Suggested Topics within your search.
Suggested Topics within your search.
-
461
Routization Problem Complicated by the Dependence of Costs Functions and «Current» Restrictions From the Tasks List
Published 2016-04-01“…This list may correspond to performed or unperformed tasks. ”Current” restrictions (on movements) may depend on the aforementioned list of tasks. …”
Get full text
Article -
462
Distinctive Features of Faults for Use in Power Transformer Differential Protection
Published 2017-04-01“…Taking into account the peculiarities of the change in the instantaneous values of the differential current while developing the protection algorithm makes it possible to recognize faults with maximum speed before the moment of the first saturation of electromagnetic current transformers and thus avoid a delay in the operation of the protection. …”
Get full text
Article -
463
Simplified Model Predictive for Controlling Circulating and Output Currents of a Modular Multilevel Converter
Published 2022-06-01“…In addition, a bilinear mathematical model of the MMC is derived and discretized to predict the states of the MMC for one step ahead. A sorting algorithm is used to retain the balancing capacitor voltage in each SM, while the cost function guarantees the regulation of the output current, and MMC circulating current. …”
Get full text
Article -
464
Markov decision process for current density optimization to improve hydrogen production by water electrolysis
Published 2025-08-01“…The MDP algorithm dynamically adjusts current release timings from three capacitors connected to the cathode based on feedback from hydrogen concentration levels. …”
Get full text
Article -
465
Simulation of current output during chrome plating of parts for hardening and car parts restoration
Published 2020-12-01“…To reduce the number of experiments performed, it is necessary to conduct mathematical modeling of the experiment to reduce the number of experiments performed and reduce it to a specific algorithm to obtain reliable and accurate data. The obtained reliable data will allow to get good results in studies of obtaining chrome coatings, with maximum performance, including current output.Materials and methods. …”
Get full text
Article -
466
CURRENT COMPUTER TECHNOLOGIES IN THE DIAGNOSIS OF TRACHEOMALACIA IN PATIENTS WITH CICATRICIAL TRACHEAL STENOSIS IN THE PERIOPERATIVE PERIOD
Published 2018-08-01“…Objective: to analyze current radiodiagnostic techniques in identifying tracheomalacia (TM) and estimating its severity and extent in patients with cicatricial tracheal stenosis (CTS) and to determine the important characteristics of TM according to follow-up multislice computed tomography (MSCT) and magnetic resonance imaging (MRI) findings.Material and methods. …”
Get full text
Article -
467
Current Measurement and Fault Detection Based on the Non-Invasive Smart Internet of Things Technique
Published 2024-01-01“…We address the cost factor, flexibility, and complexity issues by using a non-intrusive clamp current transformer around power lines to measure current, estimate power, and upload it to the cloud with proper statistical data. …”
Get full text
Article -
468
Modeling the Spatial Distribution of Wildfire Risk in Chile Under Current and Future Climate Scenarios
Published 2025-03-01“…This study employs a spatial machine learning approach using a Random Forest algorithm to predict wildfire risk in Central and Southern Chile under current and future climatic scenarios. …”
Get full text
Article -
469
Universal Simulation Model of Battery Degradation with Optimization of Parameters by Genetic Algorithm
Published 2022-12-01“…In this case, the amount of wear (degradation) is determined by the integral of the function of the intensity of current wear over the battery life. To optimize the parameters of the model, a random search method is used in combination with a genetic selection algorithm. …”
Get full text
Article -
470
-
471
An Improved Adaptive Variable Step Size LMS Algorithm for Harmonic Detection
Published 2017-01-01“…In order to improve the accuracy and tracking speed of harmonic current detection, an improved variable step-size LMS (least mean square ) algorithm was proposed based on LMS algorithm. …”
Get full text
Article -
472
Optimizing PEMFC parameter identification using improved pufferfish algorithm and CNN
Published 2025-02-01“…These results confirm the effectiveness of the proposed method with acceptable errors and good performance on the identification of parameters for PEMFCs over diverse circumstances. The yield voltage–current curves predicted by the optimized CNN model display a high degree of correlation with the empirical voltage–current curves, clearly proving the accuracy of the achieved CNN model and its ability to learn the underlying relationship, thus helping to improve the PEMFC parameter estimation.…”
Get full text
Article -
473
Resource analysis of quantum algorithms for coarse-grained protein folding models
Published 2024-07-01“…We analyze the resource requirements for simulating simplified yet computationally challenging protein folding models on a quantum computer, assessing the feasibility of these existing approaches in the current and near-future technological landscape. We calculate the minimum number of qubits, interactions, and two-qubit gates necessary to build a heuristic quantum algorithm with the specific information of a folding problem. …”
Get full text
Article -
474
Neural Network VS Genetic and Particle Swarm Optimization Algorithms in Bankruptcy
Published 2025-04-01“…Finally, four variables—current ratio, sales to current assets ratio, economic value added, and gross profit margin ratio—that may reliably predict bankruptcy were found using the ANNs-PSO and ANNs-GA hybrid approach. …”
Get full text
Article -
475
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
476
Vibration Suppression Algorithm for Electromechanical Equipment in Distributed Energy Supply Systems
Published 2025-07-01“…To this end, a vibration suppression algorithm for fractional-slot permanent magnet synchronous motors based on a <i>d</i>-axis current injection is proposed in this paper. …”
Get full text
Article -
477
Multi-Strategy Improved Whale Optimization Algorithm and Its Engineering Applications
Published 2025-01-01“…The Whale Optimization Algorithm (WOA) is recognized for its simplicity, few control parameters, and effective local optima avoidance. …”
Get full text
Article -
478
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
479
Genetic Algorithm-Optimized Diode-Based Temperature Control Actuation System
Published 2025-01-01“…The diodes’ minimal voltage variation ensures linear power and current characteristics, enabling effective temperature rise control through current adjustments and mitigating temperature overshoot issues. …”
Get full text
Article -
480
Research on path planning of mobile robots based on improved A* algorithm
Published 2025-02-01“…The choice between eight-neighborhood search and sixteen-neighborhood search is determined based on the presence of obstacles in the eight-neighborhood around the current node, effectively enhancing the search efficiency of the algorithm and reducing the number of nodes expanded during the search process. …”
Get full text
Article