Showing 161 - 180 results of 502 for search '(( while shark algorithm ) OR ( while share algorithm ))*', query time: 0.15s Refine Results
  1. 161

    Decentralized Voltage Prediction in Multi-Area Distribution Systems: A Privacy-Preserving Collaborative Framework by Jianfeng Yan, Beibei Wang, Zhiqiang Wu, Zhengkai Ding

    Published 2025-01-01
    “…First, a privacy-preserving multi-objective XGBoost algorithm is developed to mitigate curious behavior through homomorphic encryption and minimal information sharing. …”
    Get full text
    Article
  2. 162

    Quantum Snowflake Algorithm (QSA): A Snowflake-Inspired, Quantum-Driven Metaheuristic for Large-Scale Continuous and Discrete Optimization with Application to the Traveling Salesma... by Zeki Oralhan, Burcu Oralhan

    Published 2025-05-01
    “…The Quantum Snowflake Algorithm (QSA) is a novel metaheuristic for both continuous and discrete optimization problems, combining collision-based diversity, quantum-inspired tunneling, superposition-based partial solution sharing, and local refinement steps. …”
    Get full text
    Article
  3. 163

    Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering by SHEN Bin, YUAN Wenjun, LI Xuan

    Published 2024-06-01
    “…In the second stage, an interference clustering-based resource allocation (IC-RA) algorithm was proposed, and the interference matrix was constructed according to the interference relations among UE sharing the same subchannel. …”
    Get full text
    Article
  4. 164

    Algorithm for phase distribution in power supply systems of single-phase electric receivers according to the criterion of minimization of the coefficient of load ununiformity of th... by A. A. Pesterev, S. S. Kostinskiy

    Published 2023-10-01
    “…The developed algorithm allowed producing brand-new engineering solutions while developing a design document for the power supply grid (design and detailed documentation stage). …”
    Get full text
    Article
  5. 165

    Improving Secrecy Capacity in the Face of Eavesdropping in SWIPT CIoT Networks With Actor-Critic DRL by Nada Abdel Khalek, Walaa Hamouda

    Published 2025-01-01
    “…We formulate the challenging non-convex optimization problem to maximize secrecy capacity while ensuring spectrum sharing and energy constraints and model the CIoT agent’s decision-making as a model-free Markov decision process (MDP). …”
    Get full text
    Article
  6. 166

    Line-Frame Combined Multi-Slit Hyperspectral Imaging System for Simplified and High-Precision UAV Remote Sensing Solution by Liangjie Huang, Xiyu Zhou, Jiamin Huang, Li Shao, Weimin Shen, Jiacheng Zhu

    Published 2025-01-01
    “…At the same time, the system employs a multislit time-sharing sampling strategy to enable repeated spectral measurements while reducing sampling loss and maintaining data authenticity. …”
    Get full text
    Article
  7. 167

    TMEM132A: a novel susceptibility gene for lung adenocarcinoma combined with venous thromboembolism identified through comprehensive bioinformatic analysis by Pei Xie, Yingli Liu, Pingping Bai, Yue Ming, Qi Zheng, Li Zhu, Yong Qi

    Published 2025-05-01
    “…This study utilized public databases to identify crosstalk genes (CGs) between LUAD and VTE, applied machine learning methods to discover shared diagnostic biomarkers, and explored their underlying mechanisms.MethodsDisease-specific genes for VTE were extracted from comprehensive genomic databases (CTD, DisGeNET, GeneCards, OMIM), while transcriptomic profiles of LUAD and VTE cohorts were retrieved from GEO via GEOquery implementation. …”
    Get full text
    Article
  8. 168

    Comprehensive Benefit Evaluation for Prefabricated Buildings Based on NSGA-II and Simulated Annealing Optimization Projection Pursuit Method by Fang Wang, Binbin Dai, Shiyu Song

    Published 2024-01-01
    “…Finally, the NSGA-II and simulated annealing algorithm optimization projection pursuit method are applied to solve and evaluate the comprehensive benefit model, obtaining the optimal prefabricated component solution with the best comprehensive benefits. …”
    Get full text
    Article
  9. 169
  10. 170
  11. 171

    Analyzing key users’ behavior trends in volunteer-based networks by Nofar Piterman, Tamar Makov, Michael Fire

