-
1
Algorithmic Gossiping: sharing and non-sharing that evolve algorithmic imaginaries to folk theories
Published 2025-05-01“…This paper presents a work-in-progress diary study exploring how algorithmic gossiping contributes to the transformation of individual, momentary algorithmic imaginaries into shared and consolidated folk theories. …”
Get full text
Article -
2
Comparative Study of White Shark Optimization and Combined Meta-Heuristic Algorithm for Enhanced MPPT in Photovoltaic Systems
Published 2025-04-01“…This paper proposes a novel hybrid metaheuristic algorithm (MHA) for maximum power point tracking (MPPT), integrating particle swarm optimization (PSO), the differential evolution algorithm (DEA), and the grey wolf optimizer (GWO). …”
Get full text
Article -
3
Key distribution and recovery algorithm based on Shamir's secret sharing
Published 2015-03-01“…In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. …”
Get full text
Article -
4
Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm
Published 2025-04-01“…This paper presents a multi-head attention-driven intrusion detection with improved white shark optimization algorithm (MHAID-IWSOA) methodology in IoT networks. …”
Get full text
Article -
5
Performance enhancement in blockchain based IoT data sharing using lightweight consensus algorithm
Published 2024-11-01Get full text
Article -
6
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01“…To tackle the challenges associated with the global sharing of individual health passports, including information fragmentation, privacy concerns, and the risk of counterfeiting, a blockchain-based scheme for the secure storage, sharing, and verification of individual health passports was developed. …”
Get full text
Article -
7
Security and Fairness in Multiparty Quantum Secret Sharing Protocol
Published 2025-01-01“…Several state-of-the-art studies aim to transpose classical secret sharing into the quantum realm, while maintaining their reliance on traditional network topologies (e.g., star, ring, and fully connected), and require that all the <inline-formula><tex-math notation="LaTeX">$n$</tex-math></inline-formula> players calculate the secret. …”
Get full text
Article -
8
Privacy-Preserving Data Uploading SchemeBased on Threshold Secret Sharing Algorithm for Internet of Vehicles
Published 2025-05-01“…Therefore, this study proposed a scheme called Privacy-Preserving Data Uploading Scheme (PriDUS), which relied on Threshold Secret Sharing Algorithm (TSSA). The scheme worked by grouping vehicle dynamically, calculating sub-IDs to replace real vehicle IDs during data uploads. …”
Get full text
Article -
9
Solving the Electric Share-A-Ride Problem Using a Hybrid Variable Neighborhood Search Algorithm
Published 2025-01-01“…The MIP model provides optimal solutions for small E-SARP instances using the CPLEX solver, while the HVNS algorithm is designed to solve larger E-SARP instances. …”
Get full text
Article -
10
Dynamic allocation of regional shared parking spaces based on assignment problem model
Published 2025-06-01“…The core concept of shared parking lies in the strategic allocation of parking spaces. …”
Get full text
Article -
11
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article -
12
Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem
Published 2025-07-01“…This study introduces a binary White Shark Optimizer (WSO) enhanced with V3 transfer functions, elitist binarization, and chaotic maps. …”
Get full text
Article -
13
Datacasting: TikTok’s Algorithmic Flow as Televisual Experience
Published 2025-02-01“…Recommendation algorithms have acquired a central role in the suggestion of content within both subscription video on demand (SVOD) and advertising-based video on demand (AVOD) services and media-sharing platforms. …”
Get full text
Article -
14
A framework for heat energy community planning with a special focus on cost sharing
Published 2024-11-01“…For the efficient and EC-suitable planning of a district heating grid, a shortest path problem is solved using Dijkstra’s algorithm. To address the issue of distributing investment costs among EC participants, eight different cost sharing scenarios are developed. …”
Get full text
Article -
15
Secure gray image sharing framework with adaptive key generation using image digest
Published 2025-03-01“…Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To mitigate the vulnerability in information sharing over public networks, it is crucial to develop privacy-preserving algorithms and system security schemes that ensure the safety, ownership and integrity of the information that travels through the network. …”
Get full text
Article -
16
A multi-objective optimization framework based on information sharing for serially connected robot design
Published 2025-08-01“…Experimental results show that the proposed algorithm outperforms the other design algorithm in most tasks. …”
Get full text
Article -
17
-
18
Integrated Scheduling Optimization for Multi-Line Production and Transportation of Prefabricated Components Considering Shared Resources
Published 2025-01-01“…This article adopts the genetic algorithm to design the solution algorithm for this model, and the effectiveness of the model and algorithm is verified through an example. …”
Get full text
Article -
19
Shared energy storage planning based on the adjustable potential of data center based on visual IOT platform
Published 2025-08-01“…Abstract To address the challenges of low utilization and poor economic efficiency associated with decentralized energy storage configurations in data centers, this study proposes a shared energy storage planning method for data center groups based on the adjustable potential of data center based on visual IOT platform, which leverages differences and complementarities in energy storage requirements under different scenarios to minimize investment costs while maximizing operational benefit. …”
Get full text
Article -
20
Zero-Error Frequency Regulation Control Method for Microgrids Based on Consensus Algorithm
Published 2020-10-01“…Through the consistency algorithm, the micro-power source in the micro-grid obtains the self-adjusting amount of the droop coefficient to achieve no static difference in the frequency of the micro-grid, while ensuring that the active power shares the load according to the rated capacity. …”
Get full text
Article