Search alternatives:
sift » shift (Expand Search)
Showing 461 - 480 results of 1,156 for search '(sift OR soft) algorithm', query time: 0.12s Refine Results
  1. 461
  2. 462
  3. 463

    Comparative Evaluation of Reinforcement Learning Algorithms for Multi-Agent Unmanned Aerial Vehicle Path Planning in 2D and 3D Environments by Mirza Aqib Ali, Adnan Maqsood, Usama Athar, Hasan Raza Khanzada

    Published 2025-06-01
    “…In the second phase, we transition this comparison to a physics-based 3D simulation, incorporating realistic UAV (fixed wing) dynamics and checkpoint-based navigation. We compared five algorithms, namely, Proximal Policy Optimization (PPO), Soft Actor–Critic (SAC), Deep Deterministic Policy Gradient (DDPG), Trust Region Policy Optimization (TRPO), and Multi–Agent DDPG (MADDPG), in various scenarios. …”
    Get full text
    Article
  4. 464

    Blind recognition of primitive BCH code based on average cosine conformity by Zhaojun WU, Limin ZHANG, Zhaogen ZHONG, Yufeng LONG

    Published 2020-01-01
    “…In order to overcome the poor performance of existing algorithms for recognition of BCH code in low signal-to-noise ratio (SNR),a recognition algorithm based on average cosine conformity was proposed.Firstly,by traversing the possible values of code length and m-level primitive polynomial fields,the code length was identified by matching the initial code roots.Secondly,on the premise of recognizing the code length,the GF(2<sup>m</sup>) domain was traversed under the m-level primitive polynomial and the primitive polynomial with the strongest error-correcting ability was the generator polynomial for the domain.Finally,the minimum common multiple corresponding to the minimum polynomial of code roots was obtained,and the BCH code generator polynomial was recognized.In checking matching,the statistic of average cosine conformity was introduced.The optimal threshold was solved based on the minimum error decision criterion and distribution of the statistic to realize the fast identification of the BCH.The simulation results show that the deduced statistical characteristics are consistent with the actual situation,and the proposed algorithm can achieve reliable recognition under SNR of 5 dB and code length of 511.Comparing with existing algorithms,the performance of the proposed algorithm is better than that of the existing soft-decision algorithm and 1~3.5 dB better than that of the hard-decision algorithms.…”
    Get full text
    Article
  5. 465

    Blind recognition of primitive BCH code based on average cosine conformity by Zhaojun WU, Limin ZHANG, Zhaogen ZHONG, Yufeng LONG

    Published 2020-01-01
    “…In order to overcome the poor performance of existing algorithms for recognition of BCH code in low signal-to-noise ratio (SNR),a recognition algorithm based on average cosine conformity was proposed.Firstly,by traversing the possible values of code length and m-level primitive polynomial fields,the code length was identified by matching the initial code roots.Secondly,on the premise of recognizing the code length,the GF(2<sup>m</sup>) domain was traversed under the m-level primitive polynomial and the primitive polynomial with the strongest error-correcting ability was the generator polynomial for the domain.Finally,the minimum common multiple corresponding to the minimum polynomial of code roots was obtained,and the BCH code generator polynomial was recognized.In checking matching,the statistic of average cosine conformity was introduced.The optimal threshold was solved based on the minimum error decision criterion and distribution of the statistic to realize the fast identification of the BCH.The simulation results show that the deduced statistical characteristics are consistent with the actual situation,and the proposed algorithm can achieve reliable recognition under SNR of 5 dB and code length of 511.Comparing with existing algorithms,the performance of the proposed algorithm is better than that of the existing soft-decision algorithm and 1~3.5 dB better than that of the hard-decision algorithms.…”
    Get full text
    Article
  6. 466

    European sovereign debt control through reinforcement learning by Tato Khundadze, Willi Semmler, Willi Semmler, Willi Semmler

    Published 2025-06-01
    “…We demonstrate that the Soft Actor-Critic algorithm provides comparable or, in some cases, better solutions to multi-objective macroeconomic optimization problems, in comparison to Nonlinear Model Predictive Control (NMPC) algorithm.…”
    Get full text
    Article
  7. 467
  8. 468

    TANS: A Tolerance-Aware Neighborhood Search Method for Workflow Scheduling with Uncertainties in Cloud Manufacturing by Haiyan Xu, Fanhao Ma, Long Chen

    Published 2025-05-01
    “…In this paper, we consider the workflow scheduling problem with soft deadlines and fuzzy time uncertainties in cloud manufacturing environments. …”
    Get full text
    Article
  9. 469

    Improved model MASW YOLO for small target detection in UAV images based on YOLOv8 by Xianghe Meng, Fei Yuan, Dexiang Zhang

    Published 2025-07-01
    “…Abstract The present paper proposes an algorithmic model, MASW-YOLO, that improves YOLOv8n. …”
    Get full text
    Article
  10. 470

    Stage-induced learning-based cooperative target hunting strategy for multiple unmanned surface vehicles by Xingru QU, Yuze JIANG, Feifei LONG, Rubo ZHANG, Ying GAO

    Published 2025-02-01
    “…This is integrated with the multi-agent soft actor-critic (MASAC) algorithm for cooperative hunting training. …”
    Get full text
    Article
  11. 471

    Machine learning integration in thermodynamics: Predicting CO2 mixture saturation properties for sustainable refrigeration applications by Carlos G. Albà, Ismail I.I. Alkhatib, Lourdes F. Vega, Fèlix Llovell

    Published 2025-05-01
    “…Subsequently, data from the molecular characterization via polar soft-SAFT is used as output targets to train a machine learning algorithm based on artificial neural networks, enabling the prediction of mixture saturation properties out of the training dataset's scope. …”
    Get full text
    Article
  12. 472
  13. 473
  14. 474
  15. 475
  16. 476

    AI Act as EU Legislator’s Response to Challenges of Artificial Intelligence Development by Monika Wyszomirska

    Published 2025-06-01
    “…Keywords: artificial intelligence, new technology law, cyber security, legislative sandboxes, soft law, AI systems…”
    Get full text
    Article
  17. 477
  18. 478
  19. 479
  20. 480