Showing 601 - 620 results of 13,618 for search 'also algorithm', query time: 0.11s Refine Results
  1. 601

    Optimization of stamping workshop line layout based on improved PSO algorithm by Yaxuan Bi, Xin Ning, Shuai Zhao

    Published 2025-03-01
    “…Additionally, the enhanced algorithm outperformed traditional PSO in terms of convergence speed and solution quality. …”
    Get full text
    Article
  2. 602

    Wind Farm Layout Optimization Problem Using Nature-Inspired Algorithms by Mukesh Kumar, Ajay Sharma, Nirmala Sharma, Fani Bhushan Sharma, Mahendra Bhadu

    Published 2024-01-01
    “…Nowadays, researchers from a variety of fields are developing nature-inspired algorithms (NIAs) to solve difficult real-world problems. …”
    Get full text
    Article
  3. 603

    Apriori Algorithm Analysis to Determine Purchasing Patterns at Beleven Farma Pharmacy by Fara Lufiah, Dwi Rosa Indah, Mgs Afriyan Firdaus

    Published 2025-01-01
    “…Beleven Farma Pharmacy is a place that provides medicines and other health products such as supplements, vitamins and also various health tests. As a newly established pharmacy, no innovations have been made to improve sales strategies. …”
    Get full text
    Article
  4. 604

    Consistent Algorithms Marching Along Characteristics for the Numerical Solution of the Boltzmann Equation by Nilson C. Roberty, Rogerio C. Nunes

    Published 2011-01-01
    “…Some numerical examples related to the solution of a transmission problem in a high-contrast model with absorption and scattering are presented. Also, a comparison with benchmarks problems for source and reactor criticality simulations shows the compatibility between calculations with the algorithms proposed here and theoretical results.…”
    Get full text
    Article
  5. 605

    An Improved Ant Colony Algorithm of Robot Path Planning for Obstacle Avoidance by Hong-Jun Wang, Yong Fu, Zhuo-Qun Zhao, You-Jun Yue

    Published 2019-01-01
    “…The simulation results show the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  6. 606

    Algorithm for Image Retrieval Based on Edge Gradient Orientation Statistical Code by Jiexian Zeng, Yonggang Zhao, Weiye Li, Xiang Fu

    Published 2014-01-01
    “…Image edge gradient direction not only contains important information of the shape, but also has a simple, lower complexity characteristic. …”
    Get full text
    Article
  7. 607

    Fuzzy Adaptation Algorithms’ Control for Robot Manipulators with Uncertainty Modelling Errors by Yongqing Fan, Keyi Xing, Xiangkui Jiang

    Published 2018-01-01
    “…To overcome the limitations such as online learning computation burden and logic structure in conventional fuzzy logic systems, a parameter should be used in fuzzy logic system, which composes fuzzy logic system with updated parameter laws, and can be formed for a new fashioned adaptation algorithms controller. The error closed-loop dynamical system can be stabilized based on Lyapunov analysis, the number of online learning computation burdens can be reduced greatly, and the different kinds of fuzzy logic systems with fuzzy rules or without any fuzzy rules are also suited. …”
    Get full text
    Article
  8. 608

    M-APSK phase detection algorithm and parallel carrier synchronization method by Hao HUAN, Kexue REN

    Published 2024-03-01
    “…In order to realize the precise phase correction of high order modulation in M-APSK modem, the Q-power non-data aided phase detection method recommended by DVB-S2 standard for 16APSK and 32APSK was extended to 64APSK, 128APSK and 256APSK.An improved algorithm was proposed to solve the problem of unstable loop operation when the proportion of constellation points used for phase detection in high-order modulation was low.By using threshold judgment on the amplitude of the received symbol after power normalization, phase detection was performed only when the amplitude was higher than the threshold, and the filter state and phase compensation value were not changed when the amplitude was lower than the threshold, so as to improve the phase detection effectiveness and reliability of constellation points and reduce the lock threshold.Aiming at the problem that the symbol rate of high-speed data transmission was very high but the working clock frequency of the processor was relatively low, a parallel carrier synchronization method for M-APSK was proposed, which could meet the needs of the receiver’s working clock.Compared with the traditional constant coding and modulation (CCM) carrier synchronization loop, the parallel method could also be applied to the frequency tracking of variable coding and modulation (VCM) system.…”
    Get full text
    Article
  9. 609

