Showing 41 - 60 results of 502 for search '(( while shark algorithm ) OR ( while share algorithm ))', query time: 0.15s Refine Results
  1. 41
  2. 42

    Learning-based cooperative content caching and sharing for multi-layer vehicular networks by Jun Shi, Yuanzhi Ni, Lin Cai, Zhuocheng Du

    Published 2025-06-01
    “…Caching and sharing the content files are critical and fundamental for various future vehicular applications. …”
    Get full text
    Article
  3. 43

    Optimal scheduling of distributed shared energy storage based on optimal SOC interval by Tong Zhang, Liudong Zhang, Yan Chen, Zhiqiang Peng

    Published 2025-02-01
    “…The paper delves into the scheduling techniques for SES. While conventional day-ahead robust optimization algorithms specify ESS power output for each period, they struggle to adjust schedules due to time-dependent constraints like renewable energy output and ESS state limitations. …”
    Get full text
    Article
  4. 44

    Diagnostics of Cognitive Development in Children by Assessing Shared Intentionality in a Biotechnical System by I. V. Danilov, N. I. Kurakina, S. Mihailova

    Published 2022-09-01
    “…We analyze our own previous research, in which: 1) the goal was to measure the intellectual activity of a group while stimulating their shared intentionality; 2) the independent variable was the intellectual task; 3) the stimuli of shared intentionality were described. …”
    Get full text
    Article
  5. 45

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  6. 46

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…Additionally, our external sharing algorithm resolves the prevalent issue of medical data silos by facilitating better data categorization and enabling selective, secure external sharing through the social blockchain. …”
    Get full text
    Article
  7. 47

    Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations by Jafar Ramadhan Mohammed

    Published 2017-01-01
    “…To achieve these two goals, an iterative fast Fourier transform (FFT) algorithm is used to synthesize sum and difference patterns with the main focus on obtaining a maximum allowable sharing percentage in the element excitations. …”
    Get full text
    Article
  8. 48

    Predicting Trip Duration and Distance in Bike-Sharing Systems Using Dynamic Time Warping by Ahmed Ali, Ahmad Salah, Mahmoud Bekhit, Ahmed Fathalla

    Published 2025-12-01
    “…Bike-sharing systems (BSSs) have recently become important in urban transportation due to several factors, such as their cost-effectiveness and environmental considerations. …”
    Get full text
    Article
  9. 49

    Robust QoT Assured Resource Allocation in Shared Backup Path Protection Based EONs by Venkatesh Chebolu, Sadananda Behera, Goutam Das

    Published 2022-01-01
    “…Next, we employ our SBPP-IA algorithm for dynamic traffic scenario and compare it with existing algorithms in terms of different QoT parameters. …”
    Get full text
    Article
  10. 50

    Deep deterministic policy gradient-based automatic negotiation framework for shared decision-making by Xin Chen, Ping Lu, Yong Liu, Fei-Ping Hong

    Published 2025-07-01
    “…Abstract Shared Decision-Making (SDM), a patient-centered approach to medical care, improves treatment outcomes and patient satisfaction. …”
    Get full text
    Article
  11. 51

    Space-time spectrum sharing based on game theory:dynamic access and penalty strategy by Yangyang NIU, Zhiqing WEI, Zhiyong FENG

    Published 2023-12-01
    “…To tackle the challenge of inefficient utilization of spatiotemporal spectrum resources in heterogeneous networks, a reliable spectrum sharing strategy based on game theory was proposed for scenarios where multiple secondary users dynamically access through sensing spatiotemporal spectrum opportunities.Firstly, secondary users sensed the activity state of primary users through channel sampling and subsequently seek suitable spatiotemporal spectrum opportunities.Each secondary user aimed to access more spectrum resources while preventing quality degradation between primary users.Consequently, a negotiation of individual utilities between secondary and primary users was needed, in order to reach a mixed Nash equilibrium.When the secondary user's transmission power was abnormal, its behavior would be regarded as a violation.Then, a backoff time compensation algorithm was presented to penalize the secondary users, according to the number of violations and active nodes in the network.Finally, simulation results validate the effectiveness of the spatiotemporal spectrum opportunities sharing strategy with the penalty mechanism.…”
    Get full text
    Article
  12. 52

    Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying by Wei-dang LU, Xuan-li WU, Xue-jun SHA, Nai-tong ZHANG

