Showing 5,881 - 5,900 results of 12,962 for search 'while algorithm', query time: 0.16s Refine Results
  1. 5881

    Optimal Utilization of Ports’ Free-of-Charge Times in One Distribution Center and Multiple Ports Inventory Systems by Zhengyi Li

    Published 2019-01-01
    “…Inventory management for the distribution system is to determine the order intervals of the DC and the retailers while minimizing the inventory ordering and holding costs. …”
    Get full text
    Article
  2. 5882

    Kinematic calibration and accuracy compensation method for embodied intelligent disinfection robot by CHENG Jun, FAN Weilong, SHAO Jinyan, ZHOU Xuemei

    Published 2025-03-01
    “…Third, an error identification algorithm based on least square method is proposed, and the identification is realized by sampling data. …”
    Get full text
    Article
  3. 5883

    Application-centric congestion control by Danny De Vleeschauwer, Chia-Yu Chang, Koen De Schepper, Chrysa Papagianni

    Published 2025-06-01
    “…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
    Get full text
    Article
  4. 5884

    Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models by Elham Abdullah Alamoudi

    Published 2024-01-01
    “…This single-signal approach allows the algorithm to accurately classify data without being distracted by different types of signals, in addition to eliminating the curse of dimensionality. …”
    Get full text
    Article
  5. 5885

    MASALAH EIGEN DAN EIGENMODE MATRIKS ATAS ALJABAR MIN-PLUS by Eka Widia Rahayu, Siswanto Siswanto, Santoso Budi Wiyono

    Published 2021-12-01
    “…The representation matrix of a strongly connected graph is called an irreducible matrix, while the representation matrix of a graph that is not strongly connected is called a reduced matrix. …”
    Get full text
    Article
  6. 5886

    Classification of wheat flour levels in powdered spices using visual imaging by Kamran Kheiralipour, Mohammad Hossein Nargesi

    Published 2024-12-01
    “…An image processing algorithm was designed and codded in MATLAB software to process the acquired images. …”
    Get full text
    Article
  7. 5887

    Current Status and Future Potential of Machine Learning in Diagnostic Imaging of Endometriosis : A Literature Review by Palpasa Shrestha, Bibek Shrestha, Jati Shrestha, Jun Chen

    Published 2025-02-01
    “…The machine learning algorithm first computes the image characteristics deemed significant for making predictions or diagnoses about unseen images. …”
    Get full text
    Article
  8. 5888

    Understanding dimensions of trust in AI through quantitative cognition: Implications for human-AI collaboration. by Weizheng Jiang, Dongqin Li, Chun Liu

    Published 2025-01-01
    “…We collected data from finance and business administration interns using surveys and the After-Action Review method and analyzed them using the gradient descent algorithm. The findings reveal a dual effect of trust in AI on cognition: while functional and emotional trust enhance higher-order cognition, the transparency dimension of cognitive trust inhibits cognitive processes. …”
    Get full text
    Article
  9. 5889

    A new method for the dynamic mesh stiffness calculation of spur gear under centrifugal effect by ZHANG Xiaocui, MO Guoyin, LIU Fuhao, ZHANG Jianqiang, JIANG Hanjun, ZHANG Jielu

    Published 2025-06-01
    “…Based on Euler beam theory,a original computational algorithm was proposed to calculate the dynamic mesh stiffness of spur gears considering driven-speed effects by introducing centrifugal effects into the velocity field. …”
    Get full text
    Article
  10. 5890

    Optimizing Power Flow in Photovoltaic-Hybrid Energy Storage Systems: A PSO and DPSO Approach for PI Controller Tuning by Samira Heroual, Belkacem Belabbas, Yasser Diab, Mohamed Metwally Mahmoud, Tayeb Allaoui, Naima Benabdallah

    Published 2025-01-01
    “…The proposed control scheme is based on proportional-integral (PI) controllers optimized with particle swarm optimization (PSO) and duplicate particle swarm optimization (DPSO) algorithms. The aim is to reduce peak current and the energy management system’s response time while enhancing the system’s stability during the charging and discharging of the HSS under various operating conditions. …”
    Get full text
    Article
  11. 5891

    Localization with signal-based signature distance by Pengpeng Chen, Yuqing Yin, Shouwan Gao, Qiang Niu

    Published 2017-11-01
    “…Existing range-free localization approaches suffer from precision limit of positioning, while range-based solutions may obtain good accuracy but pay high costs for ranging hardware. …”
    Get full text
    Article
  12. 5892

