Results 111 to 120 of about 106,193 (320)

Optisense: Computational Optimization for Strain Sensor Placement in Wearable Motion Tracking Systems

open access: yesAdvanced Intelligent Systems, EarlyView.
A computational framework for optimizing strain sensor placement in wearable motion tracking systems is presented. By combining dense strain mapping with a genetic algorithm, the method discovers counterintuitive yet highly effective configurations that reduce joint angle error by 32%.
Minu Kim   +4 more
wiley   +1 more source

Collaborative Multiagent Closed‐Loop Motion Planning for Multimanipulator Systems

open access: yesAdvanced Intelligent Systems, EarlyView.
This work presents a hierarchical multi‐manipulator planner, emphasizing highly overlapping space. The proposed method leverages an enhanced Dynamic Movement Primitive based planner along with an improvised Multi‐Agent Reinforcement Learning approach to ensure regulatory and mediatory control while ensuring low‐level autonomy. Experiments across varied
Tian Xu, Siddharth Singh, Qing Chang
wiley   +1 more source

Nonzero-sum risk-sensitive stochastic differential games: A multi-parameter eigenvalue problem approach [PDF]

open access: yesSystems & control letters (Print), 2022
M. K. Ghosh   +3 more
semanticscholar   +1 more source

Stochastic differential games involving impulse controls [PDF]

open access: yesESAIM: Control, Optimisation and Calculus of Variations, 2010
A zero sum stochastic differential game is considered wherein one player controls a controlled diffusion via a continuously applied control, while the other player uses impulse control that discontinuously changes the trajectory at discrete time instants of player's choice.
openaire   +1 more source

Human‐Machine Mutual Trust Based Shared Control Framework for Intelligent Vehicles

open access: yesAdvanced Intelligent Systems, EarlyView.
This work introduces a bidirectional‐trust‐driven shared control framework for human‐machine co‐driving. The method models human‐to‐machine trust from intention discrepancies and Bayesian skill assessment, and machine‐to‐human trust from integrated ability evaluation.
Zhishuai Yin   +4 more
wiley   +1 more source

Optimal Pursuit Strategies in Missile Interception: Mean Field Game Approach

open access: yesAerospace
This paper investigates Mean Field Game methods to solve missile interception strategies in three-dimensional space, with a focus on analyzing the pursuit–evasion problem in many-to-many scenarios. By extending traditional missile interception models, an
Yu Bai, Di Zhou, Zhen He
doaj   +1 more source

Non‐Synaptic Function and Localization of Syntaxin‐Binding Protein 1 in a Mouse Model of STXBP1‐Related Epileptic Encephalopathy

open access: yesAnnals of Neurology, EarlyView.
Objective De novo mutations in the syntaxin‐binding protein 1 (STXBP1), encoded by STXBP1, are among the most prevalent causes of variable neurodevelopmental disorders, including epileptic encephalopathy, developmental delay, and movement disorders.
Tao Yang   +7 more
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

A review of the historic and present ecological role of aquatic and shoreline wood, from forest to deep sea

open access: yesBiological Reviews, EarlyView.
ABSTRACT The ecology of forests, their losses, and terrestrial wood decomposition dynamics have been intensively studied and reviewed. In the aquatic realm, reviews have concentrated on large wood (LW) in rivers and the transition from freshwater to marine environments in the Pacific Northwest of North America. However, a comprehensive global synthesis
Jon Dickson   +9 more
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy