-
261
Enhancement of underwater acoustic signal based on denoising automatic-encoder
Published 2019-10-01“…Aiming at the difficulty of feature extraction of echo signal in active sonar,a self-encoder algorithm based on the combination of denoising self-encoder and convolution denoising self-encoder was proposed.Firstly,the preprocessing of noisy signal was carried out by using the advantage of denoising self-encoder in signal as a whole,and then the local feature of signal was optimized by combining convolutional denoising self-encoder to denoise the signal locally,so as to enhance the signal.The time domain waveform of the received signal is used as the feature input by the algorithm,and retains the signal’s amplitude and phase characteristics.The experimental results show that the algorithm not only effectively reduces the noise component in the signal,but also achieves better recovery effect in both time and frequency domains.…”
Get full text
Article -
262
Next generation network resource allocation method based on cooperative game and decision-making in advance
Published 2009-01-01“…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
Get full text
Article -
263
Prediction model of middle school student performance based on MBSO and MDBO-BP-Adaboost method
Published 2025-01-01“…Firstly, the model incorporates the good point set initialization, triangle wandering strategy and adaptive t-distribution strategy to obtain the Modified Dung Beetle Optimization Algorithm (MDBO), secondly, it uses MDBO to optimize the weights and thresholds of the BP neural network, and lastly, the optimized BP neural network is used as a weak learner for Adaboost. …”
Get full text
Article -
264
Design, modeling and manufacture error identification of a new 6-degree-of-freedom (6-DOF) compliant parallel manipulator
Published 2025-02-01“…The Levenberg–Marquardt optimization algorithm is utilized to solve the identification model, with the results verified through finite-element analysis. …”
Get full text
Article -
265
Modeling the Stability of the Housing and Construction Complex Based on Organizational and Economic Interaction of Entities
Published 2025-03-01“…A genetic algorithm in MATLAB was used for this purpose. Acceptable options for all participants were selected from a set of Pareto-optimal alternatives based on the preferences of the decision-maker. …”
Get full text
Article -
266
Identification and application of shale lithofacies based on conventional logging curves: A case study of the second member of Funing Formation in Qintong Sag, Subei Basin
Published 2024-10-01“…Additionally, a BP neural network method optimized by the ASO(Atom Search Optimization) algorithm was utilized to perform data mining on logging information. …”
Get full text
Article -
267
Energy Management Strategy Based on the Driving Cycle Model for Plugin Hybrid Electric Vehicles
Published 2014-01-01“…The state of charge (SOC) profile can be obtained by the DP algorithm for the whole driving cycle. In order to optimize the energy management strategy in the hybrid power system, the optimal motor torque control sequence can be calculated using the DP algorithm for the segments between the traffic intersections. …”
Get full text
Article -
268
Next generation network resource allocation method based on cooperative game and decision-making in advance
Published 2009-01-01“…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
Get full text
Article -
269
参数方程曲线的最优逼近算法及实现
Published 2008-01-01“…The features of single and double arc approximating,and combines the merits of two kinds of fitting are discussed. By the algorithm of approximating curve in optimizing three-point arc and mixing single and double arc in permission tolerance,smooth link of whole approximating arc with inflexion points and extreme value points is attained. …”
Get full text
Article -
270
Research on power system transformation based on edge node technology under the background of carbon neutrality
Published 2025-04-01“…In each island, the improved particle swarm optimization algorithm is used to reasonably distribute the power tasks, forming a novel power system with the coordinated planning of source-network-load-storage as the core. …”
Get full text
Article -
271
Research on deep reinforcement learning based intelligent shop scheduling method
Published 2022-03-01“…The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.…”
Get full text
Article -
272
Swarm Robot Exploration Strategy for Path Formation Tasks Inspired by Physarum polycephalum
Published 2021-01-01“…For the research of swarm robotics, our algorithm not only can lead multirobot as a whole to overcome the limitations of very simple individual agents but also can offer better performance in terms of search efficiency and success rate. …”
Get full text
Article -
273
Detection of child depression using machine learning methods.
Published 2021-01-01“…<h4>Background</h4>Mental health problems, such as depression in children have far-reaching negative effects on child, family and society as whole. It is necessary to identify the reasons that contribute to this mental illness. …”
Get full text
Article -
274
INCREASED COMPETITIVENESS OF CONSTRUCTION ENTERPRISES ON THE BASIS OF ORGANISATIONAL-ECONOMIC DECISIONS OF PERSONNEL POTENTIAL MANAGEMENT
Published 2017-12-01“…The development of an algorithm for optimising the formation and use of human resources of a construction enterprise.Methods. …”
Get full text
Article -
275
Enhanced flux potential analysis links changes in enzyme expression to metabolic flux
Published 2025-02-01“…Our approach outperforms alternatives by striking an optimal balance, evaluating enzyme expression at pathway level, rather than either single-reaction or whole-network levels.…”
Get full text
Article -
276
QoS Routing in Telecommunications Networks
Published 2022-06-01“…The existing routing algorithms have been developed quite fully and, on the whole, function effectively if the optimization of the route selection is carried out according to one parameter. …”
Get full text
Article -
277
Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants
Published 2022-01-01“…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
Get full text
Article -
278
A Full-Life-Cycle Modeling Framework for Cropland Abandonment Detection Based on Dense Time Series of Landsat-Derived Vegetation and Soil Fractions
Published 2025-06-01“…Compared to the traditional yearly land cover-based approach (with an overall accuracy of 77.39%), this algorithm can overcome the propagation of classification errors (with product accuracy from 74.47% to 85.11%), especially in terms of improving the ability to capture changes at finer spatial scales. …”
Get full text
Article -
279
DETERMINATION OF TEMPERATURE-TIME PARAMETERS OF GROWING SINGLE CRYSTALS β-BaB<sub>2</sub>O<sub>4</sub> BY MODIFIED CZOCHRALSKI METHOD
Published 2019-06-01“…The aim of this work is to find of the mechanism the determination of optimal temperature-time mode of crystallization during the whole process of β-BaB2O4 crystal growth by modified Czochralski method. …”
Get full text
Article -
280
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article