Search alternatives:
line » life (Expand Search), like (Expand Search)
Showing 641 - 660 results of 1,899 for search 'line performance function', query time: 0.19s Refine Results
  1. 641

    Research on Adaptive Back-stepping Control of Harmonic Drive Based on the RBF Neural Network by Song Gang, Chen Manyi, Qiu Linfeng, Zhang Jie

    Published 2023-08-01
    “…Based on the test data, the parameters of the model are identified by the least square method. Radial basis function (RBF) neural network is used to approximate the nonlinear friction and external uncertain disturbance torque of the system on-line, and an adaptive inversion controller based on RBF neural network is proposed. …”
    Get full text
    Article
  2. 642

    Implementación de alternativa de secado en el proceso de fabricación de aire medicinal comprimido en Norte de Santander by Cristian David Cardona Mora, Álvaro Eulalio Villamizar Villamizar

    Published 2024-05-01
    “…The project was carried out in three phases: the first was the study of technical alternatives in the drying process for the manufacture of compressed medical air; the second involved the implementation of the best alternative, along with the validation of the addition of the drying system through the application of process qualification and validation protocols , along with their revalidation; and the last phase corresponded to the evaluation of the project using indicators. Greater performance in these filters avoided constant depressurization of the production line, repetitive filter changes, and abundant filter waste, generating an impact on the production of compressed medical air. …”
    Get full text
    Article
  3. 643

    VOLTAGE PROFILE IMPROVEMENT WITH APPLICATION OF DIFFERENTLY OPTIMIZED FACTS CONTROLLERS by Joel R. SUTTER, John N. NDERU, Ariel M. MUTEGI

    Published 2024-12-01
    “…The algorithm simultaneously solved the objective problem and augments device parameters as it searches for the best FACTS location and sizes. Objective function was resolved Security Constrained Optimal Load Flow (SCOLF) with the integration FACTS power electronics controllers for TTC without violating active and reactive power generation confines, voltage boundaries, line flow limits, and FACTS devices operation restrictions and ratings. …”
    Get full text
    Article
  4. 644

    Spatial multiplexing in near field MIMO channels with reconfigurable intelligent surfaces by Giulio Bartoli, Andrea Abrardo, Nicolo Decarli, Davide Dardari, Marco Di Renzo

    Published 2023-03-01
    “…With the aid of extensive numerical simulations in line‐of‐sight (free‐space) channels, we show that the proposed approach offers performance (rate and degrees of freedom) close to that obtained by numerically solving non‐convex optimization problems at a high computational complexity. …”
    Get full text
    Article
  5. 645

    Civic Virtue in the Deliberative System by Daniel Hutton Ferris

    Published 2019-04-01
    “…In this article I offer a response to this line of argument. There is no good philosophical reason to suppose that only unitary deliberation can perform an educative function for citizens. …”
    Get full text
    Article
  6. 646

    Extracorporeal ultrasound exposure by the low-frequency acoustic amplitude-modulated signal on a ureteral stent for preventing its incrustation: experimental determination of optim... by A. Yu. Tsukanov, D. S. Akhmetov, A. A. Novikov, N. A. Negrov, A. R. Putintseva, S. P. Semikina

    Published 2021-10-01
    “…The pulsed mode of the device function is most safe. The optimal application points of the instrument emitter for the ureteral upper and middle thirds is the posterior axillary line, and for the ureteral lower third is the middle axillary line.…”
    Get full text
    Article
  7. 647

    Development and validation of a predictive model for postoperative hepatic dysfunction in Stanford type A aortic dissection by Xiaotian Han, Wei Wang, Tianxiang Gu, Enyi Shi

    Published 2025-07-01
    “…The calibration curve shows that the bias corrected line is close to the ideal line. The DCA curve indicates that the use of the nomogram provides greater net clinical benefit. …”
    Get full text
    Article
  8. 648

    Evaluation Method of Mesh Protocol over ESP32 and ESP8266 by Nur Azzurin Afifie, Adam Wong Yoon Khang, Abd Shukur Bin Ja'afar, Ahmad Fairuz Bin Muhammad Amin, Jamil Abedalrahim Jamil Alsayaydehahmad, Win Adiyansyah Indra, Safarudin Gazali Herawan, Arnidza Binti Ramli

    Published 2021-12-01
    “…Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. …”
    Get full text
    Article
  9. 649

    Trajectory Tracking of a Wall-Climbing Cutting Robot Based on Kinematic and PID Joint Optimization by Xiaoguang Liu, Zhenmin Wang, Jing Wu, Hongmin Wu, Hao Zhang

    Published 2025-03-01
    “…Simulations verify that the control law performs well in tracking both straight-line and circular trajectories. …”
    Get full text
    Article
  10. 650
  11. 651