    Published 2012-11-01
    “…An opportunistic spectrum sharing protocol based on OFDM cooperation relaying was proposed.When the primary user experiences weak channel conditions,it could not achieve its target rate.If the cognitive user could help the primary user achieve its target rate,it accessed the pectrum of the primary user in the cooperation way.In this access way,the cognitive user used a fraction of the subcarriers to amplify-and-forward the signal of the primary user,to help the primary user achieve its target rate.And uses the remained subcarriers to transmit its own signal.The resource allocation was analyzed in this cooperation way.An optimal resource allocation algorithm based on dual ethod was proposed,which maximized the rate of the cognitive user while g anteeing the primary user achieve its target rate.If the cognitive user could not help the primary user achieve its target rate,to make use the spectrum efficiently,the cognitive user accessed the spectrum of the primary user in the non-cooperation way,and uses the whole accessed spectrum to transmit its own signal.The simulation demonstrates the efficiency of the proposed spectrum sharing protocol as well as its benefit to both primary and cognitive user.…”
    Get full text
    Article
  13. 53

    CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity by Ogobuchi Daniel Okey, Demostenes Zegarra Rodriguez, Frederico Gadelha Guimaraes, Joao Henrique Kleinschmidt

    Published 2025-01-01
    “…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. In many cases, deep neural networks (DNNs) serve as the backbone algorithm in federated processes. …”
    Get full text
    Article
  14. 54

    NCG-TSM: A Noncooperative Game for the Taxi Sharing Model in Urban Road Networks by Liping Yan, Chan Peng, Yue Tang, Wenbo Zhang, Jing Wang, Yu Cai

    Published 2023-01-01
    “…Taxi sharing is a promising method to save resource consumption and alleviate traffic congestion while satisfying people’s commuting needs. …”
    Get full text
    Article
  15. 55

    A method of vehicle networking environment information sharing based on distributed fountain code by Jianhang Liu, Xinyao Wang, Haibin Zhai, Shibao Li, Xuerong Cui, Qian Zhang

    Published 2024-01-01
    “…Secondly, we design a mobile prediction model and information transmission control algorithm to reduce traffic while ensuring information reliability. …”
    Get full text
    Article
  16. 56

    Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing by Ruizhong DU, Tianhe ZHANG, Pengliang SHI

    Published 2022-06-01
    “…Conclusions: The ciphertext policy hiding access control scheme based on blockchain and supporting data sharing constructed in this paper solves the problems of single point of failure, low efficiency, non-support for data sharing and privacy leakage in traditional attribute-based encryption schemes.Firstly,the attribute vector and policy vector generation algorithm proposed in this paper not only supports AND-gates on+/-,but also supports AND-gates on multi-valued attributes by extension. …”
    Get full text
    Article
  17. 57

    Exploring the Shared Genetic Characteristics of Peri-Implantitis and Osteoporosis: A Transcriptomic Analysis Perspective by Churen Zhang, Feixiang Wang, Jianguo Ke, Cuihong Lin, Xiaohua Zeng, Qiuyan Yang, Qiaoling Cai

    Published 2025-10-01
    “…This study aimed to investigate the shared genes and molecular mechanisms underlying the co-pathogenesis of peri-implantitis and osteoporosis. …”
    Get full text
    Article
  18. 58

    An enhanced image protection framework: polynomial-based secret sharing meets information hiding by Xiaopeng Li, Zhengxin Fu, Yuan Gao, Bin Yu

    Published 2025-07-01
    “…Abstract The security of modern communication requires not only the confidentiality of communication content but also the concealment of communication behavior. Secret image sharing has emerged as a prominent research topic in recent years, aiming to transfer meaningful shares while ensuring that covert communication activities remain hidden from potential attackers' monitoring and analysis. …”
    Get full text
    Article
  19. 59

    Navigating the landscape: Unveiling the reflection of AI in the sharing economy through bibliometric-based approach by Veljko Uskoković, Milica Maričić, Aleksandra Dacić-Pilčević, Veljko Jeremić

    Published 2024-12-01
    “…Additionally, AI plays a crucial role in promoting energy-efficient behaviour in smart accommodations, while algorithmic oversight is increasingly integrated into digital labour platforms to balance automation with human dignity. …”
    Get full text
    Article
  20. 60

    Heterogeneous Multi-Agent Deep Reinforcement Learning for Cluster-Based Spectrum Sharing in UAV Swarms by Xiaomin Liao, Yulai Wang, Yang Han, You Li, Chushan Lin, Xuan Zhu

    Published 2025-05-01
    “…However, due to the scarcity of spectrum resources, UAV swarm clustering technology has emerged as an effective method for achieving spectrum sharing among UAV swarms. This paper introduces a distributed heterogeneous multi-agent deep reinforcement learning algorithm, named HMDRL-UC, which is specifically designed to address the cluster-based spectrum sharing problem in heterogeneous UAV swarms. …”
    Get full text
    Article