    Advancing Seabed Bedform Mapping in the Kuźnica Deep: Leveraging Multibeam Echosounders and Machine Learning for Enhanced Underwater Landscape Analysis by Łukasz Janowski

    Published 2025-01-01
    “…The study highlights the importance of using a reduced set of relevant features for training models, as identified by the Boruta algorithm, to improve accuracy and robustness. Key geomorphometric features were crucial for seafloor composition mapping, while textural features were less significant. …”
    Get full text
    Article
  13. 5893

    Layout Optimization of Campus Bike-Sharing Parking Spots by Tangyi Guo, Jie Yang, Liu He, Kun Tang

    Published 2020-01-01
    “…The results show that, after optimizing the layout of parking spots, the average travel time of users is reduced by 6.0%, and the total construction cost is reduced by 27.3%. While being convenient for campus bike-sharing users, it also provides scientific decision-making support for the campus traffic management.…”
    Get full text
    Article
  14. 5894

    Kinematic calibration and accuracy compensation method for embodied intelligent disinfection robot by CHENG Jun, FAN Weilong, SHAO Jinyan, ZHOU Xuemei

    Published 2025-03-01
    “…Third, an error identification algorithm based on least square method is proposed, and the identification is realized by sampling data. …”
    Get full text
    Article
  15. 5895

    Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying by Wei-dang LU, Xuan-li WU, Xue-jun SHA, Nai-tong ZHANG

    Published 2012-11-01
    “…An opportunistic spectrum sharing protocol based on OFDM cooperation relaying was proposed.When the primary user experiences weak channel conditions,it could not achieve its target rate.If the cognitive user could help the primary user achieve its target rate,it accessed the pectrum of the primary user in the cooperation way.In this access way,the cognitive user used a fraction of the subcarriers to amplify-and-forward the signal of the primary user,to help the primary user achieve its target rate.And uses the remained subcarriers to transmit its own signal.The resource allocation was analyzed in this cooperation way.An optimal resource allocation algorithm based on dual ethod was proposed,which maximized the rate of the cognitive user while g anteeing the primary user achieve its target rate.If the cognitive user could not help the primary user achieve its target rate,to make use the spectrum efficiently,the cognitive user accessed the spectrum of the primary user in the non-cooperation way,and uses the whole accessed spectrum to transmit its own signal.The simulation demonstrates the efficiency of the proposed spectrum sharing protocol as well as its benefit to both primary and cognitive user.…”
    Get full text
    Article
  16. 5896

    Fast segmentation of stained nuclei in terabyte-scale, time resolved 3D microscopy image stacks. by Johannes Stegmaier, Jens C Otte, Andrei Kobitski, Andreas Bartschat, Ariel Garcia, G Ulrich Nienhaus, Uwe Strähle, Ralf Mikut

    Published 2014-01-01
    “…We evaluate the quality of the obtained segmentation results on a set of real and simulated benchmark images in 2D and 3D and show the algorithm's superior performance compared to other state-of-the-art algorithms. …”
    Get full text
    Article
  17. 5897

    Many-to-Many Multicast Routing Schemes under a Fixed Topology by Wei Ding, Hongfa Wang, Xuerui Wei

    Published 2013-01-01
    “…The paper focuses on the case where all users share a common communication channel while each user is both a sender and a receiver of messages in multicasting as well as an end user. …”
    Get full text
    Article
  18. 5898

    Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy by Mehrshad Eskandarpour, Hossein Soleimani

    Published 2025-01-01
    “…Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
    Get full text
    Article
  19. 5899

    Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET by V R. Sugumaran, E. Dinesh, R. Ramya, Elangovan Muniyandy

    Published 2025-03-01
    “…Data aggregation is secured through a Two-Step Secure (STS) method and Elliptic Curve Cryptography (ECC), while optimal routing is achieved using the Improved Elephant Herd Optimization (IEHO) algorithm. …”
    Get full text
    Article
  20. 5900

    Energy Efficient Design for Two-Way AF Relay Networks by Yong Li, Zhengguang Zheng, Mingyue Zhao, Yunli Chen, Chuanyong Liu

    Published 2014-01-01
    “…In this paper, we consider a system where two source nodes communicate with each other via an amplify-and-forward (AF) relay node and study the power allocation schemes to maximize EE while ensuring a certain data rate. We propose an optimal energy-efficient power allocation algorithm based on iterative search technique. …”
    Get full text
    Article