ABSTRACT: NILM (Nonintrusive Load Monitoring) or appliance recognition software that uses algorithms, namely Hidden Markov Model (HMM) and Factorial HMM, to detect changes in electricity values ...
ABSTRACT: With the advent of the 5G and future 6G, base stations will be used as station controllers. The antenna systems are networked and equipped with a processor to optimize the detection of ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
Abstract: This article presents a novel knowledge-based genetic algorithm (GA) to generate a collision-free path in complex environments. The proposed algorithm infuses specific domain knowledge into ...
Creative Commons (CC): This is a Creative Commons license. Attribution (BY): Credit must be given to the creator. We present an artificial intelligence-guided approach to design durable and chemically ...
This paper deals with the two-dimensional strip packing problem (2D-SPP) with the order/or multi-drop and vertical stability constraints. The existing exact algorithm that solves this problem is not ...
Escape behaviors help animals avoid harm from predators and other threats in the environment. Successful escape relies on integrating information from multiple stimulus modalities (of external or ...