-
721
A comprehensive metric study of distributed PV consumption capacity considering multiple uncertainties
Published 2025-04-01“…A local chaotic search is introduced to improve the firefly algorithm, and the improved firefly algorithm is used to solve the comprehensive measurement model and output the comprehensive measurement results of the absorption capacity. …”
Get full text
Article -
722
A Fault Diagnosis Method for Oil Well Electrical Power Diagrams Based on Multidimensional Clustering Performance Evaluation
Published 2025-03-01“…Through simulations and experiments on 10 UCI datasets, the proposed effectiveness function accurately evaluates the clustering results and determines the optimal number of clusters, significantly improving the performance of the clustering algorithm. Experimental results show that the fault diagnosis accuracy of our method reaches 98.4%, significantly outperforming traditional SVM and ELM methods. …”
Get full text
Article -
723
Syntactic Representation of predicational copular clauses in Persian Language
Published 2025-02-01“…Chomsky proposes the labeling algorithm in (1). (1) Labeling Algorithm (LA) A constructed syntactic object takes the 'label' of the nearest head by minimal search. …”
Get full text
Article -
724
Intelligent Detection of Oceanic Front in Offshore China Using EEFD-Net with Remote Sensing Data
Published 2025-03-01Get full text
Article -
725
College psychological stress assessment system based on LabVIEW and WTA integration
Published 2025-12-01“…Furthermore, the response time from receiving the signal to making the evaluation result of this algorithm is only 0.6 s, and the proportion of those with psychological stress problems that can be identified reaches 97 %. …”
Get full text
Article -
726
Design and implementation of J2EE-based statement feature recognition in English teaching system optimization
Published 2024-12-01“…When 2000 queries are concurrent, the memory usage reaches >160 M.…”
Get full text
Article -
727
Uphill Traction Strategy Optimization of Middle/Low-speed Maglev Train
Published 2016-01-01“…The principle of time and energy saving was analyzed, and the optimization algorithm was verified through simulation program on the base of engineering background. …”
Get full text
Article -
728
Study of the effectiveness of trussed beams with two posts
Published 2022-05-01“…The proposed technique and algorithm testify to the effectiveness of the considered design. …”
Get full text
Article -
729
Investigation of Different Components of Steel Metal Utilizing Artificial Intelligence
Published 2022-12-01“…Subsequently, in common, it can be said that the precision of the organize in getting particular values of steel components is more influenced by this issue, and each of the training algorithms (LM), (BR), and (SCG) have the capacity to precisely reach the reply.…”
Get full text
Article -
730
High Accuracy VLC Indoor Positioning System With Differential Detection
Published 2017-01-01“…Meanwhile, the positioning accuracy outside the cell can reach 10.0 cm or less.…”
Get full text
Article -
731
Thermal Runaway Detection Method for Smart Electric Bicycle Charger
Published 2025-01-01“…ABSTRACT A novel algorithm for thermal runaway detection embedded in the electric bicycle charging system is proposed. …”
Get full text
Article -
732
Modeling and optimization of an M/M/1/K queue with single working vacation, feedback, and impatience timers under N-policy
Published 2025-06-01“…After constructing the expected cost function of the model, Grey Wolf Optimization (GWO) algorithm is utilized to determine the optimum values of the service rates \(\mu^{*}\) and \(\mu_{v}^{*}\). …”
Get full text
Article -
733
Application of finite element analysis in the formal analysis of ancient architectural plaque section
Published 2025-04-01“…To better reflect the actual situation of engineering, the genetic algorithm is introduced to fine-tune the finite element calculation. …”
Get full text
Article -
734
-
735
Approximation of Queues in Bike-Sharing Systems With Finite Docks
Published 2025-03-01“…(iii) Under certain conditions, the system can reach a self-balancing state, avoiding bike surpluses or deficiencies at each station and maximising throughput. …”
Get full text
Article -
736
Modeling, Altitude Control, and Trajectory Planning of a Weather Balloon Subject to Wind Disturbances
Published 2025-04-01“…By commanding the ballast release for ascent and helium venting for descent, the developed control solution proves efficient and robust in simulation, guiding the balloon to reach defined goals while traveling through predetermined waypoints. …”
Get full text
Article -
737
Business Optimization of Financial Centers in Pharmaceutical Enterprises Based on Robotic Process Automation Technology
Published 2025-01-01“…Next, the decision tree algorithm is introduced to visually demonstrate the classification and decision-making process, optimizing the classification operation. …”
Get full text
Article -
738
Optimal Control Gains Optimization for Mobile Robot Considering Dynamic Constraints
Published 2024-01-01“…This approach enables mobile robots to reach target destinations with improved stability and performance, addressing the limitations inherent in traditional kinematic control methods.…”
Get full text
Article -
739
Multi-Stage Planning Approach for Distribution Network Considering Long-Term Variations in Load and Renewable Energy
Published 2025-01-01“…Compared with the traditional planning method, the paper considers the impact of load growth and renewable energy penetration and uses the multi-stage planning method to build the planning model; at the same time, in the scenarios selection, the affinity propagation (AP) clustering algorithm is adopted, which can automatically obtain the number of clusters. …”
Get full text
Article -
740
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article