    An Improved SHEPWM Modulation Algorithm for Three-levelEnergy Feedback Inverter by WU Xuefeng, CHEN Jielian, WANG Xiong, SONG Qianru, YIN Weiheng

    Published 2021-01-01
    “…In order to better suppress harmonics and improve the quality of grid-connected power, an improved SHEPWM modulation method is proposed to be applied to the three-level inverter based on the in-depth analysis of the traditional selected harmonic elimination algorithm. Not only maintaining the advantages of the traditional SHEPWM modulation algorithm, the proposed method also avoids the increase of high-order harmonics which can not be achieved by the traditional SHEPWM modulation algorithm. …”
    Get full text
    Article
  10. 610

    Low-complexity signal detection algorithm for the power splitting receiver scheme by WANG Yanyan, LI Qidi, TANG Xiaohu

    Published 2024-04-01
    “…Then, by characterizing the joint probability density function of the two-dimensional received signal in the transformed coordinate system, a low complexity signal detection algorithm based on the minimum distance was achieved. …”
    Get full text
    Article
  11. 611

    Routing algorithm for railway monitoring linear WSN based on improved PSO by Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU

    Published 2022-05-01
    “…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
    Get full text
    Article
  12. 612

    Comparative Study of Modern Differential Evolution Algorithms: Perspectives on Mechanisms and Performance by Janez Brest, Mirjam Sepesy Maučec

    Published 2025-05-01
    “…We conducted not only a cumulative analysis of algorithms, but we also focused on their performances regarding the function family (i.e., unimodal, multimodal, hybrid, and composition functions). …”
    Get full text
    Article
  13. 613

    An Accurate FFPA-PSR Estimator Algorithm and Tool for Software Effort Estimation by Senthil Kumar Murugesan, Chidhambara Rajan Balasubramanian

    Published 2015-01-01
    “…It shows that the proposed method not only improves the accuracy but also increases the reliability, as well as the security, of the product.…”
    Get full text
    Article
  14. 614

    Learning tensor networks with tensor cross interpolation: New algorithms and libraries by Yuriel Núñez Fernández, Marc K. Ritter, Matthieu Jeannin, Jheng-Wei Li, Thomas Kloss, Thibaud Louvet, Satoshi Terasaki, Olivier Parcollet, Jan von Delft, Hiroshi Shinaoka, Xavier Waintal

    Published 2025-03-01
    “…In particular, we show that replacing the cross interpolation by the partially rank-revealing LU decomposition yields a more stable and more flexible algorithm than the original algorithm. We also present two open source libraries, xfac in Python/C++ and TensorCrossInterpolation.jl in Julia, that implement these improved algorithms, and illustrate them on several applications. …”
    Get full text
    Article
  15. 615
  16. 616

    Battery State of Health Estimation Methods: Implementation and Comparison of 11 Algorithms by Eojin Kim, Sunghun Jung

    Published 2025-01-01
    “…Through detailed comparative analysis, this study not only guides researchers and practitioners in selecting optimal SOH estimation techniques but also lays the groundwork for innovative hybrid algorithm development to address limitations in current battery management systems. …”
    Get full text
    Article
  17. 617
  18. 618

    Blockchain data access control scheme based on CP-ABE algorithm by Yunxiang QIU, Hongxia ZHANG, Qi CAO, Jiancong ZHANG, Xingshu CHEN, Hongjian JIN

    Published 2020-06-01
    “…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
    Get full text
    Article
  19. 619

    Algorithmic Management and App-based Delivery Workers in Rio de Janeiro by Lucas Souza

    Published 2025-04-01
    “…The argument here is that the platformisation of deliveries has brought greater precarisation to the work of food couriers in Rio de Janeiro, and that this is related not only to the more direct worsening of working conditions as a consequence of the use of apps in the industry, but also to how algorithmic management articulates and incorporates historical issues related to race and gender in this sector of the economy. …”
    Get full text
    Article
  20. 620

    Maintenance and Operation Optimization Algorithm of PV Plants under Multiconstraint Conditions by Chi Hua, Liang Kuang, Dechang Pi

    Published 2020-01-01
    “…The current study puts forward effort implementation via genetic algorithm-based multiconstrained optimization methodology. …”
    Get full text
    Article