-
641
Research on Adaptive Back-stepping Control of Harmonic Drive Based on the RBF Neural Network
Published 2023-08-01“…Based on the test data, the parameters of the model are identified by the least square method. Radial basis function (RBF) neural network is used to approximate the nonlinear friction and external uncertain disturbance torque of the system on-line, and an adaptive inversion controller based on RBF neural network is proposed. …”
Get full text
Article -
642
Implementación de alternativa de secado en el proceso de fabricación de aire medicinal comprimido en Norte de Santander
Published 2024-05-01“…The project was carried out in three phases: the first was the study of technical alternatives in the drying process for the manufacture of compressed medical air; the second involved the implementation of the best alternative, along with the validation of the addition of the drying system through the application of process qualification and validation protocols , along with their revalidation; and the last phase corresponded to the evaluation of the project using indicators. Greater performance in these filters avoided constant depressurization of the production line, repetitive filter changes, and abundant filter waste, generating an impact on the production of compressed medical air. …”
Get full text
Article -
643
VOLTAGE PROFILE IMPROVEMENT WITH APPLICATION OF DIFFERENTLY OPTIMIZED FACTS CONTROLLERS
Published 2024-12-01“…The algorithm simultaneously solved the objective problem and augments device parameters as it searches for the best FACTS location and sizes. Objective function was resolved Security Constrained Optimal Load Flow (SCOLF) with the integration FACTS power electronics controllers for TTC without violating active and reactive power generation confines, voltage boundaries, line flow limits, and FACTS devices operation restrictions and ratings. …”
Get full text
Article -
644
Spatial multiplexing in near field MIMO channels with reconfigurable intelligent surfaces
Published 2023-03-01“…With the aid of extensive numerical simulations in line‐of‐sight (free‐space) channels, we show that the proposed approach offers performance (rate and degrees of freedom) close to that obtained by numerically solving non‐convex optimization problems at a high computational complexity. …”
Get full text
Article -
645
Civic Virtue in the Deliberative System
Published 2019-04-01“…In this article I offer a response to this line of argument. There is no good philosophical reason to suppose that only unitary deliberation can perform an educative function for citizens. …”
Get full text
Article -
646
Extracorporeal ultrasound exposure by the low-frequency acoustic amplitude-modulated signal on a ureteral stent for preventing its incrustation: experimental determination of optim...
Published 2021-10-01“…The pulsed mode of the device function is most safe. The optimal application points of the instrument emitter for the ureteral upper and middle thirds is the posterior axillary line, and for the ureteral lower third is the middle axillary line.…”
Get full text
Article -
647
Development and validation of a predictive model for postoperative hepatic dysfunction in Stanford type A aortic dissection
Published 2025-07-01“…The calibration curve shows that the bias corrected line is close to the ideal line. The DCA curve indicates that the use of the nomogram provides greater net clinical benefit. …”
Get full text
Article -
648
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
Published 2021-12-01“…Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. …”
Get full text
Article -
649
Trajectory Tracking of a Wall-Climbing Cutting Robot Based on Kinematic and PID Joint Optimization
Published 2025-03-01“…Simulations verify that the control law performs well in tracking both straight-line and circular trajectories. …”
Get full text
Article -
650
Integrated analysis of microbiome and transcriptome reveals the mechanisms underlying the chlorogenic acid-mediated attenuation of oxidative stress and systemic inflammatory respon...
Published 2025-06-01“…A total of 360 55-week-old Hy-line white-laying hens were randomly selected and divided into four groups. …”
Get full text
Article -
651
A LSTM-RNN-Assisted Vector Tracking Loop for Signal Outage Bridging
Published 2020-01-01“…Some methods have been developed for enhancing the GNSS performance in signal challenging environments (urban canyon, dense foliage, signal blockage, multipath, and none-line-of-sight signals). …”
Get full text
Article -
652
Visual integration deficits associated with psychosis are independent of diagnosis
Published 2025-04-01“…The findings are also consistent with cognitive factors playing a potential role in JOVI performance and highlight the difficulty in teasing apart altered perceptual and cognitive function in psychiatric patient groups.…”
Get full text
Article -
653
Optimizing SVC placement for enhanced voltage stability using a novel index and hybrid ABC-PSO algorithm
Published 2025-06-01“…It integrates FVSI with a Novel Collapse Prediction Index (NCPI) with the help of a switching function. Unlike conventional indices such as the Fast Voltage Stability Index (FVSI) and Line Stability Index (Lmn), which rely predominantly on reactive power-based predictions, MCPI relies on both active and reactive power, providing an improved indication of system stability and is utilized as the objective function for the optimal placement of SVCs. …”
Get full text
Article -
654
A Novel Multi-Agent-Based Approach for Train Rescheduling in Large-Scale Railway Networks
Published 2025-07-01“…The computational results show that the MAS significantly outperforms FCFS and TTOE in the tested scenarios, yielding up to a 34.11% increase in network capacity as measured by the defined objective function, thus improving network line capacity.…”
Get full text
Article -
655
4D-printed intelligent reflecting surface with improved beam resolution via both phase modulation and space modulation
Published 2024-10-01“…Abstract Recently, intelligent reflecting surfaces (IRSs) have emerged as potential candidates for overcoming the line-of-sight issue in 5 G/6 G wireless communication. …”
Get full text
Article -
656
Insulator discharge severity assessment algorithm based on RDIDSNet
Published 2025-04-01“…Firstly, LDConv is introduced to replace the convolution of the backbone network part of the network feature extraction, which effectively realizes the enhancement of the feature extraction ability of the algorithm in the case of model lightweighting; and then ACMix attention mechanism is introduced, which realizes better focusing of the model on the target with a very small performance loss; and finally, Shape-IoU is introduced to replace the loss function of the CIoU, which effectively improve the detection accuracy of the algorithm. …”
Get full text
Article -
657
KPMapNet: Keypoint Representation Learning for Online Vectorized High-Definition Map Construction
Published 2025-03-01“…Moreover, a novel point-line matching loss function is introduced to further refine the training process. …”
Get full text
Article -
658
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
659
BOLT LOOSENING ANGLE DETECTION METHOD BASED ON COLOR SEGMENTATION
Published 2025-05-01“…Firstly, a method for performing nonlinear stretching, normalization and optimal threshold segmentation on <italic>a</italic> component successively in the Lab color space was designed to segment and represent the red anti-loosening line image of the bolt loosening angle. …”
Get full text
Article -
660
MASS CONSCIOUSNESS OF RUSSIAN SOCIETY UNDER INFLUENCE OF ETHNONATIONAL VERSIONS OF THE HISTORICAL PAST
Published 2018-02-01“…On the one hand it performs an integrative function, on the other hand it can become a source of confrontation and splits in the society and among peoples.…”
Get full text
Article