Showing 721 - 740 results of 2,680 for search 'reaching algorithms', query time: 0.10s Refine Results
  1. 721

    A comprehensive metric study of distributed PV consumption capacity considering multiple uncertainties by Chengmin Wang, Yangzi Wang, Fulong Song

    Published 2025-04-01
    “…A local chaotic search is introduced to improve the firefly algorithm, and the improved firefly algorithm is used to solve the comprehensive measurement model and output the comprehensive measurement results of the absorption capacity. …”
    Get full text
    Article
  2. 722

    A Fault Diagnosis Method for Oil Well Electrical Power Diagrams Based on Multidimensional Clustering Performance Evaluation by Xingyu Liu, Xin Meng, Ze Hu, Hancong Duan, Min Wang, Yaping Chen

    Published 2025-03-01
    “…Through simulations and experiments on 10 UCI datasets, the proposed effectiveness function accurately evaluates the clustering results and determines the optimal number of clusters, significantly improving the performance of the clustering algorithm. Experimental results show that the fault diagnosis accuracy of our method reaches 98.4%, significantly outperforming traditional SVM and ELM methods. …”
    Get full text
    Article
  3. 723

    Syntactic Representation of predicational copular clauses in Persian Language by Maryam Khamse Ashari, Rezvan Motavallian

    Published 2025-02-01
    “…Chomsky proposes the labeling algorithm in (1). (1) Labeling Algorithm (LA) A constructed syntactic object takes the 'label' of the nearest head by minimal search. …”
    Get full text
    Article
  4. 724
  5. 725

    College psychological stress assessment system based on LabVIEW and WTA integration by Ting Wang

    Published 2025-12-01
    “…Furthermore, the response time from receiving the signal to making the evaluation result of this algorithm is only 0.6 s, and the proportion of those with psychological stress problems that can be identified reaches 97 %. …”
    Get full text
    Article
  6. 726

    Design and implementation of J2EE-based statement feature recognition in English teaching system optimization by Lina Wang

    Published 2024-12-01
    “…When 2000 queries are concurrent, the memory usage reaches >160 M.…”
    Get full text
    Article
  7. 727

    Uphill Traction Strategy Optimization of Middle/Low-speed Maglev Train by JIAO Yanjun, WEN Yanhui, LIU Shaoke

    Published 2016-01-01
    “…The principle of time and energy saving was analyzed, and the optimization algorithm was verified through simulation program on the base of engineering background. …”
    Get full text
    Article
  8. 728

    Study of the effectiveness of trussed beams with two posts by A. K. Yusupov, H. M. Musеlеmov, T. O. Ustarhanov

    Published 2022-05-01
    “…The proposed technique and algorithm testify to the effectiveness of the considered design. …”
    Get full text
    Article
  9. 729

    Investigation of Different Components of Steel Metal Utilizing Artificial Intelligence by Zainab L. H, Fatima Abd Naji

    Published 2022-12-01
    “…Subsequently, in common, it can be said that the precision of the organize in getting particular values of steel components is more influenced by this issue, and each of the training algorithms (LM), (BR), and (SCG) have the capacity to precisely reach the reply.…”
    Get full text
    Article
  10. 730

    High Accuracy VLC Indoor Positioning System With Differential Detection by Huichao Lv, Lihui Feng, Aiying Yang, Peng Guo, Heqing Huang, Shufen Chen

    Published 2017-01-01
    “…Meanwhile, the positioning accuracy outside the cell can reach 10.0 cm or less.…”
    Get full text
    Article
  11. 731

    Thermal Runaway Detection Method for Smart Electric Bicycle Charger by Jing Ning, Bing Xiao, Wenbin Zhao

    Published 2025-01-01
    “…ABSTRACT A novel algorithm for thermal runaway detection embedded in the electric bicycle charging system is proposed. …”
    Get full text
    Article
  12. 732

    Modeling and optimization of an M/M/1/K queue with single working vacation, feedback, and impatience timers under N-policy by Abir Kadi, Mohamed Boualem, Nassim Touche, Aimen Dehimi

    Published 2025-06-01
    “…After constructing the expected cost function of the model, Grey Wolf Optimization (GWO) algorithm is utilized to determine the optimum values of the service rates \(\mu^{*}\) and \(\mu_{v}^{*}\). …”
    Get full text
    Article
  13. 733

    Application of finite element analysis in the formal analysis of ancient architectural plaque section by Su Wen, Hua Yixiong

    Published 2025-04-01
    “…To better reflect the actual situation of engineering, the genetic algorithm is introduced to fine-tune the finite element calculation. …”
    Get full text
    Article
  14. 734
  15. 735

    Approximation of Queues in Bike-Sharing Systems With Finite Docks by Xiang PENG, Jingyan WANG, Yong ZHANG

    Published 2025-03-01
    “…(iii) Under certain conditions, the system can reach a self-balancing state, avoiding bike surpluses or deficiencies at each station and maximising throughput. …”
    Get full text
    Article
  16. 736

    Modeling, Altitude Control, and Trajectory Planning of a Weather Balloon Subject to Wind Disturbances by Bruno Cândido, Catarina Rodrigues, Alexandra Moutinho, José Raul Azinheira

    Published 2025-04-01
    “…By commanding the ballast release for ascent and helium venting for descent, the developed control solution proves efficient and robust in simulation, guiding the balloon to reach defined goals while traveling through predetermined waypoints. …”
    Get full text
    Article
  17. 737

    Business Optimization of Financial Centers in Pharmaceutical Enterprises Based on Robotic Process Automation Technology by Yali Wang, Weiwei Zhou, Yingji Li, Jingqi Sun

    Published 2025-01-01
    “…Next, the decision tree algorithm is introduced to visually demonstrate the classification and decision-making process, optimizing the classification operation. …”
    Get full text
    Article
  18. 738

    Optimal Control Gains Optimization for Mobile Robot Considering Dynamic Constraints by Sung-Chan Park, Min Kim, Hee-Mun Park, Jin-Hyun Park

    Published 2024-01-01
    “…This approach enables mobile robots to reach target destinations with improved stability and performance, addressing the limitations inherent in traditional kinematic control methods.…”
    Get full text
    Article
  19. 739

    Multi-Stage Planning Approach for Distribution Network Considering Long-Term Variations in Load and Renewable Energy by Qihe Lou, Yanbin Li, Zhenwei Li, Liu Han, Ying Xu, Zhongkai Yi

    Published 2025-01-01
    “…Compared with the traditional planning method, the paper considers the impact of load growth and renewable energy penetration and uses the multi-stage planning method to build the planning model; at the same time, in the scenarios selection, the affinity propagation (AP) clustering algorithm is adopted, which can automatically obtain the number of clusters. …”
    Get full text
    Article
  20. 740

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article