained through quadratic programming, ensuring that the SA steers towards the designated position while avoiding obstacles. …”
Get full text
Article -
3967
Hybrid precoding method for mmWave massive MIMO systems based on LFM
Published 2019-06-01“…Analog-digital hybrid precoding is a key technology for millimeter wave massive MIMO systems that reduce hardware costs while balancing system performance.However,the traditional hybrid precoding scheme often needed to find a suitable codebook for precoding,and some codebooks were not easy to obtain or had deviations in actual situations.An analog-digital hybrid precoding method based on latent factor model (LFM) in machine learning without codebook was proposed for this problem.The LFM decomposition and stochastic gradient descent method were used to approximate the designed precoding matrix to the optimal full digital precoding matrix for good performance.The simulation results show that compared with the hybrid precoding design method based on orthogonal matching pursuit (OMP) algorithm,this method not only does not need a codebook,but also has better performance than the hybrid precoding algorithm based on OMP algorithm,which is closer to optimal full digital precoding method.…”
Get full text
Article -
3968
Classification-based point cloud denoising and 3D reconstruction of roadways
Published 2025-05-01“…The reconstruction algorithm could reduce holes effectively while maintaining the accuracy and smoothness of the roadway model. …”
Get full text
Article -
3969
Enhancing Spreading Factor Assignment in LoRaWAN with a Geometric Distribution Approach for Practical Node Distributions
Published 2024-09-01“…While the GD algorithm consistently demonstrated superior DER values across varying coverage areas and payload sizes, it incurred a slight increase in energy consumption due to node allocations to higher SFs. …”
Get full text
Article -
3970
Indoor Positioning System based on SSA-ELM Neural Network for Visible Light
Published 2025-02-01“…【Objective】The Extreme Learning Machine (ELM) neural network algorithm in the traditional indoor Visible Light Positioning (VLP) system suffers from unstable convergence and a tendency to get stuck in local optimal states, resulting in decreased positioning accuracy. …”
Get full text
Article -
3971
Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty
Published 2024-12-01“…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
Get full text
Article -
3972
Stability Study of Distributed Drive Vehicles Based on Estimation of Road Adhesion Coefficient and Multi-Parameter Control
Published 2025-01-01“…First, a seven-degree-of-freedom (7-DOF) vehicle dynamics model is established and optimized with a layered control strategy. The upper-level control module calculates the desired yaw rate and sideslip angle using the two-degree-of-freedom (2-DOF) vehicle model and estimates the road adhesion coefficient by using the singular-value optimized cubature Kalman filtering (CKF) algorithm; the middle-level utilizes the second-order sliding mode controller (SOSMC) as a direct yaw moment controller in order to track the desired yaw rate and sideslip angle while also employing a joint distribution algorithm to control the torque distribution based on vehicle stability parameters, thereby enhancing system robustness; and the lower-level controller performs optimal torque allocation based on the optimal tire loading rate as the objective. …”
Get full text
Article -
3973
LazyAct: Lazy actor with dynamic state skip based on constrained MDP.
Published 2025-01-01“…Inspired by human decision-making patterns, which involve reasoning only on critical states in continuous decision-making tasks without considering all states, we introduce the LazyAct algorithm. This algorithm significantly reduces the number of inferences while preserving the quality of the policy. …”
Get full text
Article -
3974
A User-Priority-Driven Multi-UAV Cooperative Reconnaissance Strategy
Published 2021-01-01“…This reconnaissance process is formulated as a cooperative path planning problem, where the optimization objective is maximizing users’ total satisfaction, while an intelligent algorithm is proposed to solve this problem effectively. …”
Get full text
Article -
3975
A Sleep Scheduling Mechanism with PSO Collaborative Evolution for Wireless Sensor Networks
Published 2015-03-01“…This paper proposes a particle swarm optimization sleep scheduling mechanism for use in wireless sensor networks based on sleep scheduling algorithm. …”
Get full text
Article -
3976
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3977
Inverse Strategies for Identifying the Parameters of Constitutive Laws of Metal Sheets
Published 2016-01-01“…It highlights that the identification procedure is dictated by the loading conditions, the geometry of the sample, the type of experimental results selected for the analysis, the cost function, and optimization algorithm used. Also, the type of constitutive law (isotropic and/or kinematic hardening laws and/or anisotropic yield criterion), whose parameters are intended to be identified, affects the whole identification procedure.…”
Get full text
Article -
3978
Steatotic liver disease: radiological and ultrasound point of view
Published 2025-01-01“…All patients were examined with a single diagnostic algorithm consisting of 5 stages: clinical and laboratory stage, physical examination, ultrasound, dual-energy X-ray absorptiometry in the “Whole Body” mode, retrospective analysis of MDCT and/or MRI studies. …”
Get full text
Article -
3979
Vulnerability Assessment in Karst Aquifers with EPIK and COP Indices Calibration
Published 2025-05-01“…In order to calibrate the GQI qualitative index with the zoning of the springs in the region, whale optimization algorithms were used. In this calibration, the weights and ranks of the two vulnerability indices were determined. …”
Get full text
Article -
3980
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article