    A LSTM-RNN-Assisted Vector Tracking Loop for Signal Outage Bridging by Di Liu, Qingyuan Xia, Changhui Jiang, Chaochen Wang, Yuming Bo

    Published 2020-01-01
    “…Some methods have been developed for enhancing the GNSS performance in signal challenging environments (urban canyon, dense foliage, signal blockage, multipath, and none-line-of-sight signals). …”
    Get full text
    Article
  12. 652

    Visual integration deficits associated with psychosis are independent of diagnosis by Mia Geljic, Matthew Mitchell, Keri-Anne Stevens, Henry Holbrook, Hayley Darke, Patrick Goodbourn, Christina Damicoucas, Mohammad Asghari-Jafarabadi, Suresh Sundram, Olivia Carter

    Published 2025-04-01
    “…The findings are also consistent with cognitive factors playing a potential role in JOVI performance and highlight the difficulty in teasing apart altered perceptual and cognitive function in psychiatric patient groups.…”
    Get full text
    Article
  13. 653

    Optimizing SVC placement for enhanced voltage stability using a novel index and hybrid ABC-PSO algorithm by Hafizur Rahman, Roman Mia, Mustafizur Rahman, Md. Faiyaj Ahmed Limon, Md. Shahid Iqbal, Md. Fahad Jubayer, Md. Rabiul Karim, Md. Janibul Alam Soeb

    Published 2025-06-01
    “…It integrates FVSI with a Novel Collapse Prediction Index (NCPI) with the help of a switching function. Unlike conventional indices such as the Fast Voltage Stability Index (FVSI) and Line Stability Index (Lmn), which rely predominantly on reactive power-based predictions, MCPI relies on both active and reactive power, providing an improved indication of system stability and is utilized as the objective function for the optimal placement of SVCs. …”
    Get full text
    Article
  14. 654

    A Novel Multi-Agent-Based Approach for Train Rescheduling in Large-Scale Railway Networks by Jin Liu, Lei Chen, Zhongbei Tian, Ning Zhao, Clive Roberts

    Published 2025-07-01
    “…The computational results show that the MAS significantly outperforms FCFS and TTOE in the tested scenarios, yielding up to a 34.11% increase in network capacity as measured by the defined objective function, thus improving network line capacity.…”
    Get full text
    Article
  15. 655

    4D-printed intelligent reflecting surface with improved beam resolution via both phase modulation and space modulation by Kyounghwan Kim, Ratanak Phon, Eiyong Park, Sungjoon Lim

    Published 2024-10-01
    “…Abstract Recently, intelligent reflecting surfaces (IRSs) have emerged as potential candidates for overcoming the line-of-sight issue in 5 G/6 G wireless communication. …”
    Get full text
    Article
  16. 656

    Insulator discharge severity assessment algorithm based on RDIDSNet by Cheng Chi, Li Keyu, Yanhui Meng, Yang Yang, JiNing Zhao, Shaotong Pei, Haosen Sun

    Published 2025-04-01
    “…Firstly, LDConv is introduced to replace the convolution of the backbone network part of the network feature extraction, which effectively realizes the enhancement of the feature extraction ability of the algorithm in the case of model lightweighting; and then ACMix attention mechanism is introduced, which realizes better focusing of the model on the target with a very small performance loss; and finally, Shape-IoU is introduced to replace the loss function of the CIoU, which effectively improve the detection accuracy of the algorithm. …”
    Get full text
    Article
  17. 657

    KPMapNet: Keypoint Representation Learning for Online Vectorized High-Definition Map Construction by Bicheng Jin, Wenyu Hao, Wenzhao Qiu, Shanmin Pang

    Published 2025-03-01
    “…Moreover, a novel point-line matching loss function is introduced to further refine the training process. …”
    Get full text
    Article
  18. 658

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  19. 659

    BOLT LOOSENING ANGLE DETECTION METHOD BASED ON COLOR SEGMENTATION by KANG Jingjie, ZHANG Lijun, SUN Yuandong, YANG Xiaoyu, WANG Ruolan, ZHAO Tianhao

    Published 2025-05-01
    “…Firstly, a method for performing nonlinear stretching, normalization and optimal threshold segmentation on <italic>a</italic> component successively in the Lab color space was designed to segment and represent the red anti-loosening line image of the bolt loosening angle. …”
    Get full text
    Article
  20. 660

    MASS CONSCIOUSNESS OF RUSSIAN SOCIETY UNDER INFLUENCE OF ETHNONATIONAL VERSIONS OF THE HISTORICAL PAST by S. D. Savin

    Published 2018-02-01
    “…On the one hand it performs an integrative function, on the other hand it can become a source of confrontation and splits in the society and among peoples.…”
    Get full text
    Article