    Published 2025-05-01
    “…We utilized data from over 2.4 million users on a peer-to-peer food-sharing online platform. Using our algorithm, we identified four key user behavior patterns over time to evaluate our algorithms. …”
    Get full text
    Article
  12. 172

    A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication by Tzung-Her Chen

    Published 2025-06-01
    “…The scheme combines Grover’s algorithm with the decoy photon technique to ensure secure quantum transmission. …”
    Get full text
    Article
  13. 173

    Deep Learning Techniques for Early Fault Detection in Bearings: An Intelligent Approach by Omar Mohammed Amin Ali, Rebin Abdulkareem Hamaamin, Shahab Wahhab Kareem

    Published 2025-02-01
    “…Machine learning (ML) and deep learning (DL) algorithms have improved image processing, speech recognition, defect detection, item identification, and medical sciences. …”
    Get full text
    Article
  14. 174

    Selected Topics in Management and Modeling of Complex Systems: Editorial Introduction to Issue 16 of CSIMQ by Peter Forbrig

    Published 2018-10-01
    “…The range of topics ends with the discussion of specific algorithms that allow entity clustering for Big Data analysis. …”
    Get full text
    Article
  15. 175

    Integration of software-based cognitive approaches and brain-like computer machinery for efficient cognitive computing by Chitrakant Banchhor, Manoj Kumar Rawat, Rahul Joshi, Dharmesh Dhabliya, Omkaresh Kulkarni, Sandeep Dwarkanath Pande, Umesh Pawar

    Published 2025-06-01
    “…This transformation has enhanced the Internet's role in information dissemination, resource sharing, and global connectivity, allowing for more efficient distribution of knowledge and services. …”
    Get full text
    Article
  16. 176

    Efficacy and safety of an algorithm using C-reactive protein to guide antibiotic therapy applied through a digital clinical decision support system: a study protocol for a randomis... by Vandack Nobre, Pedro R Povoa, Vitoria Moura Leite Rabelo Rezende, Isabela Nascimento Borges, Cecilia Gomez Ravetti, Renan Pedra De Souza, Paula Frizera Vassalo, Ana Clara de Paula Caldas, Felipe Rodrigues Gatto, Getulio Hideyoshi Okamura, Raquel Lopes de Brito Lacerda

    Published 2025-01-01
    “…Strategies that use biomarkers to guide antimicrobial therapy—most notably Procalcitonin (PCT) and C-reactive protein (CRP)—show promise in safely reducing patient antibiotic exposure. While CRP is less studied, it offers advantages such as lower cost and broader availability compared with PCT.Methods and analysis This randomised clinical trial aims to evaluate a novel algorithm for non-critically ill adult patients. …”
    Get full text
    Article
  17. 177

    Digital twin enhanced agile design of ship pipeline systems [version 2; peer review: 1 approved, 3 approved with reservations] by Xin Wang, Kang Cui, Xiaofen Shan, Zhinan Zhang

    Published 2025-01-01
    “…It predominantly relies on designers’ subjective experience, and it is marked by a lack of efficient knowledge sharing and the absence of smart pipe routing algorithms. …”
    Get full text
    Article
  18. 178

    Digital twin enhanced agile design of ship pipeline systems [version 1; peer review: 1 approved, 3 approved with reservations] by Xin Wang, Kang Cui, Xiaofen Shan, Zhinan Zhang

    Published 2024-03-01
    “…It predominantly relies on designers’ subjective experience, and it is marked by a lack of efficient knowledge sharing and the absence of smart pipe routing algorithms. …”
    Get full text
    Article
  19. 179

    The ethics of data mining in healthcare: challenges, frameworks, and future directions by Mohamed Mustaf Ahmed, Olalekan John Okesanya, Majd Oweidat, Zhinya Kawa Othman, Shuaibu Saidu Musa, Don Eliseo Lucero-Prisno III

    Published 2025-07-01
    “…Therefore, transparency must span three levels–dataset documentation, model interpretability, and post-deployment audit logging–to make algorithmic reasoning and failures traceable. Security vulnerabilities in the Internet of Medical Things (IoMT) and cloud-based health platforms amplify these risks, while corporate data-sharing deals complicate questions of data ownership and patient autonomy. …”
    Get full text
    Article
  20. 180