Showing 141 - 160 results of 207 for search '(( while shark optimization algorithm ) OR ( while share optimization algorithm ))', query time: 0.11s Refine Results
  1. 141

    Deployment and Operation of Battery Swapping Stations for Electric Two-Wheelers Based on Machine Learning by Yu Feng, Xiaochun Lu

    Published 2022-01-01
    “…With the rapid development of shared electric bicycles and takeaways, the scale of electric two-wheeler users is expanding while generating a huge demand for battery swapping. …”
    Get full text
    Article
  2. 142

    Integrated Vehicle-to-Building and Vehicle-to-Home Services for Residential and Worksite Microgrids by Andrea Bonfiglio, Manuela Minetti, Riccardo Loggia, Lorenzo Frattale Mascioli, Andrea Golino, Cristina Moscatiello, Luigi Martirano

    Published 2025-06-01
    “…In particular, this paper describes the coordination between a battery management algorithm that optimally assigns its capacity so that at least a part is reserved for mobility and a vehicle-to-building (V2B) service algorithm that uses a share of EV battery energy to improve user participation in renewable energy exploitation at home and at work. …”
    Get full text
    Article
  3. 143

    FLDQN: Cooperative Multi-Agent Federated Reinforcement Learning for Solving Travel Time Minimization Problems in Dynamic Environments Using SUMO Simulation by Abdul Wahab Mamond, Majid Kundroo, Seong-eun Yoo, Seonghoon Kim, Taehong Kim

    Published 2025-02-01
    “…FLDQN leverages federated learning to facilitate collaboration and knowledge sharing among intelligent agents, optimizing vehicle routing and reducing congestion in dynamic traffic environments. …”
    Get full text
    Article
  4. 144

    Semantic RF Waveform Adaptation in Flying Ad Hoc Networks via Hybrid Knowledge Bases and Deep Reinforcement Learning by Weiqiang Lyu, Linsheng He, Jiamiao Zhao, Fei Hu

    Published 2025-01-01
    “…We propose a framework that jointly optimizes modulation order and cyclic prefix length while considering the semantic importance of transmitted data. …”
    Get full text
    Article
  5. 145

    Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks by Zeinab Sasan, Siavash Khorsandi

    Published 2025-07-01
    “…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
    Get full text
    Article
  6. 146
  7. 147

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
    Get full text
    Article
  8. 148

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
    Get full text
    Article
  9. 149

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.…”
    Get full text
    Article
  10. 150

    RIS-Aided Integrated Sensing and Communication Systems: STAR-RIS Versus Passive RIS? by Prajwalita Saikia, Anand Jee, Keshav Singh, Cunhua Pan, Wan-Jen Huang, Theodoros A. Tsiftsis

    Published 2024-01-01
    “…The proposed algorithm is also shown to be effective in delivering nearly optimal design outcomes in scenario where the channel state information is imperfect (ICSI). …”
    Get full text
    Article
  11. 151

    Generalized BER Performance Analysis for SIC-Based Uplink NOMA by Mahmoud AlaaEldin, Emad Alsusa, Mohammad Al-Jarrah, Karim G. Seddik, Michail Matthaiou

    Published 2025-01-01
    “…It is shown that these expressions are essential for designing optimal uplink power allocation (PA) strategies and mitigating SIC error floors, as evidenced by the proposed PA algorithm which achieves significant performance gains. …”
    Get full text
    Article
  12. 152

    Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions by Dandu Varalakshmi, N Shirisha, K Suresh, Saidhbi Shaik, V Venkatesh, C F Theresa Cenate

    Published 2025-01-01
    “…Moreover, the use of smart contracts for decentralized identity management minimizes single points of failure, allowing for strict access controls to share the data as needed in a secure manner. The framework naturally integrates with major cloud service providers while being GDPR, HIPAA, and SOC 2 complaint to alleviate regulatory burden. …”
    Get full text
    Article
  13. 153

    Domain generalization for image classification based on simplified self ensemble learning. by Zhenkai Qin, Xinlu Guo, Jun Li, Yue Chen

    Published 2025-01-01
    “…Specifically, we frame the problem as an optimization process with the objective of minimizing a weighted loss function that balances cross-domain discrepancies and sample complexity. …”
    Get full text
    Article
  14. 154

    Artificial intelligence in vaccine research and development: an umbrella review by Rabie Adel El Arab, May Alkhunaizi, May Alkhunaizi, Yousef N. Alhashem, Alissar Al Khatib, Munirah Bubsheet, Salwa Hassanein, Salwa Hassanein

    Published 2025-05-01
    “…AI‑driven multi‑omic integration accelerated epitope mapping, shrinking discovery timelines by months, while predictive analytics optimized manufacturing workflows and supply‑chain operations (including temperature‑controlled, “cold‑chain” logistics). …”
    Get full text
    Article
  15. 155

    DMCM: Dwo-branch multilevel feature fusion with cross-attention mechanism for infrared and visible image fusion. by Xicheng Sun, Fu Lv, Yongan Feng, Xu Zhang

    Published 2025-01-01
    “…Additionally, a lightweight cross-attention fusion module is introduced, optimizing the use of differential and shared features while minimizing computational complexity. …”
    Get full text
    Article
  16. 156

    Zero-shot performance analysis of large language models in sumrate maximization. by Ali Abir Shuvro, Md Shahriar Islam Bhuiyan, Faisal Hussain, Md Sakhawat Hossen

    Published 2025-01-01
    “…In the field of Networking, LLMs can also play a major role when it comes to resource optimization and sharing. While Sumrate maximization has been a crucial factor for resource optimization in the networking domain, the optimal or sub-optimal algorithms it requires can be cumbersome to comprehend and implement. …”
    Get full text
    Article
  17. 157

    Analysis of influencing factors and equity in hospitalization expense reimbursement for mobile populations based on random forest model: a cross-sectional study from China by Lisheng Shen, Xinan Lu, Yanyun Zhang, Lin Fei, Bo Dong

    Published 2025-08-01
    “…Secondly, the random forest algorithm was applied to evaluate the importance of the factors influencing hospitalization expense reimbursement. …”
    Get full text
    Article
  18. 158

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…Secondly, as the model requires target recognition and segmentation of different types of tasks, an efficient layer aggregation network (RepGFPN) with skip layer connection structure is adopted to optimize the feature fusion part, greatly improving the detection accuracy of the model for different detection tasks while controlling the number of model parameters and inference speed; Finally, to address the detection tasks of three different label shapes, the Inner CIOU loss function is introduced to compensate for the weak generalization ability of the CIoU loss function in different detection tasks. …”
    Get full text
    Article
  19. 159

    Projecting Forest Fire Probability in South Korea Under Climate Change, Population, and Forest Management Scenarios Using AI & Process-Based Hybrid Model (FLAM-Net) by Hyun-Woo Jo, Myoungsoo Won, Florian Kraxner, Seong Woo Jeon, Yowhan Son, Andrey Krasovskiy, Woo-Kyun Lee

    Published 2025-01-01
    “…Enhancements included improving backpropagation for optimization and introducing algorithms for national-specific fire ignition dynamics. …”
    Get full text
    Article
  20. 160

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure device communication. …”
    Get full text
    Article