-
181
Coordinated Optimal Dispatch of Distribution Grids and P2P Energy Trading Markets
Published 2025-05-01“…This study proposes a bi‐level optimization framework for distribution networks integrating peer‐to‐peer (P2P) energy trading and shared energy storage. The upper‐level model minimizes distribution system operator (DSO) operational costs, including network losses and storage management, while ensuring voltage stability. …”
Get full text
Article -
182
A Semi-Distributed Scheme for Mode Selection and Resource Allocation in Device-to-Device-Enabled Cellular Networks Using Matching Game and Reinforcement Learning
Published 2025-02-01“…Furthermore, we suggest that the sub-channel of the CU is shared among several D2D pairs, and the optimum power is determined for each D2D pair sharing the same sub-channel, taking into consideration all types of interferences in the network. …”
Get full text
Article -
183
Wireless Protocol-Based Control of Smart Electric Drive Using Sampled Time Secure Communication of Chaotic Systems
Published 2025-01-01“…To further enhance the control precision, a homogeneous super-twisting algorithm (HSTA)-based disturbance observer (DO) is introduced, effectively compensating for external perturbations and ensuring smooth operation. …”
Get full text
Article -
184
Artificial Intelligence-driven optimization of V2G and charging point selection en-route: A systematic literature review
Published 2025-04-01“…The common implementation of electric vehicles (EVs) necessitates effective integration strategies to ensure their seamless interaction with the electrical grid while meeting private EV customer preferences and enhancing grid stability. …”
Get full text
Article -
185
-
186
The Petawawa Research Forest: Establishment of a remote sensing supersite
Published 2019-12-01Get full text
Article -
187
Improved Sliding Mode Active Disturbance Rejection Control for Single-inductance Dual-output Buck Converter
Published 2025-07-01“…However, because both output branches share a single inductor, significant cross-coupling arises during input voltage transients and load disturbances, degrading output voltage performance. …”
Get full text
Article -
188
Overcoming Fairness and Latency Challenges in BBR With an Adaptive Delay Detection
Published 2025-01-01“…In 2016, Google introduced a new congestion control algorithm called Bottleneck Bandwidth and Round-trip propagation time (BBR). …”
Get full text
Article -
189
Genetic Links Between Common Lung Diseases and Lung Cancer Progression: Bioinformatics and Machine Learning Insights
Published 2025-04-01“…We began by identifying differentially expressed genes (DEGs) in LC and CLDs, and our gene-disease network revealed for the first time shared DEGs (LC shares significant genes with TB (36), asthma (10), pneumonia (17), COPD (18), and Idiopathic Pulmonary Fibrosis (IPF) (78)), providing insights into potential connections of LC with CLDs. …”
Get full text
Article -
190
-
191
A Reconfigurable Framework for Hybrid Quantum–Classical Computing
Published 2025-05-01“…The proposed framework integrates field-programmable gate arrays (FPGAs) with quantum processing units (QPUs) for deploying HQC algorithms. The classical subroutines of the algorithms are accelerated on FPGA fabric using a high-throughput processing pipeline, while quantum subroutines are executed on the QPUs. …”
Get full text
Article -
192
PBD-YOLO: Dual-Strategy Integration of Multi-Scale Feature Fusion and Weak Texture Enhancement for Lightweight Particleboard Surface Defect Detection
Published 2025-04-01“…In order to improve the algorithm’s ability to detect multi-scale defects, this study introduced the ShareSepHead (Share Separated Head) and C2f_SAC (C2f module with Switchable Atrous Convolution) modules. …”
Get full text
Article -
193
Low Cost Safety Data Storage and Processing Framework Under Cloud Environment
Published 2015-02-01“…The framework studied data mining algorithms based on the matrix, whose focus was the secure Top-k feature vector algorithm. …”
Get full text
Article -
194
Long-Term Multiyear Transmission Expansion Planning in Turkish Power System
Published 2024-01-01“…In this study, a new binary version of the original FBI algorithm called the BFBI (binary forensic-based investigation) algorithm is developed to solve the binary TEP problem. …”
Get full text
Article -
195
A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals
Published 2012-01-01“…The security of smart mobile terminals has been an increasingly important issue in recent years. While there are extensive researches on virus detections for smart mobile terminals, most of them share the same framework of virus detection as that for personal computers, and few of them tackle the problem from the standpoint of detection methodology. …”
Get full text
Article -
196
Application-centric congestion control
Published 2025-06-01“…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
Get full text
Article -
197
The nonlinear impact of cycling environment on bicycle distance: A perspective combining objective and perceptual dimensions
Published 2024-03-01“…Land use demonstrates a threshold effect, with cycling distances increasing when the recreational facilities share exceeds 8%, transport facilities share remains below 25%, and commercial facilities share stays below 30%. …”
Get full text
Article -
198
Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy
Published 2010-01-01“…The Hidden Anchor algorithm exploits the inherently noisy wireless channel and uses identity cloning of neighboring trusted nodes to make anchors unobservable to un-trusted nodes while providing complete information to trusted nodes. …”
Get full text
Article -
199
Geometric Degree Reduction of Wang–Ball Curves
Published 2023-01-01“…There are substantial methods of degree reduction in the literature. Existing methods share some common limitations, such as lack of geometric continuity, complex computations, and one-degree reduction at a time. …”
Get full text
Article -
200
Unitanony: a fine-grained and practical anonymization framework for better data utility
Published 2025-07-01“…K-anonymity and l-diversity secure against identity and attribute disclosure. Anonymization algorithms enforce the above models and are willing to reach two primary goals: achieving the privacy objective while maximizing data utility. …”
Get full text
Article