期刊文献+
共找到904篇文章
< 1 2 46 >
每页显示 20 50 100
Huffman-Code-Based Ternary Tree Transformation
1
作者 Qing-Song Li Huan-Yu Liu +2 位作者 Qingchun Wang Yu-Chun Wu Guo-Ping Guo 《Chinese Physics Letters》 2025年第10期1-12,共12页
Using a quantum computer to simulate fermionic systems requires fermion-to-qubit transformations.Usually,lower Pauli weight of transformations means shallower quantum circuits.Therefore,most existing transformations a... Using a quantum computer to simulate fermionic systems requires fermion-to-qubit transformations.Usually,lower Pauli weight of transformations means shallower quantum circuits.Therefore,most existing transformations aim for lower Pauli weight.However,in some cases,the circuit depth depends not only on the Pauli weight but also on the coefficients of the Hamiltonian terms.In order to characterize the circuit depth of these algorithms,we propose a new metric called weighted Pauli weight,which depends on Pauli weight and coefficients of Hamiltonian terms.To achieve smaller weighted Pauli weight,we introduce a novel transformation,Huffman-code-based ternary tree(HTT)transformation,which is built upon the classical Huffman code and tailored to different Hamiltonians.We tested various molecular Hamiltonians and the results show that the weighted Pauli weight of the HTT transformation is smaller than that of commonly used mappings.At the same time,the HTT transformation also maintains a relatively small Pauli weight.The mapping we designed reduces the circuit depth of certain Hamiltonian simulation algorithms,facilitating faster simulation of fermionic systems. 展开更多
关键词 quantum computer weighted pauli weightwhich Huffman code based ternary tree transformation simulate fermionic systems fermion qubit transformations characterize circuit depth hamiltonian termsin fermionic systems
原文传递
Parallel Processing Design for LTE PUSCH Demodulation and Decoding Based on Multi-Core Processor
2
作者 Zhang Ziran,Li Jun,Li Changxiao(ZTE Corporation,Shenzhen 518057,P.R.China) 《ZTE Communications》 2009年第1期54-58,共5页
The Long Term Evolution (LTE) system imposes high requirements for dispatching delay.Moreover,very large air interface rate of LTE requires good processing capability for the devices processing the baseband signals.Co... The Long Term Evolution (LTE) system imposes high requirements for dispatching delay.Moreover,very large air interface rate of LTE requires good processing capability for the devices processing the baseband signals.Consequently,the single-core processor cannot meet the requirements of LTE system.This paper analyzes how to use multi-core processors to achieve parallel processing of uplink demodulation and decoding in LTE systems and designs an approach to parallel processing.The test results prove that this approach works quite well. 展开更多
关键词 CORE LTE Parallel Processing Design for LTE PUSCH Demodulation and Decoding based on multi-core Processor Design
在线阅读 下载PDF
Application of Clustering-based Decision Tree in the Screening of Maize Germplasm 被引量:2
3
作者 王斌 《Agricultural Science & Technology》 CAS 2011年第10期1449-1452,共4页
[Objective] This paper aims to construct an improved fuzzy decision tree which is based on clustering,and researches into its application in the screening of maize germplasm.[Method] A new decision tree algorithm base... [Objective] This paper aims to construct an improved fuzzy decision tree which is based on clustering,and researches into its application in the screening of maize germplasm.[Method] A new decision tree algorithm based upon clustering is adopted in this paper,which is improved against the defect that traditional decision tree algorithm fails to handle samples of no classes.Meanwhile,the improved algorithm is also applied to the screening of maize varieties.Through the indices as leaf area,plant height,dry weight,potassium(K) utilization and others,maize seeds with strong tolerance of hypokalemic are filtered out.[Result] The algorithm in the screening of maize germplasm has great applicability and good performance.[Conclusion] In the future more efforts should be made to compare improved the performance of fuzzy decision tree based upon clustering with the performance of traditional fuzzy one,and it should be applied into more realistic problems. 展开更多
