-
241
Swarm Robot Exploration Strategy for Path Formation Tasks Inspired by Physarum polycephalum
Published 2021-01-01“…For the research of swarm robotics, our algorithm not only can lead multirobot as a whole to overcome the limitations of very simple individual agents but also can offer better performance in terms of search efficiency and success rate. …”
Get full text
Article -
242
Multirobot Coverage Path Planning Based on Deep Q-Network in Unknown Environment
Published 2022-01-01“…For these reasons, the whole algorithm is divided into two parts: offline training and online decision-making. …”
Get full text
Article -
243
INCREASED COMPETITIVENESS OF CONSTRUCTION ENTERPRISES ON THE BASIS OF ORGANISATIONAL-ECONOMIC DECISIONS OF PERSONNEL POTENTIAL MANAGEMENT
Published 2017-12-01“…The development of an algorithm for optimising the formation and use of human resources of a construction enterprise.Methods. …”
Get full text
Article -
244
Enhanced flux potential analysis links changes in enzyme expression to metabolic flux
Published 2025-02-01“…Our approach outperforms alternatives by striking an optimal balance, evaluating enzyme expression at pathway level, rather than either single-reaction or whole-network levels.…”
Get full text
Article -
245
Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants
Published 2022-01-01“…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
Get full text
Article -
246
DETERMINATION OF TEMPERATURE-TIME PARAMETERS OF GROWING SINGLE CRYSTALS β-BaB<sub>2</sub>O<sub>4</sub> BY MODIFIED CZOCHRALSKI METHOD
Published 2019-06-01“…The aim of this work is to find of the mechanism the determination of optimal temperature-time mode of crystallization during the whole process of β-BaB2O4 crystal growth by modified Czochralski method. …”
Get full text
Article -
247
Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot
Published 2018-01-01“…The result shows that the total mass of support frame after optimization is comparatively 48% less than before. At the same time,the inherent characteristic of the whole frame is obtained,which is prepared for the later control strategy.…”
Get full text
Article -
248
Simulation and test study of transmission characteristics of V-shaped rubber belt CVT
Published 2025-06-01“…ObjectiveThe dynamic matching problem of continuously variable transmission (CVT) with the engine and Baja racing car was subjected to research analysis.MethodsThe parameters of key components of CVT were first optimized by genetic algorithm in Matlab software, then the dynamic modeling and simulation of CVT and the whole vehicle were carried out in Matlab/Simulink and RecurDyn, and finally the vehicle test was carried out on the chassis dynamometer.ResultsThe results of modeling simulation and vehicle test show that the dynamic index of Baja racing car is significantly improved after the optimization of the parameters of key components of CVT. …”
Get full text
Article -
249
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
250
Improving total bone marrow and lymphoid irradiation: feasibility of intensity-modulated proton therapy (IMPT) and dosimetric comparison with helical tomotherapy (HT)
Published 2025-05-01“…Dosimetric benefits were compared to HT, safety and accuracy were verified using an in-house algorithm and planar dosage measurement. Results The average cranio-caudal and lateral whole-body PTV dimensions were 169.24 cm and 46.41 cm for five adults; 95.2 cm and 28.86 cm for one pediatric patient. …”
Get full text
Article -
251
Angular Stabilization of a Multirotor Aircraft in Venus’ Atmosphere
Published 2025-07-01“…The developed stabilization algorithm can be applied to aerial vehicles operating in complex atmospheric conditions, including strong disturbances typical of the Venus cloud layer.…”
Get full text
Article -
252
Improved sequence-based localization applied in coal mine
Published 2016-11-01“…Sequence–centroid localization contributes to improving this issue, but the location error on the boundary of whole area is unsatisfactory as well. This article proposes an improved sequence-based localization method which is integrated with quantum-behaved particle swarm optimization, as quantum-behaved particle swarm optimization makes good use of the search performance of global optimal solution. …”
Get full text
Article -
253
Reconfigurable and Scalable Artificial Intelligence Acceleration Hardware Architecture With RISC-V CNN Coprocessor for Real-Time Seizure Detection
Published 2025-01-01“…This study proposes a seizure detection algorithm to identify a seizure attack with EEG. This algorithm includes a simplified signal preprocessor and a nearly optimized convolutional neural network (CNN). …”
Get full text
Article -
254
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
255
Precision Dosing in Presence of Multiobjective Therapies by Integrating Reinforcement Learning and PK‐PD Models: Application to Givinostat Treatment of Polycythemia Vera
Published 2025-06-01“…The therapeutic goal is to simultaneously normalize the levels of these efficacy/safety biomarkers, thus inducing a complete hematological response (CHR). An RL algorithm, Q‐Learning (QL), was integrated with a PK‐PD model describing the givinostat effect on PLT, WBC, and HCT to derive both an adaptive dosing protocol (QLpop‐agent) for the whole population and personalized dosing strategies by coupling a specific QL‐agent to each patient (QLind‐agents). …”
Get full text
Article -
256
Weak Connection Regulation Technology for Source-Storage-Load Collaborative Microgrids Based on Direct Power Control
Published 2025-05-01“…The paper also studied the regional DC power supply and flexible regulation technology, analyzed the flexible characteristics of air conditioners, energy storage, photovoltaic, etc., and verified the power direct-control flexible regulation algorithm and evaluation indexes. From the effect of testing and verification, the whole system enables real-time response and rapid adjustment, thus improving the energy utilization efficiency, reducing the grid-side quota and realizing the local consumption of PV.…”
Get full text
Article -
257
Onboard Decision-making System of Unmanned Mine Truck
Published 2022-10-01“…This paper adopts the quadratic programming algorithm based on the shortest time and the optimal energy consumption to solve the speed planning, and adopts the hybrid A-star and curve fitting algorithm based on special scenarios to solve the local path planning, so that the operation efficiency can be improved by 10%~20% in the loading and unloading parking scenario. …”
Get full text
Article -
258
Enhancing Resilience and Efficiency in Power System: A Five-Level Dynamic Planning Model
Published 2024-01-01“…The fifth level deals with transmission expansion planning to boost resilience, and the capability of transmission switching is regarded as a low-cost correction factor. The first level optimizes energy hub according to the differential evolutionary algorithm, but the next four levels employ a robust symphony orchestra search algorithm. …”
Get full text
Article -
259
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management
Published 2022-01-01“…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
Get full text
Article -
260
A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing
Published 2013-01-01“…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
Get full text
Article