-
5201
A Deep Reinforcement-Learning-Based Route Optimization Model for Multi-Compartment Cold Chain Distribution
Published 2025-06-01“…Compared to a recent ant colony optimization algorithm, it achieves up to a 6.32% reduction in costs while being up to 1637 times faster in computation.…”
Get full text
Article -
5202
Adaptive enhancement of shoulder x-ray images using tissue attenuation and type-II fuzzy sets.
Published 2025-01-01“…The method integrates automatic tissue attenuation techniques, which enhance the image contrast by removing non-essential tissue components while preserving important tissues and bones. Additionally, we apply an improved Type-II fuzzy set algorithm to further optimize image sharpness. …”
Get full text
Article -
5203
Adaptive Localization in Wireless Sensor Network through Bayesian Compressive Sensing
Published 2015-08-01“…Furthermore, we provide adaptive iteration BCS localization (AIBCSL) algorithm, which is based on BCS and will choose measurement sensors according to the environment adaptively with only an initial value, while other frameworks require prior knowledge such as target numbers to choose measurements. …”
Get full text
Article -
5204
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
5205
Analytic field solution for machine learning integrating physics model and data driven approach
Published 2025-05-01“…We use a path integral method to find a field solution that calculates machine learning statistics while considering the physics model’s uncertainty, data limitations, geometry complexity, and mixed probability distributions due to field interactions. …”
Get full text
Article -
5206
Norwegian Endurance Athlete ECG Database
Published 2022-01-01“…The electrocardiograms are standard 12-lead resting ECGs, recorded for 10 seconds while the athlete's lay supine on a bench. …”
Get full text
Article -
5207
基于透视不变二值特征描述子的图像匹配算法
Published 2015-04-01“…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
Get full text
Article -
5208
Optimization of costs in the enterprise. Effective strategies for business
Published 2021-04-01“…The author offers an algorithm of actions for entrepreneurs who are ready to solve the optimization problem in a complex way.…”
Get full text
Article -
5209
Pekalongan Regency Tourism Recommendation System with Content based Filtering
Published 2025-01-01“…The method utilizes the TF-IDF algorithm to measure the weight of tourist attraction categories and cosine similarity to assess the similarity between attractions based on their categories. …”
Get full text
Article -
5210
In-Line and Off-Axis Hybrid Digital Holographic Imaging Method Based on Off-Axis Hologram Constraints
Published 2022-01-01“…We put forward a novel hybrid iterative algorithm to improve the imaging quality of digital holography. …”
Get full text
Article -
5211
基于平滑伪维格纳分布与阶次跟踪的汽车变速器啸叫噪声分析
Published 2014-01-01“…The smoothed pseudo Wigner-Ville distribution(SPWVD)and order tracking are applied in the analysis of gearbox whine noise.Firstly,the SPWVD algorithm is put forward for computer programming.Then,by using instantaneous frequency estimation method,the speed signal is extracted with SPWVD.Combined with Hermite interpolation polynomial,the equal angle interval resample of the noise signal is carried out in angular domain for order tracking.Finally,the timefrequency analysis and order tracking analysis of the 2nd shift noise are carried out by using SPWVD,while the qualitative analysis and quantitative analysis are used to research the feature of whine noise.It’s a new method for the study of automobile gearbox whine noise.…”
Get full text
Article -
5212
Throughput-Delay Trade-Off for Cognitive Radio Networks: A Convex Optimization Perspective
Published 2014-01-01“…It is proved that the maximum achievable throughput and the minimum transmission delay cannot be obtained simultaneously. An efficient algorithm is proposed to optimize the sensing bandwidth and the final decision threshold jointly such that the throughput is maximized while the delay is constrained. …”
Get full text
Article -
5213
Optimization of Smooth Trajectories for Two-Wheel Differential Robots Under Kinematic Constraints Using Clothoid Curves
Published 2025-05-01“…An improved and efficient RRT algorithm is employed for global navigation, while an adaptive clothoid curve is utilized for local trajectory smoothing. …”
Get full text
Article -
5214
A Spectral Collocation Technique for Riesz Fractional Chen-Lee-Liu Equation
Published 2021-01-01“…The first is the approach of the spatial variable, while the other is the approach of the temporal variable. …”
Get full text
Article -
5215
Self-Adaptive Alternating Direction Method of Multipliers for Image Denoising
Published 2024-11-01“…This adaptive technique autonomously adjusts variable penalty parameters to expedite algorithm convergence, thereby markedly boosting algorithmic performance. …”
Get full text
Article -
5216
Diagonal Hessian Approximation for Limited Memory Quasi-Newton via Variational Principle
Published 2013-01-01“…Some numerical results are also presented to illustrate the effectiveness of our approximating matrices when incorporated within the L-BFGS algorithm.…”
Get full text
Article -
5217
INPUTS ACCESSIBILITY AND EFFECTIVENESS OF GROWTH ENHANCEMENT SUPPORT SCHEME (GESS) IN SOUTHWEST NIGERIA
Published 2019-01-01“…In 2017, the equivalent of 56% of the value of the agricultural production generated was used for intermediary consumption, while the gross added value represented 44%. The present paper is looking at how a mathematical algorithm used to study the impact of the agricultural production on the GDP can represent a tool for analysing and assessing the evolution of the GDP..The conclusion of the article is that the current fluctuations of the agricultural production trigger variations of the GDP, which means that agriculture is maintaining its impact on the GDP.…”
Get full text
Article -
5218
PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS
Published 2015-04-01“…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
Get full text
Article -
5219
Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks
Published 2013-04-01“…This paper proposes an optimal mobile sensor-scheduling algorithm for recovering the failure sensors in hybrid wireless sensor networks (WSNs). …”
Get full text
Article -
5220
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article