关键词 FCM Decision tree based upon clustering Screening indices Tolerance of hypokalemic
在线阅读 下载PDF
Milling Fault Detection Method Based on Fault Tree Analysis and Hierarchical Belief Rule Base 被引量:1
4
作者 Xiaoyu Cheng Mingxian Long +1 位作者 Wei He Hailong Zhu 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2821-2844,共24页
Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the mil... Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model.However,due to the complexity of the milling system structure and the uncertainty of the milling failure index,it is often impossible to construct model expert knowledge effectively.Therefore,a milling system fault detection method based on fault tree analysis and hierarchical BRB(FTBRB)is proposed.Firstly,the proposed method uses a fault tree and hierarchical BRB modeling.Through fault tree analysis(FTA),the logical correspondence between FTA and BRB is sorted out.This can effectively embed the FTA mechanism into the BRB expert knowledge base.The hierarchical BRB model is used to solve the problem of excessive indexes and avoid combinatorial explosion.Secondly,evidence reasoning(ER)is used to ensure the transparency of the model reasoning process.Thirdly,the projection covariance matrix adaptation evolutionary strategies(P-CMA-ES)is used to optimize the model.Finally,this paper verifies the validity model and the method’s feasibility techniques for milling data sets. 展开更多
关键词 Fault detection milling system belief rule base fault tree analysis evidence reasoning
在线阅读 下载PDF
Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks 被引量:1
5
作者 Amir Hossein Mohajerzadeh Mohammad Hossien Yaghmaee 《Wireless Sensor Network》 2010年第2期161-167,共7页
Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of ... Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of course the most important issue is their energy constraint. Energy aware routing protocol is very important in WSN, but routing protocol which only considers energy has not efficient performance. Therefore considering other parameters beside energy efficiency is crucial for protocols efficiency. Depending on sensor network application, different parameters can be considered for its protocols. Congestion management can affect routing protocol performance. Congestion occurrence in network nodes leads to increasing packet loss and energy consumption. Another parameter which affects routing protocol efficiency is providing fairness in nodes energy consumption. When fairness is not considered in routing process, network will be partitioned very soon and then the network performance will be decreased. In this paper a Tree based Energy and Congestion Aware Routing Protocol (TECARP) is proposed. The proposed protocol is an energy efficient routing protocol which tries to manage congestion and to provide fairness in network. Simulation results shown in this paper imply that the TECARP has achieved its goals. 展开更多
关键词 CONGESTION Aware ENERGY Efficiency ROUTING PROTOCOL FAIRNESS tree based ROUTING Wireless Sensor Networks
在线阅读 下载PDF
基于tree part-based模型的目标识别和定位
6
作者 王丹 韩惠蕊 +2 位作者 田淞 臧雪柏 宋炳强 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2012年第S1期346-349,共4页
提出了一种基于tree part-based模型的目标识别和定位的方法。该方法将tree part-based模型应用于静态图像中单一目标的识别定位,使用可变形模板(Deformable template)处理测试图像,提取与训练模型中的每一部分关联度在一定阈值范围内... 提出了一种基于tree part-based模型的目标识别和定位的方法。该方法将tree part-based模型应用于静态图像中单一目标的识别定位,使用可变形模板(Deformable template)处理测试图像,提取与训练模型中的每一部分关联度在一定阈值范围内的特征点,结合外观模型和空间模型实现目标识别和定位。实验结果表明,该方法提高了目标识别和定位的准确率和可靠性。 展开更多
关键词 人工智能 tree part-based模型 目标识别 目标定位 可变形模板
在线阅读 下载PDF
Immunizations on small worlds of tree-based wireless sensor networks 被引量:1
7
作者 李峤 张百海 +2 位作者 崔灵果 范衠 Athanasios V.Vasilakos 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第5期25-33,共9页
