-
5881
Optimal Utilization of Ports’ Free-of-Charge Times in One Distribution Center and Multiple Ports Inventory Systems
Published 2019-01-01“…Inventory management for the distribution system is to determine the order intervals of the DC and the retailers while minimizing the inventory ordering and holding costs. …”
Get full text
Article -
5882
Kinematic calibration and accuracy compensation method for embodied intelligent disinfection robot
Published 2025-03-01“…Third, an error identification algorithm based on least square method is proposed, and the identification is realized by sampling data. …”
Get full text
Article -
5883
Application-centric congestion control
Published 2025-06-01“…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
Get full text
Article -
5884
Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models
Published 2024-01-01“…This single-signal approach allows the algorithm to accurately classify data without being distracted by different types of signals, in addition to eliminating the curse of dimensionality. …”
Get full text
Article -
5885
MASALAH EIGEN DAN EIGENMODE MATRIKS ATAS ALJABAR MIN-PLUS
Published 2021-12-01“…The representation matrix of a strongly connected graph is called an irreducible matrix, while the representation matrix of a graph that is not strongly connected is called a reduced matrix. …”
Get full text
Article -
5886
Classification of wheat flour levels in powdered spices using visual imaging
Published 2024-12-01“…An image processing algorithm was designed and codded in MATLAB software to process the acquired images. …”
Get full text
Article -
5887
Current Status and Future Potential of Machine Learning in Diagnostic Imaging of Endometriosis : A Literature Review
Published 2025-02-01“…The machine learning algorithm first computes the image characteristics deemed significant for making predictions or diagnoses about unseen images. …”
Get full text
Article -
5888
Understanding dimensions of trust in AI through quantitative cognition: Implications for human-AI collaboration.
Published 2025-01-01“…We collected data from finance and business administration interns using surveys and the After-Action Review method and analyzed them using the gradient descent algorithm. The findings reveal a dual effect of trust in AI on cognition: while functional and emotional trust enhance higher-order cognition, the transparency dimension of cognitive trust inhibits cognitive processes. …”
Get full text
Article -
5889
A new method for the dynamic mesh stiffness calculation of spur gear under centrifugal effect
Published 2025-06-01“…Based on Euler beam theory,a original computational algorithm was proposed to calculate the dynamic mesh stiffness of spur gears considering driven-speed effects by introducing centrifugal effects into the velocity field. …”
Get full text
Article -
5890
Optimizing Power Flow in Photovoltaic-Hybrid Energy Storage Systems: A PSO and DPSO Approach for PI Controller Tuning
Published 2025-01-01“…The proposed control scheme is based on proportional-integral (PI) controllers optimized with particle swarm optimization (PSO) and duplicate particle swarm optimization (DPSO) algorithms. The aim is to reduce peak current and the energy management system’s response time while enhancing the system’s stability during the charging and discharging of the HSS under various operating conditions. …”
Get full text
Article -
5891
Localization with signal-based signature distance
Published 2017-11-01“…Existing range-free localization approaches suffer from precision limit of positioning, while range-based solutions may obtain good accuracy but pay high costs for ranging hardware. …”
Get full text
Article -
5892
Advancing Seabed Bedform Mapping in the Kuźnica Deep: Leveraging Multibeam Echosounders and Machine Learning for Enhanced Underwater Landscape Analysis
Published 2025-01-01“…The study highlights the importance of using a reduced set of relevant features for training models, as identified by the Boruta algorithm, to improve accuracy and robustness. Key geomorphometric features were crucial for seafloor composition mapping, while textural features were less significant. …”
Get full text
Article -
5893
Layout Optimization of Campus Bike-Sharing Parking Spots
Published 2020-01-01“…The results show that, after optimizing the layout of parking spots, the average travel time of users is reduced by 6.0%, and the total construction cost is reduced by 27.3%. While being convenient for campus bike-sharing users, it also provides scientific decision-making support for the campus traffic management.…”
Get full text
Article -
5894
Kinematic calibration and accuracy compensation method for embodied intelligent disinfection robot
Published 2025-03-01“…Third, an error identification algorithm based on least square method is proposed, and the identification is realized by sampling data. …”
Get full text
Article -
5895
Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying
Published 2012-11-01“…An opportunistic spectrum sharing protocol based on OFDM cooperation relaying was proposed.When the primary user experiences weak channel conditions,it could not achieve its target rate.If the cognitive user could help the primary user achieve its target rate,it accessed the pectrum of the primary user in the cooperation way.In this access way,the cognitive user used a fraction of the subcarriers to amplify-and-forward the signal of the primary user,to help the primary user achieve its target rate.And uses the remained subcarriers to transmit its own signal.The resource allocation was analyzed in this cooperation way.An optimal resource allocation algorithm based on dual ethod was proposed,which maximized the rate of the cognitive user while g anteeing the primary user achieve its target rate.If the cognitive user could not help the primary user achieve its target rate,to make use the spectrum efficiently,the cognitive user accessed the spectrum of the primary user in the non-cooperation way,and uses the whole accessed spectrum to transmit its own signal.The simulation demonstrates the efficiency of the proposed spectrum sharing protocol as well as its benefit to both primary and cognitive user.…”
Get full text
Article -
5896
Fast segmentation of stained nuclei in terabyte-scale, time resolved 3D microscopy image stacks.
Published 2014-01-01“…We evaluate the quality of the obtained segmentation results on a set of real and simulated benchmark images in 2D and 3D and show the algorithm's superior performance compared to other state-of-the-art algorithms. …”
Get full text
Article -
5897
Many-to-Many Multicast Routing Schemes under a Fixed Topology
Published 2013-01-01“…The paper focuses on the case where all users share a common communication channel while each user is both a sender and a receiver of messages in multicasting as well as an end user. …”
Get full text
Article -
5898
Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy
Published 2025-01-01“…Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
Get full text
Article -
5899
Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET
Published 2025-03-01“…Data aggregation is secured through a Two-Step Secure (STS) method and Elliptic Curve Cryptography (ECC), while optimal routing is achieved using the Improved Elephant Herd Optimization (IEHO) algorithm. …”
Get full text
Article -
5900
Energy Efficient Design for Two-Way AF Relay Networks
Published 2014-01-01“…In this paper, we consider a system where two source nodes communicate with each other via an amplify-and-forward (AF) relay node and study the power allocation schemes to maximize EE while ensuring a certain data rate. We propose an optimal energy-efficient power allocation algorithm based on iterative search technique. …”
Get full text
Article