-
3561
Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants
Published 2022-01-01“…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
Get full text
Article -
3562
Retrospective Illumination Correction of Retinal Images
Published 2010-01-01“…Among the tested optimizers, the gradient-based optimizer with varying step has shown to have the fastest convergence while providing the best precision. …”
Get full text
Article -
3563
DSGD++: Reducing Uncertainty and Training Time in the DSGD Classifier through a Mass Assignment Function Initialization Technique
Published 2025-08-01“…We present a method for the Dempster-Shafer Gradient Descent (DSGD) algorithm that significantly reduces training time—by a factor of 1.6—and also reduces the uncertainty of each rule (a condition on features leading to a class label) by a factor of 2.1, while preserving accuracy comparable to other statistical classification techniques. …”
Get full text
Article -
3564
ARIMA-Kriging and GWO-BiLSTM Multi-Model Coupling in Greenhouse Temperature Prediction
Published 2025-04-01“…This study introduces an ARIMA-Kriging spatiotemporal coupling model, which combines temperature time-series data with sensor spatial coordinates to accurately determine minimum temperatures in greenhouses while reducing hardware costs. Utilizing the high-quality data processed by this model, this study proposes and constructs a novel Grey Wolf Optimizer and Bidirectional Long Short-Term Memory (GWO-BiLSTM) temperature prediction framework, which combines a Grey Wolf Optimizer (GWO)-enhanced algorithm with a Bidirectional Long Short-Term Memory (BiLSTM) network. …”
Get full text
Article -
3565
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
3566
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3567
Weak Connection Regulation Technology for Source-Storage-Load Collaborative Microgrids Based on Direct Power Control
Published 2025-05-01“…The paper also studied the regional DC power supply and flexible regulation technology, analyzed the flexible characteristics of air conditioners, energy storage, photovoltaic, etc., and verified the power direct-control flexible regulation algorithm and evaluation indexes. From the effect of testing and verification, the whole system enables real-time response and rapid adjustment, thus improving the energy utilization efficiency, reducing the grid-side quota and realizing the local consumption of PV.…”
Get full text
Article -
3568
Tennis Timing Assessment by a Machine Learning-Based Acoustic Detection System: A Pilot Study
Published 2025-01-01“…<b>Results:</b> The ML algorithm showed a detection accuracy higher than 95%, while the average accuracy of the whole system that was applied on-court was 85%. …”
Get full text
Article -
3569
Precision Dosing in Presence of Multiobjective Therapies by Integrating Reinforcement Learning and PK‐PD Models: Application to Givinostat Treatment of Polycythemia Vera
Published 2025-06-01“…The therapeutic goal is to simultaneously normalize the levels of these efficacy/safety biomarkers, thus inducing a complete hematological response (CHR). An RL algorithm, Q‐Learning (QL), was integrated with a PK‐PD model describing the givinostat effect on PLT, WBC, and HCT to derive both an adaptive dosing protocol (QLpop‐agent) for the whole population and personalized dosing strategies by coupling a specific QL‐agent to each patient (QLind‐agents). …”
Get full text
Article -
3570
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
3571
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management
Published 2022-01-01“…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
Get full text
Article -
3572
Unsupervised fake news detection on social media using hybrid Gaussian Mixture Model.
Published 2025-01-01“…In particular, it also proposes a novel hybrid method that leverages the Gaussian Mixture Model (GMM) in conjunction with the Group Counseling Optimizer (GCO), a metaheuristic optimization algorithm, to identify the optimal number of clusters for the detection of fake news. …”
Get full text
Article -
3573
UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design
Published 2025-01-01“…This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. The aim of this paper is to minimize the whole inspection time via joint optimization of the mobile nest’s scheduling and UAV trajectory while satisfying constraints related to energy maximization and avoiding NFZs. …”
Get full text
Article -
3574
Inverse design of perimeter-controlled InAs-assisted metasurface for two-dimensional dynamic beam steering
Published 2022-09-01“…The multi-objective genetic algorithm (GA) for optimizing user-defined metrics toward shaping desired far-zone radiation pattern is implemented. …”
Get full text
Article -
3575
Research on Designing an Industrial Product-Service System with Uncertain Customer Demands
Published 2021-01-01“…Next, a QFD- and AD-integrated model is constructed to establish a mapping between the function domain and the structure domain and optimize the control scheme through the quality of its risk prediction. …”
Get full text
Article -
3576
Implementation of Machine Vision Methods for Cattle Detection and Activity Monitoring
Published 2025-03-01“…The goal of this research was to implement machine vision algorithms in a cattle stable to detect cattle in stalls and determine their activities. …”
Get full text
Article -
3577
Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation
Published 2021-01-01“…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
Get full text
Article -
3578
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01“…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
Get full text
Article -
3579
Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning
Published 2025-01-01“…This study presents a scalable and adaptive multi-robot exploration algorithm that adaptively updates edge weights based on visit counts, reservations, and obstacles to optimize path allocation and minimize redundant scanning. …”
Get full text
Article -
3580
What Strategy Central Nervous System Uses to Perform a Movement Balanced? Biomechatronical Simulation of Human Lifting
Published 2013-01-01“…To solve the kinematic redundancy in previous studies it is hypothesize that CNS functions as an optimizer, such of that are the task-based algorithms which search to find optimal solution for each specific task. …”
Get full text
Article