Search alternatives:
whole » while (Expand Search)
Showing 261 - 280 results of 388 for search 'whole optimization algorithm', query time: 0.10s Refine Results
  1. 261

    Enhancement of underwater acoustic signal based on denoising automatic-encoder by Jingwei YIN, Wuxiong LUO, Li LI, Xiao HAN, Longxiang GUO, Jianfeng WANG

    Published 2019-10-01
    “…Aiming at the difficulty of feature extraction of echo signal in active sonar,a self-encoder algorithm based on the combination of denoising self-encoder and convolution denoising self-encoder was proposed.Firstly,the preprocessing of noisy signal was carried out by using the advantage of denoising self-encoder in signal as a whole,and then the local feature of signal was optimized by combining convolutional denoising self-encoder to denoise the signal locally,so as to enhance the signal.The time domain waveform of the received signal is used as the feature input by the algorithm,and retains the signal’s amplitude and phase characteristics.The experimental results show that the algorithm not only effectively reduces the noise component in the signal,but also achieves better recovery effect in both time and frequency domains.…”
    Get full text
    Article
  2. 262

    Next generation network resource allocation method based on cooperative game and decision-making in advance by RAO Xiang, ZHANG Shun-yi, SUN Yan-fei, DING Wen-tao

    Published 2009-01-01
    “…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
    Get full text
    Article
  3. 263

    Prediction model of middle school student performance based on MBSO and MDBO-BP-Adaboost method by Rencheng Fang, Tao Zhou, Baohua Yu, Zhigang Li, Long Ma, Tao Luo, Yongcai Zhang, Xinqi Liu

    Published 2025-01-01
    “…Firstly, the model incorporates the good point set initialization, triangle wandering strategy and adaptive t-distribution strategy to obtain the Modified Dung Beetle Optimization Algorithm (MDBO), secondly, it uses MDBO to optimize the weights and thresholds of the BP neural network, and lastly, the optimized BP neural network is used as a weak learner for Adaboost. …”
    Get full text
    Article
  4. 264

    Design, modeling and manufacture error identification of a new 6-degree-of-freedom (6-DOF) compliant parallel manipulator by H. Li, W. Chen, L. Yi, C. Leng, H. Wu

    Published 2025-02-01
    “…The Levenberg–Marquardt optimization algorithm is utilized to solve the identification model, with the results verified through finite-element analysis. …”
    Get full text
    Article
  5. 265

    Modeling the Stability of the Housing and Construction Complex Based on Organizational and Economic Interaction of Entities by N. N. Shelomentseva, O. V. Grushina

    Published 2025-03-01
    “…A genetic algorithm in MATLAB was used for this purpose. Acceptable options for all participants were selected from a set of Pareto-optimal alternatives based on the preferences of the decision-maker. …”
    Get full text
    Article
  6. 266

    Identification and application of shale lithofacies based on conventional logging curves: A case study of the second member of Funing Formation in Qintong Sag, Subei Basin by WANG Xinqian, YU Wenduan, MA Xiaodong, ZHOU Tao, TAI Hao, CUI Qinyu, DENG Kong, LU Yongchao, LIU Zhanhong

    Published 2024-10-01
    “…Additionally, a BP neural network method optimized by the ASO(Atom Search Optimizationalgorithm was utilized to perform data mining on logging information. …”
    Get full text
    Article
  7. 267

    Energy Management Strategy Based on the Driving Cycle Model for Plugin Hybrid Electric Vehicles by Xiaoling Fu, Huixuan Wang, Naxin Cui, Chenghui Zhang

    Published 2014-01-01
    “…The state of charge (SOC) profile can be obtained by the DP algorithm for the whole driving cycle. In order to optimize the energy management strategy in the hybrid power system, the optimal motor torque control sequence can be calculated using the DP algorithm for the segments between the traffic intersections. …”
    Get full text
    Article
  8. 268

    Next generation network resource allocation method based on cooperative game and decision-making in advance by RAO Xiang, ZHANG Shun-yi, SUN Yan-fei, DING Wen-tao

    Published 2009-01-01
    “…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
    Get full text
    Article
  9. 269

    参数方程曲线的最优逼近算法及实现 by 丁克会, 席平原, 周红斌

    Published 2008-01-01
    “…The features of single and double arc approximating,and combines the merits of two kinds of fitting are discussed. By the algorithm of approximating curve in optimizing three-point arc and mixing single and double arc in permission tolerance,smooth link of whole approximating arc with inflexion points and extreme value points is attained. …”
    Get full text
    Article
  10. 270

