-
521
Intra-landscape distribution of snow storage in the Mayma river basin (low-mountain area of the Russian Altai)
Published 2019-09-01“…This algorithm may be used in the studies of snow accumulation in low-mountain forest landscapes. …”
Get full text
Article -
522
Evaluation of Human Action Based on Feature-Weighted Dynamic Time Warping
Published 2024-11-01“…Firstly, we collected human skeletal key-point data based on a depth camera and processed these data with gap filling and filtering; then, the effective data segments were segmented from the whole action dataset, angle and distance features were extracted, and the feature matrix was obtained; then, we used the Euclidean Barycenter Dynamic Time Warping–Barycenter Averaging algorithm to produce action templates; finally, we proposed a Feature-Weighted Dynamic Time Warping algorithm to calculate the similarity between the detected action and the template action and established an action achievement score mechanism to evaluate the rehabilitation action. …”
Get full text
Article -
523
A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing
Published 2013-01-01“…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
Get full text
Article -
524
On optimum multi‐input multi‐output radar signal design: Ambiguity function, manifold structure and duration‐bandwidth
Published 2021-02-01“…Comparing the designs using ED and RD, we find that the convergence of the algorithm can be significantly faster when optimising over the manifold (RD) than when optimising over the whole space (ED). …”
Get full text
Article -
525
Robotized 3D Scanning and Alignment Method for Dimensional Qualification of Big Parts Printed by Material Extrusion
Published 2024-12-01“…The complete system validates an in-house algorithm, which inspects the whole reconstructed part, acquiring several views from different poses, and makes the alignment with the theoretical model of the geometry of big parts manufactured by 3D printing. …”
Get full text
Article -
526
Model Predictive Control Method for Autonomous Vehicles Using Time-Varying and Non-Uniformly Spaced Horizon
Published 2021-01-01“…This paper proposes an algorithm for path-following and collision avoidance of an autonomous vehicle based on model predictive control (MPC) using time-varying and non-uniformly spaced horizon. …”
Get full text
Article -
527
Efficient Simulation of LWD Azimuthal Propagation Resistivity Tool in Layered TI Formation Based on 3-D Finite Volume Method of Coupled Potentials in the Half Space and Continuatio...
Published 2024-01-01“…We thus try to decompose the whole solution domain into two symmetric sub-regions. …”
Get full text
Article -
528
Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill
Published 2018-01-01“…Traditional methods always characterize fault feature using a single fault vector, which may fail to reveal whole fault influences caused by complex process disturbances. …”
Get full text
Article -
529
Two-Sided Matching on Comprehensive Transportation Network Emergency Vehicles’ Allocation
Published 2021-01-01“…In emergency rescue, the allocation of comprehensive transportation network emergency vehicles often affects the efficiency of the whole rescue process. In the context of disasters, this paper researches the one-to-many two-sided matching problem between the emergency vehicles and the materials to be transported. …”
Get full text
Article -
530
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01“…Existing intrusion path studies based on attack graph lack consideration of factors other than basic network environment information when calculating the state transition probability.In order to analyze the security of target network comprehensively and reasonably, a network attack analysis method based on attack graph of absorbing Markov chain was proposed.Firstly, a state transition probability normalization algorithm based on vulnerability life cycle was proposed based on attack graph.Secondly, the attack graph was mapped to the absorbing Markov chain and the state transition probability matrix was given.Finally, the state transition probability matrix was calculated to comprehensively analyze the node threat degree, attack path length and expected impact of the target network.The results show that the proposed method can effectively analyze the expected influence of node threat degree, attack path length and vulnerability life cycle on the whole network, which is helpful for security research personnel to better understand the security state of the network.…”
Get full text
Article -
531
Regulation of replication timing in Saccharomyces cerevisiae.
Published 2025-06-01“…Here, we present a high (1-kilobase) resolution stochastic model of Saccharomyces cerevisiae whole-genome replication in which origins compete to associate with limited firing factors. …”
Get full text
Article -
532
Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks
Published 2011-01-01“…Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs).…”
Get full text
Article -
533
Application of 3D Scanning Technology for Evaluation of Virtual Model of Gun Geometry
Published 2018-03-01“…The paper presents the results of reconstruction of selected gun elements with application of 3D scanning technology. Algorithm of under investigation process, the way of preparing object for scanning and measuring process were also presented. …”
Get full text
Article -
534
A Traffic Restriction Scheme for Enhancing Carpooling
Published 2017-01-01“…However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.…”
Get full text
Article -
535
Refphase: Multi-sample phasing reveals haplotype-specific copy number heterogeneity.
Published 2023-10-01“…We introduce Refphase, an algorithm that leverages this multi-sampling approach to infer haplotype-specific copy numbers through multi-sample phasing. …”
Get full text
Article -
536
Design and Analysis of Parallel Adjusting Equipment of Vertical Drilling
Published 2015-01-01“…Focusing on the current limited vertical adjustment technique of large-scale drillings,a 6-DOF parallel adjustment equipment with 12 inputs is designed for the working condition of vertical drilling.The equipment mechanism consists of 6branched chains with redundancy which are symmetrical in structure.Each of the chains is composed by a compound of rotate joint and a compound of spherical joint,while the two pairs are connected by two prismatic pairs.The modal analysis is carried out on the body which is based on ANSYS software,first six order frequency distribution and modal vibration mode,and along the X、Y、Zdirection of the displacement frequency response about the moving platform are got.The analysis consequence shows that the most sensitive of external forces to the moving platform is 46 Hz frequency.Otherwise,the working space of the 6-DOF platform is obtained by using the 3-D searching algorithm.The results have significant meanings in the further research on the correlation between the parameters and the whole mechanism,as well as the optimization of the parameter.…”
Get full text
Article -
537
Congestion Influence on Optimal Bidding in a Competitive Electricity Market using Particle Swarm Optimization
Published 2024-02-01“…The effectiveness of the proposed method is tested with a numerical example and the results are compared with Genetic Algorithm (GA) approach. The results shows that PSO takes less computational time and maximizing the social welfare compared to GA approach.…”
Get full text
Article -
538
Assessment of technological capabilities to counter fraudulent practices in the banking sector
Published 2022-11-01“…The purpose of the article is to assess the possibility of using machine learning technology by banks and develop an algorithm for detecting fraudulent transactions based on programming. …”
Get full text
Article -
539
Multitarget Tracking by Particle Filtering Based on RSS Measurement in Wireless Sensor Networks
Published 2015-05-01“…We propose an algorithm for multitarget tracking by particle filtering in wireless sensor networks based on received signal strength (RSS) measurement where we also localize a newly appearing target whose location and reference power are unknown. …”
Get full text
Article -
540
RESEARCH ON ACOUSTIC RADIATION CHARACTRRISTICS OF PERIODIC PERFORATED DAMPING SANDWICH PLATE
Published 2015-01-01“…Base on the principle of damping reduction vibration and reference the periodic boundary conditions,through the acoustic bridge vibration energy transfer, this paper established a double-layer plate with the opening damping model;Considering the frequency-dependent properties of viscoelastic,through the finite element and boundary element numerical algorithm of calculating the radiation sound power,analyzes the periodic perforated damped sandwich plate structure acoustic radiation characteristics. …”
Get full text
Article