Showing 141 - 160 results of 502 for search '(( while shark algorithm ) OR ( while share algorithm ))*', query time: 0.10s Refine Results
  1. 141

    Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets by WANG Dongchu, FU Yusun, YU Ya

    Published 2025-06-01
    “…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
    Get full text
    Article
  2. 142
  3. 143
  4. 144

    A Computable Phenotype Algorithm for Postvaccination Myocarditis/Pericarditis Detection Using Real-World Data: Validation Study by Matthew Deady, Raymond Duncan, Matthew Sonesen, Renier Estiandan, Kelly Stimpert, Sylvia Cho, Jeffrey Beers, Brian Goodness, Lance Daniel Jones, Richard Forshee, Steven A Anderson, Hussein Ezzeldin

    Published 2024-11-01
    “…MethodsWe detected cases by sharing and applying computable phenotype algorithms to real-world data in health care providers’ electronic health records databases. …”
    Get full text
    Article
  5. 145

    Class-aware multi-source domain adaptation algorithm for medical image analysis using reweighted matrix matching strategy. by Huiying Zhang, Yongmeng Li, Lei He, Wenbo Zhang, Yuchen Shen, Lumin Xing

    Published 2025-01-01
    “…This algorithm employs a class-aware strategy to strengthen positive transfer effects between similar classes. …”
    Get full text
    Article
  6. 146

    Target tracking algorithm for wireless sensor networks based on particle swarm optimization and metropolis-hasting sampling particle filter by Peng JIANG, Hua-hua SONG, Guang LIN

    Published 2013-11-01
    “…For the characteristic of the nonlinear relationship between the observation information of sensor nodes and the target dynamic parameters under the real application conditions, a target tracking algorithm for wireless sensor networks based on particle swarm optimization and Metropolis-Hasting sampling particle filter was proposed. …”
    Get full text
    Article
  7. 147

    Optimization of Operation Strategy of Multi-Islanding Microgrid Based on Double-Layer Objective by Zheng Shi, Lu Yan, Yingying Hu, Yao Wang, Wenping Qin, Yan Liang, Haibo Zhao, Yongming Jing, Jiaojiao Deng, Zhi Zhang

    Published 2024-09-01
    “…Combined with the non-cooperative game theory, the alternating direction multiplier method is used to reduce the shared energy storage service cost. The simulation results show that shared energy storage can optimize the allocation of multi-party resources by flexibly adjusting the control mode, improving the efficiency of resource utilization while improving the consumption of renewable energy, meeting the power demand of all parties, and realizing the sharing of energy storage resources. …”
    Get full text
    Article
  8. 148

    Features of development and analysis of the simulation model of a multiprocessor computer system by O. M. Brekhov, G. A. Zvonareva, V. V. Ryabov

    Published 2017-07-01
    “…The simulation results show the unevenness of kernel utilization, downtime in queues to shared resources and temporary losses while waiting for other cores due to information dependencies. …”
    Get full text
    Article
  9. 149

    Economic Load Dispatch of A Multi‐Area Power System Using Multi‐Agent Distributed Optimization Based on Genetic Algorithm by Seyed Yaser Fakhrmousavi, Seyed Babak Mazafari, Shahram Javadi, Mahmood Hosseini Aliabadi

    Published 2025-04-01
    “…The objective of each agent in each area is to minimize generation costs and meet its own area's load demand while maintaining voltage profiles. Each agent sets the power generation values of resources in each area using the genetic algorithm rules and then solves the distributed power flow equations using the proposed method. …”
    Get full text
    Article
  10. 150

    Social Media Suicide Watch by Katherine Prothro

    Published 2025-07-01
    “…Her own Twitter account revealed signals of her worsening mental health crisis.[1] While better content censoring could have helped, an algorithm capable of detecting her worsening mental state and alerting trusted individuals could have also served as a crucial safety net. …”
    Get full text
    Article
  11. 151

    Optimal Distributed Dispatch of Smart Multi-Agent Energy Hubs Based on Consensus Algorithm Considering Lossy Communication Network and Uncertainty by Abdelfattah A. Eladl, Magda I. El-Afifi, Magdi M. El-Saadawi, Bishoy E. Sedhom

    Published 2025-01-01
    “…This paper proposes an IoT-Fog-Cloud distributed consensus algorithm for solving the energy hub (EH) dispatch problem with packet-dropping communication links and some of EH elements' uncertainties. …”
    Get full text
    Article
  12. 152

    A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms by Yangbo Chen, Wei Ou, Mengxue Pang, Jianqiang Ma, Qiuling Yue, Wenbao Han

    Published 2025-04-01
    “…These features enable flexible data sharing while ensuring the protection of sensitive information. …”
    Get full text
    Article
  13. 153

    Incorporating Prior Information in Latent Structures Identification for Panel Data Models by Yi Li, Xingxing Luo, Mengqi Liao

    Published 2025-05-01
    “…The latent structure in panel models allows individuals to be classified into several distinct groups, where the individuals within the same group share the same slope parameters, while the group-specific parameters are heterogeneous. …”
    Get full text
    Article
  14. 154

    Research on Day-Ahead Optimal Scheduling of Wind–PV–Thermal–Pumped Storage Based on the Improved Multi-Objective Jellyfish Search Algorithm by Yunfei Hu, Kefei Zhang, Sheng Liu, Zhong Wang

    Published 2025-04-01
    “…As the share of renewable energy in modern power systems continues to grow, its inherent uncertainty and variability pose severe challenges to grid stability and the accuracy of traditional thermal power dispatch. …”
    Get full text
    Article
  15. 155

    Extending Artery/OMNeT++ for Evaluating V2X Sensor Fusion Algorithms With Infrastructure Support in Cooperative Advanced Driver Assistance Systems by Hamdan Hejazi, Andras Wippelhauser, Laszlo Bokor

    Published 2025-01-01
    “…This allows RSUs to detect non-V2X-equipped vehicles and vulnerable road users (VRUs), allowing the RSU to share the data via V2X, thereby improving situational awareness and cooperative perception. …”
    Get full text
    Article
  16. 156

    Efficient and secure multi-party computation protocol supporting deep learning by Shancheng Zhang, Gang Qu, Zongyang Zhang, Minzhe Huang, Haochun Jin, Liqun Yang

    Published 2025-07-01
    “…Abstract Privacy-preserving deep learning based on secure multi-party computation (MPC) has emerged as a critical research focus in recent years. While existing approaches predominantly employ additive secret sharing with a fixed number of parties, they have yet to fully leverage the more efficient Shamir-based schemes. …”
    Get full text
    Article
  17. 157

    Analysis of Public Sentiment Towards POLRI's Performance using Naive Bayes and K-Nearest Neighbors by Yusuf Handika, Isa Faqihuddin Hanif, Firman Noor Hasan

    Published 2024-06-01
    “…The assessment from confusion matrix results demonstrate that the Naive Bayes algorithm achieves 99.03% accuracy, while the K-Nearest Neighbors algorithm achieves 95.33% accuracy. …”
    Get full text
    Article
  18. 158

    Building a Radionuclide Metrology Algorithm Comparison Platform (NuCodeComP): Insights from Rapid Integration with Microsoft PowerApps by Macedo Eric, Haoran Liu, Fan Zihao, Navarro Marcus, Peixoto José Guilherme, Coulon Romain

    Published 2025-01-01
    “…The drag-and-drop interface simplifies the platform’s development in interface design while utilizing SharePoint tables for data structuring and access control. …”
    Get full text
    Article
  19. 159
  20. 160

    Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption by Wenbao Jiang, Jin Ding, Haibao Zhang

    Published 2025-03-01
    “…It employs the Paillier homomorphic encryption algorithm to update transaction amounts and uses the FO commitment-based zero-knowledge proof scheme to validate transaction legality. …”
    Get full text
    Article