1,473 Result(s)
-
Chapter and Conference Paper
Optimization of Supply Chain Scheduling Based on Genetic Particle Swarm Optimization Algorithm
In response to the optimization problem of large-scale customization supply chain scheduling, the author introduces a supply chain scheduling optimization approach that relies on a hybrid algorithm combining g...
-
Chapter and Conference Paper
Trajectory Prediction Method of High-Speed Aircraft Based on Acceleration Fitting
The research objects of traditional trajectory prediction methods are mostly ballistic missiles. The active maneuverability of ballistic missiles is weak, so their trajectories have strong regularity and relat...
-
Chapter and Conference Paper
Research on Pedestrian Tracking in Complex Environments Using UAV System
In this paper, a small quadrotor UAV equipped with an RGB-D camera is selected to track the pedestrian in an unknown and complex environment. The UAV system uses the on-board sensors to sense the environment a...
-
Chapter and Conference Paper
Harmonizing Solar Energy and Public Transit: A Data-Driven Analysis of Integrating Photovoltaic Systems with Electric Bus Charging Infrastructure
As an energy-intensive sector, transportation is accountable for nearly 29% of global energy usage and 20% of worldwide carbon emissions. To identify viable avenues toward eco-friendly and sustainable transpor...
-
Chapter and Conference Paper
An Interleaved Control Strategy for Input-Series Output-Parallel System with Three-Level Boost Converter+Full-Bridge LLC Converter
LLC resonant converters are known for their advantages such as soft switching technology, high power density, and high efficiency. In order to achieve wide gain range under wide input voltage, reduce the volta...
-
Chapter and Conference Paper
Power Transmission and Transformation Risk Management System Based on EWM Calculation and AHP
Aiming at the evaluation and management of transmission project investment risk under the new power market environment, a scheme combining the analytical hierarchy process (AHP) and the entropy weight method (...
-
Chapter and Conference Paper
A Method Based on Lateral Avoidance Rule for Unmanned Aerial Vehicle Avoidance Maneuvering Decision-Making
In the evasion decision-making process, it is important to choose the appropriate maneuver avoidance method for Unmanned Aerial Vehicle (UAV) sense and avoid during flight processes. The common evasion rules o...
-
Chapter and Conference Paper
Scenario Elements Extraction and Scenario Sets Establishment Method for Railway Rainfall Disasters
Rainfall disasters lead to frequent railway accidents in various countries, which seriously affect the normal operation of railways. However, effective railway rainfall disaster monitoring, early warning and p...
-
Chapter and Conference Paper
Lightweight Dialog State Tracking Methods Based on RoBERTa for Resource Constrained Dialog Systems
Dialog state tracking is a crucial component of task-oriented dialog systems. Pre-trained language models can effectively perform dialog state tracking for task-oriented dialog systems through model fine-tunin...
-
Chapter and Conference Paper
A New Computing Offload Algorithm for Maximizing User Revenue Under Cloud Edge Architecture
In order to solve the problems of traditional Mobile Cloud Computing mode, such as MCC cloud servers often being far away from users, high network transmission latency, and unable to meet the low latency requi...
-
Chapter and Conference Paper
Construction of Rehabilitation Training Platform Based on Data Fusion and Neural Network Algorithms
With the development of science and technology, medical technology is also constantly improving, and people are paying more and more attention to health. Rehabilitation training is an essential means to improv...
-
Chapter and Conference Paper
Configuration Design and Dynamics Analysis of Rotating Permanent Magnet Arrays for Space Debris Along-Orbit Removal
The deteriorating environment of space debris poses a significant threat to spacecraft. Several permanent magnets rotating at constant speed are formed into an array appropriately to remove the space debris, c...
-
Chapter and Conference Paper
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning
Fuzzing is a popular and effective automatic vulnerability mining method. More and more fuzzing techniques are starting to integrate reinforcement learning. But traditional fuzzing based on reinforcement learn...
-
Chapter and Conference Paper
Research on Identification of Causes and Prevention and Control Measures of Railway Freight Accidents Based on Complex Network
For the railway operation system, it is vital to find the fundamental causes and their associated chain of rail freight accidents and reduce the chance of accidents from the source. First, we use structured ra...
-
Chapter and Conference Paper
System Development of Operation Ecological Chain of E-commerce Service Outsourcing Enterprises Under Data Mining Technology
At present, with the continuous expansion of the number and scale of enterprises, e-commerce service outsourcing, as an emerging product, has encountered some challenges in its development process. With the ac...
-
Chapter and Conference Paper
Multi-view Detection Method for UAVs Based on Probabilistic Fusion
Human detection by a single unmanned aerial vehicle (UAV) is easily limited by the angle of view, which cannot obtain enough feature information about objects. To solve this problem, this paper proposes a mult...
-
Chapter and Conference Paper
An UAVs-Assisted Edge Computing Network with Multi-agent Reinforcement Learning
After installing a wireless communication module and computing equipment on the UAV (Unmanned Aerial Vehicle), the UAV can provide better communication coverage and even edge computing services for ground node...
-
Chapter and Conference Paper
Dynamic Modeling of Active Towing System and Simulation Verification of Position and Attitude Control
Compared with the passive towing system, which can realize the precise stability of the towed buoy track through the co-motion of the mother aircraft and the cable retraction, the active towing system with the...
-
Chapter and Conference Paper
Network Security Defense System Design Strategy Based on Big Data and Artificial Intelligence Technology
With the development of computer technology, big data and the application of deep learning have been deeply rooted in people’s hearts, and the network security defense system based on big data and neural netwo...
-
Chapter and Conference Paper
Rolling Bearing Fault Diagnosis Method Based on GWO-VMD-SVM
As one of the most critical components of high-speed locomotives, wheelset bearings have received increasing attention in recent years. However, the non-smooth vibration signal and heavy background noise make ...