The sensor virus is a serious threat,as an attacker can simply send a single packet to compromise the entire sensor network.Epidemics become drastic with link additions among sensors when the small world phenomena occ... The sensor virus is a serious threat,as an attacker can simply send a single packet to compromise the entire sensor network.Epidemics become drastic with link additions among sensors when the small world phenomena occur.Two immunization strategies,uniform immunization and temporary immunization,are conducted on small worlds of tree-based wireless sensor networks to combat the sensor viruses.With the former strategy,the infection extends exponentially,although the immunization effectively reduces the contagion speed.With the latter strategy,recurrent contagion oscillations occur in the small world when the spatial-temporal dynamics of the epidemic are considered.The oscillations come from the small-world structure and the temporary immunization.Mathematical analyses on the small world of the Cayley tree are presented to reveal the epidemic dynamics with the two immunization strategies. 展开更多
关键词 epidemic immunization small world tree-based networks
原文传递
HRM: H-tree based reconfiguration mechanism in reconfigurable homogeneous PE array 被引量:7
8
作者 Junyong Deng Lin Jiang +5 位作者 Yun Zhu Xiaoyan Xie Xinchuang Liu Feilong He Shuang Song L.K.John 《Journal of Semiconductors》 EI CAS CSCD 2020年第2期42-50,共9页
In order to accommodate the variety of algorithms with different performance in specific application and improve power efficiency,reconfigurable architecture has become an effective methodology in academia and industr... In order to accommodate the variety of algorithms with different performance in specific application and improve power efficiency,reconfigurable architecture has become an effective methodology in academia and industry.However,existing architectures suffer from performance bottleneck due to slow updating of contexts and inadequate flexibility.This paper presents an H-tree based reconfiguration mechanism(HRM)with Huffman-coding-like and mask addressing method in a homogeneous processing element(PE)array,which supports both programmable and data-driven modes.The proposed HRM can transfer reconfiguration instructions/contexts to a particular PE or associated PEs simultaneously in one clock cycle in unicast,multicast and broadcast mode,and shut down the unnecessary PE/PEs according to the current configuration.To verify the correctness and efficiency,we implement it in RTL synthesis and FPGA prototype.Compared to prior works,the experiment results show that the HRM has improved the work frequency by an average of 23.4%,increased the updating speed by 2×,and reduced the area by 36.9%;HRM can also power off the unnecessary PEs which reduced 51%of dynamic power dissipation in certain application configuration.Furthermore,in the data-driven mode,the system frequency can reach 214 MHz,which is 1.68×higher compared with the programmable mode. 展开更多
关键词 H-tree based reconfiguration mechanism(HRM) Huffman-coding-like addressing programmable mode data-driven mode homogeneous PE array
在线阅读 下载PDF
English BNP identification based on corpus-trained decision tree
9
作者 孟遥 赵铁军 +1 位作者 李生 张晓光 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第4期383-386,共4页
Finding simple, non recursive, base noun phrase is an important step for many natural language processing applications. This paper presents a new corpus based approach using decision tree for that purpose. In contrast... Finding simple, non recursive, base noun phrase is an important step for many natural language processing applications. This paper presents a new corpus based approach using decision tree for that purpose. In contrast to previous methods for Base NP identification, we adopt a decision tree trained from Penn Treebank to identify Base NP. And a self learning mechanism is further integrated into our model. Experimental results show good performances using our method. The method can also be applied to processing of any other language. 展开更多
关键词 base NP decision tree CORPUS
在线阅读 下载PDF
Study on Mesh-Control Device for the Mesh Generator Based on Tree Structures
10
作者 Wei Hongning Zhou Benkuan Inistitute of Computational Engineering Science, Southwest Jiaotong University, Chengdu 610031, China 《Journal of Modern Transportation》 1997年第1期27-36,共10页
In this paper, a process of the quadtree mesh generation is described, then a mesh control device of the tree based mesh generators is analyzed in detail. Some examples are given to demonstrate that the mesh contro... In this paper, a process of the quadtree mesh generation is described, then a mesh control device of the tree based mesh generators is analyzed in detail. Some examples are given to demonstrate that the mesh control device allows for efficient a priori and a posteriori mesh refinements. 展开更多
