Showing 1,901 - 1,920 results of 2,680 for search 'reaching algorithms', query time: 0.10s Refine Results
  1. 1901

    Convergence Study of Minimizing the Nonconvex Total Delay Using the Lane-Based Optimization Method for Signal-Controlled Junctions by C. K. Wong, Y. Y. Lee

    Published 2012-01-01
    “…The main difficulty to solve this high-dimension nonlinear nonconvex delay minimization problem using cutting plane algorithm is the requirement of substantial computational efforts to reach a good-quality solution while approximating the nonlinear solution space. …”
    Get full text
    Article
  2. 1902

    Particle Swarm Optimization on Parallel Computers for Improving the Performance of a Gait Recognition System by Shahla A. Abdulqader, Hasmek A. Krekorian

    Published 2019-12-01
    “…Best results were obtained from implementing parallel computing with eight workers and 100 iterations. The execution time reached 4s and PSNR reached 44db. At the same time, the best results were obtained from PCL approach.…”
    Get full text
    Article
  3. 1903

    IM/DD-Based 112-Gb/s/lambda PAM-4 Transmission Using 18-Gbps DML by Chao Yang, Rong Hu, Ming Luo, Qi Yang, Cai Li, Haibo Li, Shaohua Yu

    Published 2016-01-01
    “…The method proposed in this paper is both bandwidth and computationally efficient, which is thought to be feasible in the low-cost short-reach optical applications.…”
    Get full text
    Article
  4. 1904

    CHPOA-DBN Transformer Fault Diagnosis Method Considering Sample Within-Class Imbalance by Shuang WANG, Qian LUO, Bo TANG, Lan JIANG, Jin LI

    Published 2023-08-01
    “…Firstly, an improved K-means (IK-means) synthesis minority oversampling technique (SMOTE) algorithm is proposed to obtain within-class and between-class balanced fault samples. …”
    Get full text
    Article
  5. 1905

    OPTIMAL CONTROL IN A MODEL OF ENDOGENOUS GROWTH FOR CLOSED ECONOMIC SYSTEMS by M.A. SUMBATYAN

    Published 2008-12-01
    “…There is proposed a solution algorithm to solve respective optimization control problem, where the investment funds are taken from the amount which was earlier intended for investments to the manufacture process. …”
    Get full text
    Article
  6. 1906

    Research on pure azimuth passive positioning of unmanned aerial vehicle formation in electromagnetic silence environment by Cheng Qian

    Published 2025-05-01
    “…Finally, experiments and analysis are carried out in the simulation environment, and the effectiveness and feasibility of the proposed algorithm are proved.…”
    Get full text
    Article
  7. 1907

    Modeling Lane Changes at Freeway On-Ramps With a Novel Car-Following Model Based on Desired Time Headways by Moritz Berghaus, Markus Oeser

    Published 2025-01-01
    “…At on-ramps, however, merging vehicles have time to reach this steady state until they reach the end of the on-ramp. …”
    Get full text
    Article
  8. 1908

    Research on cross-domain trustable blockchain based decentralized DNS architecture by Kai LEI, Fangxing SHU, Lei HUANG, Qichao ZHANG

    Published 2020-04-01
    “…The domain name system (DNS) is an important internet infrastructure.However,current DNS utilizes centralized hierarchical structure with severe dependence on root server,which causes defects such as the risk of single-point failure and the abuse of central rights.Designing new decentralized DNS mainly focuses on transforming the domain name system from a single trust domain which relies on the center to multiple trust domains with the top-level domain name as the root parallel to each other,but also faces cross-domain credible challenges.To design a cross-domain trusted architecture,the concept of separating control and analysis was adopted,and a dual-blockchain DNS architecture was proposed.At data layer,a novel cross-domain verification was designed based on a one-way accumulator verification scheme,with the time complexity of the verification process O(N) reducing to O(1) nearly.The CDBFT algorithm was proposed by combining the DPoS mechanism and the BFT algorithm,whose average throughput reaches 736 TPS.The theoretical derivation and experimental results have demonstrated the advantages of this new DNS architecture on security,performance,and scalability.…”
    Get full text
    Article
  9. 1909

    PUE Attack Detection in CWSN Using Collaboration and Learning Behavior by Javier Blesa, Elena Romero, Alba Rozas, Alvaro Araujo, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…The algorithm has been tested using a cognitive simulator that brings important results in this area. …”
    Get full text
    Article
  10. 1910

    How news media frame data risks in their coverage of big data and AI by Dennis Nguyen

