Showing 61 - 80 results of 502 for search '(( while shark algorithm ) OR ( while share algorithm ))', query time: 0.17s Refine Results
  1. 61

    Joint Allocation of Shared Yard Space and Internal Trucks in Sea–Rail Intermodal Container Terminals by Xiaohan Wang, Zhihong Jin, Jia Luo

    Published 2025-05-01
    “…Numerical experiments verify the model and algorithm performance, revealing that the proposed method achieves an optimality gap of only 1.82% compared to CPLEX in small-scale instances while outperforming benchmark algorithms in solution quality. …”
    Get full text
    Article
  2. 62

    Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment by Qianpiao MA, Qingmin JIA, Jianchun LIU, Hongli XU, Renchao XIE, Tao HUANG

    Published 2023-11-01
    “…., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
    Get full text
    Article
  3. 63

    A Distribution Model for Shared Parking in Residential Zones that Considers the Utilization Rate and the Walking Distance by Wenhui Zhang, Fan Gao, Shurui Sun, Qiuying Yu, Jinjun Tang, Bohang Liu

    Published 2020-01-01
    “…The results demonstrate that the proposed model increases the occupying rates of parking lots in residential zones while decreasing the walking distance. The shared use of parking spaces maximizes the utility and alleviates the shortage of parking spaces in downtown.…”
    Get full text
    Article
  4. 64
  5. 65

    A Long-Term Shared Autonomous Vehicle System Design Problem considering Relocation and Pricing by Jingjing Tian, Hongfei Jia, Guanfeng Wang, Yu Lin, Ruiyi Wu, Ao Lv

    Published 2022-01-01
    “…Compared to conventional private vehicles (CPVs), shared autonomous vehicles (SAVs) provide users the potential for the reduced value of time (VoT), improved mobility experience, and less traffic congestion. …”
    Get full text
    Article
  6. 66

    An Adaptive Wireless Droop Control with Adaptive Virtual Resistance for Power Sharing Management in MTDC Grid by Hasan Alrajhi , Ahmed Al-Zahrani , Syed A. Raza , Fahad Al-Shareef 

    Published 2025-05-01
    “…The main objective of this methodology is to increase the reliability of the MTDC system by eliminating the need for fast communication links and ensuring proper power sharing between inverters. Additionally, this communication-free scheme includes a power management algorithm that controls power sharing during peak hours of the inverters among the rectifiers as per mutual agreements between the operators to mitigate the risk of a system overload and optimize the power sharing. …”
    Get full text
    Article
  7. 67
  8. 68

    Heterogeneity in willingness to share personal health information: a nationwide cluster analysis of 20,000 adults in Japan by Miho Sassa, Akifumi Eguchi, Keiko Maruyama-Sakurai, Takanori Fujita, Yumi Kawamura, Takayuki Kawashima, Yuta Tanoue, Daisuke Yoneoka, Hiroaki Miyata, Takanori Yamashita, Naoki Nakashima, Shuhei Nomura

    Published 2025-04-01
    “…Abstract Background While Personal Health Records (PHRs) are increasingly adopted globally, understanding public attitudes toward health information sharing remains crucial for successful implementation. …”
    Get full text
    Article
  9. 69

    C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks by Dapeng Wu, Jian Liu, Yangliang Wan, Zhigang Yang, Ruyan Wang, Xinqi Lin

    Published 2025-04-01
    “…With the increasing popularity of digital photography and Internet technology, more and more users are sharing images on CPN. However, many images are shared without any privacy processing, exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI) algorithms. …”
    Get full text
    Article
  10. 70

    Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users by Bangyan Chen, Jun Ye

    Published 2025-02-01
    “…This research proposes a method to safely share the effort of multiple users in an encrypted state and perform the reinforcement learning with outsourcing service to reduce users calculations combined with the homomorphic properties of cryptographic algorithms and multi-key ciphertext fusion mechanism. …”
    Get full text
    Article
  11. 71
  12. 72

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…Second, in order to further reduce the size of the model while ensuring the detection accuracy, Feature Interaction Shared Detection Head (FISH) is introduced. …”
    Get full text
    Article
  13. 73

    e-Fuel: An EV-Friendly Urgent Electrical Charge-Sharing Model with Preference-Based Off-Grid Services by Ahmad Nahar Quttoum, Mohammed N. AlJarrah, Fawaz A. Khasawneh, Mohammad Bany Taha

    Published 2024-11-01
    “…In e-Fuel, we are proposing a stable weight-based vehicle-to-vehicle matching algorithm, through which drivers of EVs will be capable of requesting instant mobile charge-sharing service for their EVs. …”
    Get full text
    Article
  14. 74

    Shared blood gene signature in lung adenocarcinoma and microbial lung infections: a bioinformatic analysis and in silico validation by Milad Sheervalilou, Mostafa Ghanei, Masoud Arabfard

    Published 2025-07-01
    “…Immune cell infiltration was assessed using xCell deconvolution algorithm. Results Ninety-three significant DEGs were shared between LUAD and infection datasets, including 40 upregulated and 53 downregulated genes. …”
    Get full text
    Article
  15. 75

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
    Get full text
    Article
  16. 76

    A Modified Nearest Level Control Scheme for Improved Submodule Current Sharing in a CHB Converter with Integrated EDLCs by Viktor Döhlen, Kent Bertilsson

    Published 2025-03-01
    “…A modification of the sort and select algorithm to determine which submodule is to be inserted and bypassed when using the Nearest Level Control algorithm is proposed to distribute the activation time and the experienced RMS current of the submodules. …”
    Get full text
    Article
  17. 77

    Appling A Hybrid Encryption Algorithm in Cloud Computing‎ by Esraa Alobaydi, Muna Jawhar

    Published 2024-06-01
    “…While these algorithms are diverse, effective, and strong in protection, ‌which yields the contribution significantly to increasing the level of security in the field of storing ‌sensitive data in the cloud. …”
    Get full text
    Article
  18. 78

    Tunnel Crack Segmentation Algorithm Based on Feature Enhancement by Lihua Feng, Aijun Yao, An Huang

    Published 2025-01-01
    “…However, due to the complex lighting conditions, background noise, and diverse nature of cracks inside tunnels, traditional image segmentation algorithms often struggle to achieve sufficient accuracy in crack segmentation tasks. …”
    Get full text
    Article
  19. 79

    Investigation of Load Sharing and Dynamic Load Characteristics of a Split Torque Transmission System with Double-Helical Gear Modification by Xuan Liu, Zongde Fang, Haitao Jia, Ning Zhao, Yunbo Shen, Hui Guo, Xijin Zhang

    Published 2021-01-01
    “…Following the modification of a double-helical gear, the dynamic load characteristics of the split torque transmission system are significantly improved, while its load sharing characteristics are improved to a certain extent.…”
    Get full text
    Article
  20. 80

    SSPRD: A Shared-Storage-Based Hardware Packet Reordering and Deduplication System for Multipath Transmission in Wide Area Networks by Jiandong Ma, Zhichuan Guo, Mangu Song

    Published 2024-10-01
    “…We also develop a sub-buffer-based timeout event handling algorithm. While supporting four sessions, SSPRD achieves a deep reorder buffer on hardware, with a depth of up to 15,360 packets per session. …”
    Get full text
    Article