-
3541
Cycle-based formulations in Distance Geometry
Published 2023-01-01“…The problem is often modelled as a mathematical programming formulation involving decision variables that determine the position of the vertices in the given Euclidean space. Solution algorithms are generally constructed using local or global nonlinear optimization techniques. …”
Get full text
Article -
3542
Adaptive Cut Selection in Mixed-Integer Linear Programming
Published 2023-07-01Get full text
Article -
3543
Efficient persistence landscape generation
Published 2025-06-01“…Our algorithm can determine in optimal O ( n * log ( n ) ) if a given birth-death pair appears in the top- k landscapes. …”
Get full text
Article -
3544
Energy Efficiency Maximization for Device-to-Device Communication Underlaying Cellular Networks on Multiple Bands
Published 2016-01-01“…However, most of existing works only optimize the EE in the single-cell scenario, while little attention is paid to maximizing the EE of the whole cellular network underlaid with D2D communication with randomly distributed users on multiple bands. …”
Get full text
Article -
3545
Energy Management Strategy Based on the Driving Cycle Model for Plugin Hybrid Electric Vehicles
Published 2014-01-01“…The state of charge (SOC) profile can be obtained by the DP algorithm for the whole driving cycle. In order to optimize the energy management strategy in the hybrid power system, the optimal motor torque control sequence can be calculated using the DP algorithm for the segments between the traffic intersections. …”
Get full text
Article -
3546
Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver
Published 2019-01-01“…Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.…”
Get full text
Article -
3547
Clustering-based energy-aware virtual network embedding
Published 2017-08-01“…Extensive simulations demonstrate that this algorithm significantly reduces the energy cost by up to 14% over the state-of-the-art algorithm while maintaining similar revenue.…”
Get full text
Article -
3548
Real-time urban regional route planning model for connected vehicles based on V2X communication
Published 2020-11-01“…Second, according to the topology structure of the current regional road network, all predicted routes are listed based on the Dijkstra algorithm. Third, the predicted travel time of each alternative route is calculated, while the predicted route with the least travel time is selected as the optimal route. …”
Get full text
Article -
3549
Temperature Compensation Method for MEMS Ring Gyroscope Based on PSO-TVFEMD-SE-TFPF and FTTA-LSTM
Published 2025-04-01“…This study proposes a novel parallel denoising and temperature compensation fusion algorithm for MEMS ring gyroscopes. First, the particle swarm optimization (PSO) algorithm is used to optimize the time-varying filter-based empirical mode decomposition (TVFEMD), obtaining optimal decomposition parameters. …”
Get full text
Article -
3550
Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants
Published 2022-01-01“…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
Get full text
Article -
3551
Energy-Efficient UAV Relaying Robust Resource Allocation in Uncertain Adversarial Networks
Published 2021-01-01“…We derive EE UAV relay-user maximization problem in the adversarial wireless networks at last. While the problem is non-convex, we propose an iterative and sub-optimal algorithm to optimize EE UAV relay with constraints, such as ICC, trajectory, speed, acceleration, and transmit power. …”
Get full text
Article -
3552
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
3553
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3554
Weak Connection Regulation Technology for Source-Storage-Load Collaborative Microgrids Based on Direct Power Control
Published 2025-05-01“…The paper also studied the regional DC power supply and flexible regulation technology, analyzed the flexible characteristics of air conditioners, energy storage, photovoltaic, etc., and verified the power direct-control flexible regulation algorithm and evaluation indexes. From the effect of testing and verification, the whole system enables real-time response and rapid adjustment, thus improving the energy utilization efficiency, reducing the grid-side quota and realizing the local consumption of PV.…”
Get full text
Article -
3555
Tennis Timing Assessment by a Machine Learning-Based Acoustic Detection System: A Pilot Study
Published 2025-01-01“…<b>Results:</b> The ML algorithm showed a detection accuracy higher than 95%, while the average accuracy of the whole system that was applied on-court was 85%. …”
Get full text
Article -
3556
Precision Dosing in Presence of Multiobjective Therapies by Integrating Reinforcement Learning and PK‐PD Models: Application to Givinostat Treatment of Polycythemia Vera
Published 2025-06-01“…The therapeutic goal is to simultaneously normalize the levels of these efficacy/safety biomarkers, thus inducing a complete hematological response (CHR). An RL algorithm, Q‐Learning (QL), was integrated with a PK‐PD model describing the givinostat effect on PLT, WBC, and HCT to derive both an adaptive dosing protocol (QLpop‐agent) for the whole population and personalized dosing strategies by coupling a specific QL‐agent to each patient (QLind‐agents). …”
Get full text
Article -
3557
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management
Published 2022-01-01“…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
Get full text
Article -
3558
Research on Designing an Industrial Product-Service System with Uncertain Customer Demands
Published 2021-01-01“…This paper presents a design model that integrates an improved affinity propagation (AP) clustering algorithm, quality function development (QFD), and axiomatic design (AD). …”
Get full text
Article -
3559
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
3560
UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design
Published 2025-01-01“…This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. The aim of this paper is to minimize the whole inspection time via joint optimization of the mobile nest’s scheduling and UAV trajectory while satisfying constraints related to energy maximization and avoiding NFZs. …”
Get full text
Article