关键词 adaptive finite element mesh control device tree based mesh generation mesh refinement
在线阅读 下载PDF
An Enhanced Energy Efficiency Tree-Based Hierarchical Routing Based on Additional Connections
11
作者 Shuangyin Ren Chao Peng +1 位作者 Lei He Liquan Xiao 《International Journal of Communications, Network and System Sciences》 2017年第5期208-218,共11页
Instrumented is defined as a key characteristic in the upcoming smart cites, which demands a higher Wireless Sensor Networks (WSNs) performance. Tree-based Hierarchical Routing (THR) is a routing protocol for WSNs sta... Instrumented is defined as a key characteristic in the upcoming smart cites, which demands a higher Wireless Sensor Networks (WSNs) performance. Tree-based Hierarchical Routing (THR) is a routing protocol for WSNs static scenarios. THR hierarchically maps WSN area into a routing tree. However, fixed topology and hierarchical architecture leads to unbalanced energy overhead distribution and inflexible routes selection. To uniformly distribute routing energy overhead, reduce routing hops and extend network life cycle, we designed an enhanced THR routing protocol based on additional connections such as Neighbors, Brothers and Nephews. Based on these connections, three actions were introduced which are Shortcut, Overhead Balancing and Adoption. A simulation for different network loads on OMNet++4.1 is issued, and realized this THR routing in Chipcon SmartRF04?EB embedded boards based on Zigbee in a point-to-point topology. According to the simulation results and experiment data, this proposal obviously improved the latency performance, reduced energy overhead and extended the network’s life cycle. 展开更多
关键词 Wireless Sensor Networks (WSNs) OMNET++ Zigbee tree based Hierarchical ROUTING (THR)
在线阅读 下载PDF
基于KD-tree和CBR的封闭区物流需求预测方法研究
12
作者 景彬 胡思涛 沙雯怡 《淮阴工学院学报》 2025年第5期1-9,共9页
在突发事件所导致的封闭区域中,居民的物流需求会呈现非线性变化,致使传统需求预测方法无法适应该情况。为有效预测封闭区内物流需求,提出了一种基于K阶二叉搜索树(K-dimension tree,KD-tree)和案例推理法(Case-based reasoning,CBR)的... 在突发事件所导致的封闭区域中,居民的物流需求会呈现非线性变化,致使传统需求预测方法无法适应该情况。为有效预测封闭区内物流需求,提出了一种基于K阶二叉搜索树(K-dimension tree,KD-tree)和案例推理法(Case-based reasoning,CBR)的物流需求预测方法。首先确定影响居民物流需求的内部特征因子、外部特征因子与突变特征因子,对特征因子进行量化处理并作为预案库的检索依据;其次通过现有案例建立CBR预案库;然后根据各特征因子的方差平稳度模型建立预案的三维空间点集,依据KD-tree分割原则检索得出最相似预案。在检索过程中,通过方差平稳度不断分割点集的空间来确定突发事件所在的点集空间,进而确定最相似预案。最后基于不同小区的显著性特征对结果进行理论优化。在实际的案例计算之中,建立50个案例,最终划分为14个点集空间,按照与突发事件最邻近的点集中的数据为最终结果判定区域,最终结果为第9个空间中的预案即预案34,并对比分析其与传统CBR的优势。研究结果表明,基于KD-tree和CBR的预测方法相较传统CBR预测方法具有更好的精确度和运算效率,更适配封闭区的需求非线性变化,研究成果可以为封闭区物流需求预测提供科学方法指导。 展开更多
关键词 交通安全 物流需求 案例推理法(CBR) KD-tree
在线阅读 下载PDF
Code Clone Detection Method Based on the Combination of Tree-Based and Token-Based Methods
13
作者 Ryota Ami Hirohide Haga 《Journal of Software Engineering and Applications》 2017年第13期891-906,共16页
This article proposes the high-speed and high-accuracy code clone detection method based on the combination of tree-based and token-based methods. Existence of duplicated program codes, called code clone, is one of th... This article proposes the high-speed and high-accuracy code clone detection method based on the combination of tree-based and token-based methods. Existence of duplicated program codes, called code clone, is one of the main factors that reduces the quality and maintainability of software. If one code fragment contains faults (bugs) and they are copied and modified to other locations, it is necessary to correct all of them. But it is not easy to find all code clones in large and complex software. Much research efforts have been done for code clone detection. There are mainly two methods for code clone detection. One is token-based and the other is tree-based method. Token-based method is fast and requires less resources. However it cannot detect all kinds of code clones. Tree-based method can detect all kinds of code clones, but it is slow and requires much computing resources. In this paper combination of these two methods was proposed to improve the efficiency and accuracy of detecting code clones. Firstly some