    Published 2023-05-01
    “…The empirical part applies a mixed methods design that combines qualitative and automated content analyses for charting data risks in news reporting sampled from prominent English-speaking media outlets of global reach. The resulting inventory of data risks includes privacy invasion/surveillance, data bias/algorithmic discrimination, cybersecurity, and information disorder. …”
    Get full text
    Article
  11. 1911

    A Study of Contact Detection between Noncircular Particles in Discrete Element Method by Chengbo Li, Qianqian Gao, Xianchang Li

    Published 2022-01-01
    “…In this study, a general contact detection algorithm of two-dimensional particles with analytic shape functions is provided. …”
    Get full text
    Article
  12. 1912

    Treelike process tensor contraction for automated compression of environments by Moritz Cygorek, Brendon W. Lovett, Jonathan Keeling, Erik M. Gauger

    Published 2024-11-01
    “…This results in a scheme that is similar in compression efficiency and accuracy to the original ACE algorithm, yet is significantly faster. Our numerical experiments reach similar conclusions for bosonic and fermionic test cases, suggesting that our findings are characteristic of the combination of PT-MPOs more generally.…”
    Get full text
    Article
  13. 1913

    Information support for chub mackerel Scomber japonicus fishery in the Pacific waters of the Russian Federation by E. P. Chernienko, I. S. Chernienko

    Published 2021-07-01
    “…The fishery statistics for 2016–2020 and the data on SST with delay of 4–7 days from the date of catch, spatial SST gradients calculated using Belkin algorithm, and day-to-day SST variations were processed using LightGBM machine learning algorithm. …”
    Get full text
    Article
  14. 1914

    On Deadlock Analysis and Characterization of Labeled Petri Nets with Undistinguishable and Unobservable Transitions by Amal Zaghdoud, Zhiwu Li

    Published 2024-11-01
    “…Moreover, by virtue of linear algebraic equations, we formulate sufficient conditions for identifying the existence of blocking markings in an LPN. Finally, an algorithm is developed to construct an observed graph that is a compendious presentation of the reachability graph of a net system, with respect to the existence of dead reaches. …”
    Get full text
    Article
  15. 1915

    Optimal Model-Free Mean-Square Consensus for Multi-Agents with Markov Switching Topology by Ruoxun Ma, Lipo Mo, Bokang Zhou

    Published 2024-11-01
    “…As a result, the value function is the optimum and the mean-square consensus can be reached using this technique.…”
    Get full text
    Article
  16. 1916

    Energy Management Strategy for Hybrid Electric Vehicles Based on Adaptive Equivalent Ratio-Model Predictive Control by Farah Mahdi Ali, Nizar Hadi Abbas

    Published 2024-12-01
    “…The final state of charge reached a higher level, and the energy-saving percentage rose compared to the conventional algorithm.…”
    Get full text
    Article
  17. 1917

    Distributed Adaptive Neural Consensus Tracking Control for Multiple Euler-Lagrange Systems with Unknown Control Directions by Fanfeng Meng, Lin Zhao, Jinpeng Yu

    Published 2020-01-01
    “…Numerical example is given to show the proposed algorithm is effective at last.…”
    Get full text
    Article
  18. 1918

    NUTRI-ONCOCARE: New integral nutrition care model to prevent and treat malnutrition in cancer patients by Mariola Sirvent-Ochando, Ana Murcia-Lopez, Cristina Sangrador-Pelluz, Sara Espla, Margarita Garrido-Siles, Jimena Abiles

    Published 2021-05-01
    “…</p><p><strong>Conclusions:</strong> From the nominal group technique, agreements were reached to propose an algorithm of nutritional approach of the cancer patient. …”
    Get full text
    Article
  19. 1919

    Research on pedestrian detection technology for mining unmanned vehicles by ZHOU Libing, YU Zhengqian, WEI Jianjian, JIANG Xueli, YE Baisong, ZHAO Yexin, YANG Siliang

    Published 2024-10-01
    “…The average precision of the pedestrian detection algorithm for mining unmanned vehicles based on enhanced images reached 95.68%, representing improvements of 2.53%, 6.42%, and 11.77% over YOLOv5, YOLOv3, and a coal mine key position personnel unsafe behavior recognition method based on improved YOLOv7 and ByteTrack, respectively, with a runtime of 29.31 ms. …”
    Get full text
    Article
  20. 1920

    Hydrogen leakage localization technology in hydrogen refueling stations combining RL and hidden Markov models by Jun Wang, Lei Wang, Ding Wang, Xiang Yu

    Published 2025-07-01
    “…To address these issues, a hydrogen leak localization algorithm for hydrogen refueling stations based on a combination of reinforcement learning and hidden Markov models is proposed. …”
    Get full text
    Article