-
4441
Robust Beamfocusing for Secure NFC with Imperfect CSI
Published 2025-02-01“…To tackle the power minimization problem, we propose an iterative algorithm that includes an additional constraint to ensure adherence to specified quality-of-service (QoS) metrics. …”
Get full text
Article -
4442
Online Tool Wear Monitoring via Long Short-Term Memory (LSTM) Improved Particle Filtering and Gaussian Process Regression
Published 2025-05-01“…However, traditional Gaussian Process Regression (GPR) models are constrained by linear assumptions, while conventional filtering algorithms struggle in noisy environments with low signal-to-noise ratios. …”
Get full text
Article -
4443
The balance between traffic control and economic development in tourist cities under the context of COVID-19: A case study of Xi'an, China.
Published 2024-01-01“…After determining the functional relationship between the control intensity and the number of tourists and the cumulative number of confirmed cases, the NSGA-II algorithm is employed to perform multi-objective optimization with consideration of the requirements for epidemic prevention and control and for economic development to get an appropriate traffic control intensity and suggest scientific traffic control measures. …”
Get full text
Article -
4444
ACQUIRED HAEMOPHILIA A: AN INTRIGUING DISEASE
Published 2020-06-01“…The disease is idiopathic in 44%-63% of cases, while in the others etiological factors are present. …”
Get full text
Article -
4445
Assessing the Impact of Climate Change on Winter Wheat Production in the North China Plain from 1980 to 2020
Published 2025-02-01“…This study uses the Random Forest (RF) algorithm to evaluate the effects of climate change on winter wheat yields in the North China Plain (1980–2020) and assess yield sensitivity to various climate indicators. …”
Get full text
Article -
4446
RL-MAB-Based Resource Allocation for Efficient Bandwidth Utilization in Industrial IoT Networks
Published 2025-01-01“…To address these challenges, this paper proposes a resource reallocation and scheduling update scheme that identifies and reallocates unutilized redundant resources by employing the Multi-Armed Bandit (MAB) algorithm-one of the representative reinforcement learning techniques focused on reward optimization-in IWSN environment where mobile and fixed devices are deployed together. …”
Get full text
Article -
4447
A novel mechanism-guided residual network for accurate modelling of scroll expander under noisy and sparse data conditions
Published 2025-08-01“…This framework is based on the architecture of residual network, where the mechanistic laws are embedded as constraints in the training of the network through an improved loss function. Then, a hybrid optimization algorithm is detailed, which can achieve efficient and accurate updating of the parameters of the network and mechanistic equations. …”
Get full text
Article -
4448
Dynamic externalities of basic medical insurance compensation, health capital accumulation, and economic growth
Published 2025-05-01“…BackgroundA strong healthcare system plays a vital role in reducing the financial burden on households while simultaneously promoting sustainable economic development. …”
Get full text
Article -
4449
On the Combination of Harmonics and Polynoms in Econometric Modeling of RUB/AZN Exchange Rate
Published 2022-11-01“…An increase/decrease in exchange rate pressure affects the likelihood of a ruble-manat crisis, while this phenomenon may negatively/positively affect the foreign trade balance and may make it difficult/easier to import resources, goods and services between countries. …”
Get full text
Article -
4450
River floating object detection with transformer model in real time
Published 2025-03-01“…The RT-DETR, a member of the DETR family, has notably addressed the speed limitations of its predecessors by utilizing a high-performance hybrid encoder that optimizes query selection. Building upon this foundation, we introduce the LR-DETR, a lightweight evolution of RT-DETR for river floating object detection. …”
Get full text
Article -
4451
A probability integral method modified model for accurately characterizing subsidence at the boundary of a mining area
Published 2025-07-01“…In response to this engineering issue, this paper analyzes the influence of PIM’s parameters change on the prediction results, based on which, the probability integral method modified model (PIM-MM) is established, the decreasing step fruit flies optimization algorithm (DS-FOA) used for parameters inversion is also proposed, which realizes the accurate subsidence prediction for the boundary of a mining area. …”
Get full text
Article -
4452
Integrated Thermal Management Strategy Using High-Value Prioritized Experience Replay Deep Reinforcement Learning for Battery Electric Vehicles
Published 2025-01-01“…In low-temperature environments, electric vehicles rely on effective thermal management strategies (TMS) to rapidly heat the battery to its optimal operating temperature while maintaining cabin temperature within a comfortable range. …”
Get full text
Article -
4453
Robust Sandstorm Image Restoration via Adaptive Color Correction and Saturation Line Prior-Based Dust Removal
Published 2025-02-01“…Enhancing the visibility of outdoor images under sandstorm conditions remains a significant challenge in computer vision due to the complex atmospheric interference caused by dust particles. While existing image enhancement algorithms perform well in mild sandstorm scenarios, they often struggle to produce satisfactory results in more severe conditions, where residual color casts and chromatic artifacts become pronounced. …”
Get full text
Article -
4454
Perbandingan Metode Penyelesaian Permasalahan Optimasi Lintas Domain dengan Pendekatan Hyper-Heuristic Menggunakan Algoritma Reinforcement-Late Acceptance
Published 2021-10-01“…In improving performance, this study examines the effect of the adaptation of the Reinforcement Learning (RL) algorithm as LLH selection combined with the Late Acceptance algorithm as a move acceptance. …”
Get full text
Article -
4455
Bilevel Programming Model of Urban Public Transport Network under Fairness Constraints
Published 2019-01-01“…The model in addition utilised the noninferior sorting genetic algorithm II to validate the model via a simple network. …”
Get full text
Article -
4456
Energy-Efficient Dual-Iteration Power Allocation for Two-Phase Relay System with Massive Antennas
Published 2014-01-01“…Numerical results show that the proposed DIPA algorithms can greatly improve EE while guaranteeing spectrum efficiency (SE) when compared with the equal power allocation algorithm. …”
Get full text
Article -
4457
Economic sizing and placement of hydrogen fueling and electric vehicles charging stations powered by renewable and battery systems in smart distribution network
Published 2025-09-01“…The solution is derived using Benders decomposition algorithm to achieve optimal results. The primary innovation highlighted in this paper includes integrating renewable resources and battery systems to power the refueling station, leveraging reactive power control for improved station performance, and addressing both operational and economic objectives in the distribution system. …”
Get full text
Article -
4458
Efficient automated detection of power quality disturbances using nonsubsampled contourlet transform & PCA-SVM
Published 2025-05-01“…Morphological component analysis (MCA) and the split-augmented Lagrangian shrinkage algorithm (SALSA) optimize this process. Principal component analysis (PCA) is applied to the extracted features to reduce dimensionality and improve feature separability. …”
Get full text
Article -
4459
Dynamic UAV Inspection Boosted by Vehicle Collaboration Under Harsh Conditions in the IoT Realm
Published 2025-04-01“…The simulation results show that KGTSA significantly cuts data collection time while maintaining flexibility. It efficiently manages speed and path uncertainties in complex weather, optimizing task efficiency without weather forecasts. …”
Get full text
Article -
4460
Enhancing Physical Layer Security in WPCNs With IRS and Controlled Jamming for 6G IoT Applications
Published 2025-01-01“…To address the non-convex nature of the problem, we develop an alternating optimization algorithm that decouples the problem into subproblems, ensuring efficient convergence to a locally optimal solution. …”
Get full text
Article