-
1901
Convergence Study of Minimizing the Nonconvex Total Delay Using the Lane-Based Optimization Method for Signal-Controlled Junctions
Published 2012-01-01“…The main difficulty to solve this high-dimension nonlinear nonconvex delay minimization problem using cutting plane algorithm is the requirement of substantial computational efforts to reach a good-quality solution while approximating the nonlinear solution space. …”
Get full text
Article -
1902
Particle Swarm Optimization on Parallel Computers for Improving the Performance of a Gait Recognition System
Published 2019-12-01“…Best results were obtained from implementing parallel computing with eight workers and 100 iterations. The execution time reached 4s and PSNR reached 44db. At the same time, the best results were obtained from PCL approach.…”
Get full text
Article -
1903
IM/DD-Based 112-Gb/s/lambda PAM-4 Transmission Using 18-Gbps DML
Published 2016-01-01“…The method proposed in this paper is both bandwidth and computationally efficient, which is thought to be feasible in the low-cost short-reach optical applications.…”
Get full text
Article -
1904
CHPOA-DBN Transformer Fault Diagnosis Method Considering Sample Within-Class Imbalance
Published 2023-08-01“…Firstly, an improved K-means (IK-means) synthesis minority oversampling technique (SMOTE) algorithm is proposed to obtain within-class and between-class balanced fault samples. …”
Get full text
Article -
1905
OPTIMAL CONTROL IN A MODEL OF ENDOGENOUS GROWTH FOR CLOSED ECONOMIC SYSTEMS
Published 2008-12-01“…There is proposed a solution algorithm to solve respective optimization control problem, where the investment funds are taken from the amount which was earlier intended for investments to the manufacture process. …”
Get full text
Article -
1906
Research on pure azimuth passive positioning of unmanned aerial vehicle formation in electromagnetic silence environment
Published 2025-05-01“…Finally, experiments and analysis are carried out in the simulation environment, and the effectiveness and feasibility of the proposed algorithm are proved.…”
Get full text
Article -
1907
Modeling Lane Changes at Freeway On-Ramps With a Novel Car-Following Model Based on Desired Time Headways
Published 2025-01-01“…At on-ramps, however, merging vehicles have time to reach this steady state until they reach the end of the on-ramp. …”
Get full text
Article -
1908
Research on cross-domain trustable blockchain based decentralized DNS architecture
Published 2020-04-01“…The domain name system (DNS) is an important internet infrastructure.However,current DNS utilizes centralized hierarchical structure with severe dependence on root server,which causes defects such as the risk of single-point failure and the abuse of central rights.Designing new decentralized DNS mainly focuses on transforming the domain name system from a single trust domain which relies on the center to multiple trust domains with the top-level domain name as the root parallel to each other,but also faces cross-domain credible challenges.To design a cross-domain trusted architecture,the concept of separating control and analysis was adopted,and a dual-blockchain DNS architecture was proposed.At data layer,a novel cross-domain verification was designed based on a one-way accumulator verification scheme,with the time complexity of the verification process O(N) reducing to O(1) nearly.The CDBFT algorithm was proposed by combining the DPoS mechanism and the BFT algorithm,whose average throughput reaches 736 TPS.The theoretical derivation and experimental results have demonstrated the advantages of this new DNS architecture on security,performance,and scalability.…”
Get full text
Article -
1909
PUE Attack Detection in CWSN Using Collaboration and Learning Behavior
Published 2013-06-01“…The algorithm has been tested using a cognitive simulator that brings important results in this area. …”
Get full text
Article -
1910
How news media frame data risks in their coverage of big data and AI
Published 2023-05-01“…The empirical part applies a mixed methods design that combines qualitative and automated content analyses for charting data risks in news reporting sampled from prominent English-speaking media outlets of global reach. The resulting inventory of data risks includes privacy invasion/surveillance, data bias/algorithmic discrimination, cybersecurity, and information disorder. …”
Get full text
Article -
1911
A Study of Contact Detection between Noncircular Particles in Discrete Element Method
Published 2022-01-01“…In this study, a general contact detection algorithm of two-dimensional particles with analytic shape functions is provided. …”
Get full text
Article -
1912
Treelike process tensor contraction for automated compression of environments
Published 2024-11-01“…This results in a scheme that is similar in compression efficiency and accuracy to the original ACE algorithm, yet is significantly faster. Our numerical experiments reach similar conclusions for bosonic and fermionic test cases, suggesting that our findings are characteristic of the combination of PT-MPOs more generally.…”
Get full text
Article -
1913
Information support for chub mackerel Scomber japonicus fishery in the Pacific waters of the Russian Federation
Published 2021-07-01“…The fishery statistics for 2016–2020 and the data on SST with delay of 4–7 days from the date of catch, spatial SST gradients calculated using Belkin algorithm, and day-to-day SST variations were processed using LightGBM machine learning algorithm. …”
Get full text
Article -
1914
On Deadlock Analysis and Characterization of Labeled Petri Nets with Undistinguishable and Unobservable Transitions
Published 2024-11-01“…Moreover, by virtue of linear algebraic equations, we formulate sufficient conditions for identifying the existence of blocking markings in an LPN. Finally, an algorithm is developed to construct an observed graph that is a compendious presentation of the reachability graph of a net system, with respect to the existence of dead reaches. …”
Get full text
Article -
1915
Optimal Model-Free Mean-Square Consensus for Multi-Agents with Markov Switching Topology
Published 2024-11-01“…As a result, the value function is the optimum and the mean-square consensus can be reached using this technique.…”
Get full text
Article -
1916
Energy Management Strategy for Hybrid Electric Vehicles Based on Adaptive Equivalent Ratio-Model Predictive Control
Published 2024-12-01“…The final state of charge reached a higher level, and the energy-saving percentage rose compared to the conventional algorithm.…”
Get full text
Article -
1917
Distributed Adaptive Neural Consensus Tracking Control for Multiple Euler-Lagrange Systems with Unknown Control Directions
Published 2020-01-01“…Numerical example is given to show the proposed algorithm is effective at last.…”
Get full text
Article -
1918
NUTRI-ONCOCARE: New integral nutrition care model to prevent and treat malnutrition in cancer patients
Published 2021-05-01“…</p><p><strong>Conclusions:</strong> From the nominal group technique, agreements were reached to propose an algorithm of nutritional approach of the cancer patient. …”
Get full text
Article -
1919
Research on pedestrian detection technology for mining unmanned vehicles
Published 2024-10-01“…The average precision of the pedestrian detection algorithm for mining unmanned vehicles based on enhanced images reached 95.68%, representing improvements of 2.53%, 6.42%, and 11.77% over YOLOv5, YOLOv3, and a coal mine key position personnel unsafe behavior recognition method based on improved YOLOv7 and ByteTrack, respectively, with a runtime of 29.31 ms. …”
Get full text
Article -
1920
Hydrogen leakage localization technology in hydrogen refueling stations combining RL and hidden Markov models
Published 2025-07-01“…To address these issues, a hydrogen leak localization algorithm for hydrogen refueling stations based on a combination of reinforcement learning and hidden Markov models is proposed. …”
Get full text
Article