candidates of code clones will be extracted by token-based method that is fast and lightweight. Then selected candidates will be checked more precisely by using tree-based method that can find all kinds of code clones. The prototype system was developed. This system accepts source code and tokenizes it in the first step. Then token-based method is applied to this token sequence to find candidates of code clones. After extracting several candidates, selected source codes will be converted into abstract syntax tree (AST) for applying tree-based method. Some sample source codes were used to evaluate the proposed method. This evaluation proved the improvement of efficiency and precision of code clones detecting. 展开更多
关键词 Code Clone Token-based DETECTION tree-based DETECTION tree EDIT Distance
暂未订购
Object-based Analysis for Extraction of Dominant Tree Species
14
作者 Meiyun SHAO Xia JING Lu WANG 《Asian Agricultural Research》 2015年第7期57-59,共3页
As forest is of great significance for our whole development and the sustainable plan is so focus on it. It is very urgent for us to have the whole distribution,stock volume and other related information about that. S... As forest is of great significance for our whole development and the sustainable plan is so focus on it. It is very urgent for us to have the whole distribution,stock volume and other related information about that. So the forest inventory program is on our schedule. Aiming at dealing with the problem in extraction of dominant tree species,we tested the highly hot method-object-based analysis. Based on the ALOS image data,we combined multi-resolution in e Cognition software and fuzzy classification algorithm. Through analyzing the segmentation results,we basically extract the spruce,the pine,the birch and the oak of the study area. Both the spectral and spatial characteristics were derived from those objects,and with the help of GLCM,we got the differences of each species. We use confusion matrix to do the Classification accuracy assessment compared with the actual ground data and this method showed a comparatively good precision as 87% with the kappa coefficient 0. 837. 展开更多
关键词 tree SPECIES Object-based ANALYSIS HIGH-RESOLUTION
在线阅读 下载PDF
A Statistical Analysis of Textual E-Commerce Reviews Using Tree-Based Methods
15
作者 Jessica Kubrusly Ana Luiza Neves Thamires Louzada Marques 《Open Journal of Statistics》 2022年第3期357-372,共16页
With the increasing interest in e-commerce shopping, customer reviews have become one of the most important elements that determine customer satisfaction regarding products. This demonstrates the importance of working... With the increasing interest in e-commerce shopping, customer reviews have become one of the most important elements that determine customer satisfaction regarding products. This demonstrates the importance of working with Text Mining. This study is based on The Women’s Clothing E-Commerce Reviews database, which consists of reviews written by real customers. The aim of this paper is to conduct a Text Mining approach on a set of customer reviews. Each review was classified as either a positive or negative review by employing a classification method. Four tree-based methods were applied to solve the classification problem, namely Classification Tree, Random Forest, Gradient Boosting and XGBoost. The dataset was categorized into training and test sets. The results indicate that the Random Forest method displays an overfitting, XGBoost displays an overfitting if the number of trees is too high, Classification Tree is good at detecting negative reviews and bad at detecting positive reviews and the Gradient Boosting shows stable values and quality measures above 77% for the test dataset. A consensus between the applied methods is noted for important classification terms. 展开更多
关键词 Text Mining Supervised Classification tree-based Methods Classification trees Random Forest Gradient Boosting XGBoost
在线阅读 下载PDF
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
16
作者 Pino Caballero-Gil Francisco Martín-Fernández Cándido Caballero-Gil 《Journal of Computer and Communications》 2014年第9期14-21,共8页