    Research on power system transformation based on edge node technology under the background of carbon neutrality by LI Jin, GAO Hongliang, LIU Kemeng, XIE Hu

    Published 2025-04-01
    “…In each island, the improved particle swarm optimization algorithm is used to reasonably distribute the power tasks, forming a novel power system with the coordinated planning of source-network-load-storage as the core. …”
    Get full text
    Article
  11. 271

    Research on deep reinforcement learning based intelligent shop scheduling method by Zihui LUO, Chengling JIANG, Liang LIU, Xiaolong ZHENG, Huadong MA

    Published 2022-03-01
    “…The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.…”
    Get full text
    Article
  12. 272

    Swarm Robot Exploration Strategy for Path Formation Tasks Inspired by Physarum polycephalum by Yandong Luo, Jianwen Guo, Zhenpeng Lao, Shaohui Zhang, Xiaohui Yan

    Published 2021-01-01
    “…For the research of swarm robotics, our algorithm not only can lead multirobot as a whole to overcome the limitations of very simple individual agents but also can offer better performance in terms of search efficiency and success rate. …”
    Get full text
    Article
  13. 273

    Detection of child depression using machine learning methods. by Umme Marzia Haque, Enamul Kabir, Rasheda Khanam

    Published 2021-01-01
    “…<h4>Background</h4>Mental health problems, such as depression in children have far-reaching negative effects on child, family and society as whole. It is necessary to identify the reasons that contribute to this mental illness. …”
    Get full text
    Article
  14. 274

    INCREASED COMPETITIVENESS OF CONSTRUCTION ENTERPRISES ON THE BASIS OF ORGANISATIONAL-ECONOMIC DECISIONS OF PERSONNEL POTENTIAL MANAGEMENT by J. R. Emirbekova

    Published 2017-12-01
    “…The development of an algorithm for optimising the formation and use of human resources of a construction enterprise.Methods. …”
    Get full text
    Article
  15. 275

    Enhanced flux potential analysis links changes in enzyme expression to metabolic flux by Xuhang Li, Albertha J M Walhout, L Safak Yilmaz

    Published 2025-02-01
    “…Our approach outperforms alternatives by striking an optimal balance, evaluating enzyme expression at pathway level, rather than either single-reaction or whole-network levels.…”
    Get full text
    Article
  16. 276

    QoS Routing in Telecommunications Networks by N. I. Listopad, O. A. Lavshuk

    Published 2022-06-01
    “…The existing routing algorithms have been developed quite fully and, on the whole, function effectively if the optimization of the route selection is carried out according to one parameter. …”
    Get full text
    Article
  17. 277

    Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants by Zhi-Guang Deng, Qian Wu, Xin Lv, Bi-Wei Zhu, Mei-Qiong Xiang, Xue-Mei Wang, Jia-Liang Zhu

    Published 2022-01-01
    “…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
    Get full text
    Article
  18. 278

    A Full-Life-Cycle Modeling Framework for Cropland Abandonment Detection Based on Dense Time Series of Landsat-Derived Vegetation and Soil Fractions by Qiangqiang Sun, Zhijun You, Ping Zhang, Hao Wu, Zhonghai Yu, Lu Wang

    Published 2025-06-01
    “…Compared to the traditional yearly land cover-based approach (with an overall accuracy of 77.39%), this algorithm can overcome the propagation of classification errors (with product accuracy from 74.47% to 85.11%), especially in terms of improving the ability to capture changes at finer spatial scales. …”
    Get full text
    Article
  19. 279

    DETERMINATION OF TEMPERATURE-TIME PARAMETERS OF GROWING SINGLE CRYSTALS β-BaB<sub>2</sub>O<sub>4</sub> BY MODIFIED CZOCHRALSKI METHOD by S. A. Guretskii, I. M. Kolesova, A. V. Kravtsov, A. A. Linkevish, K. L. Trukhanava, V. B. Malyutin, V. L. Kolpashikov, S. YU. Yanovsky

    Published 2019-06-01
    “…The aim of this work is to find of the mechanism the determination of optimal temperature-time mode of crystallization during the whole process of β-BaB2O4 crystal growth by modified Czochralski method. …”
    Get full text
    Article
  20. 280

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article