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless au... This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in such networks, the use of a dynamic authenticated data structure based on perfect k-ary hash trees combined with a duplex version of the new standard SHA-3 is here presented. Efficient algorithms in the used revocation trees allow reaching a refresh rate of at most simple updates per inserted node. Consequently, the proposal is especially useful for situations with frequent revocations, which are foreseeable when vehicular ad- hoc networks are widely deployed. 展开更多
关键词 K-Ary tree IDENTITY-based Cryptography REVOCATION Hash Function Vehicular AD-HOC Network
在线阅读 下载PDF
Web-based推荐系统中的会话推荐多样性研究 被引量:2
17
作者 李晶皎 孙丽梅 王骄 《小型微型计算机系统》 CSCD 北大核心 2014年第6期1265-1269,共5页
Web-based推荐系统通常用推荐的准确性来衡量推荐算法的优劣,而Web-based推荐系统中用户的浏览行为以会话为单位,因此用户会话期内推荐的多样性是评价Web-based推荐系统推荐质量的一个重要指标.提出会话推荐多样性的概念,提出了一种能... Web-based推荐系统通常用推荐的准确性来衡量推荐算法的优劣,而Web-based推荐系统中用户的浏览行为以会话为单位,因此用户会话期内推荐的多样性是评价Web-based推荐系统推荐质量的一个重要指标.提出会话推荐多样性的概念,提出了一种能够提高会话推荐多样性的融合协同过滤算法,在用户会话期内建立会话推荐列表,有效避免会话推荐树中出现推荐环路,消除会话推荐树中的重复推荐.通过Movielens数据集测试表明,提出的方法可以大幅度提高Web-based推荐系统的会话推荐多样性,同时也提高了推荐准确率. 展开更多
关键词 Web-based推荐系统 会话推荐多样性 会话推荐树 融合协同过滤
在线阅读 下载PDF
Mining condensed frequent subtree base
18
作者 王涛 卢炎生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期48-53,共6页
In frequent tree pattern mining, the number of frequent subtrees generated is often too large. To tackle this problem, the concept of condensed frequent subtree base is proposed. The base consists of the maximal frequ... In frequent tree pattern mining, the number of frequent subtrees generated is often too large. To tackle this problem, the concept of condensed frequent subtree base is proposed. The base consists of the maximal frequent subtrees for a series of support thresholds. It is a subset of frequent subtrees, and is used to approximate the support of arbitrary frequent subtrees with guaranteed maximal error bound. In addition, an algorithm is developed to mine such a condensed subtree base in a database of labeled rooted ordered trees. The algorithm adopts the way of fight-most extension to generate systematically all frequent rooted ordered subtrees. Several techniques are proposed to prune the branches that do not correspond to the maximal frequent subtrees. Heuristic techniques are used to arrange the order of computation so that relatively expensive computation is avoided as much as possible. Experimental results show that the size of the base is less than 10% of that of the complete set, and the algorithm outperforms the previous algorithms. 展开更多
关键词 data mining tree pattern condensed subtree base
在线阅读 下载PDF
Global optimization of manipulator base placement by means of rapidly-exploring random tree
19
作者 赵京 Hu Weijian +1 位作者 Shang Hong Du Bin 《High Technology Letters》 EI CAS 2016年第1期24-29,共6页
Due to the interrelationship between the base placement of the manipulator and its operation object,it is significant to analyze the accessibility and workspace of manipulators for the optimization of their base locat... Due to the interrelationship between the base placement of the manipulator and its operation object,it is significant to analyze the accessibility and workspace of manipulators for the optimization of their base location.A new method is presented to optimize the base placement of manipulators through motion planning optimization and location optimization in the feasible area for manipulators.Firstly,research problems and contents are outlined.And then the feasible area for the manipulator base installation is discussed.Next,index depended on the joint movements and used to evaluate the kinematic performance of manipulators is defined.Although the mentioned indices in last section are regarded as the cost function of the latter,rapidly-exploring random tree(RRT) and rapidly-exploring random tree*(RRT*) algorithms are analyzed.And then,the proposed optimization method of manipulator base placement is studied by means of simulation research based on kinematic performance criteria.Finally,the conclusions could be proved effective from the simulation results. 展开更多
关键词 base placement rapidly-exploring random tree (RRT) rapidly-exploring random tree (RRT*) OPTIMIZATION
在线阅读 下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部