Showing 181 - 200 results of 504 for search '(white OR while) share algorithm', query time: 0.13s Refine Results
  1. 181

    Coordinated Optimal Dispatch of Distribution Grids and P2P Energy Trading Markets by Jing Deng, Fawu He, Qingbin Zeng, Jie Yan, Rangxiong Liu, Dongsheng He, Song Zhou

    Published 2025-05-01
    “…This study proposes a bi‐level optimization framework for distribution networks integrating peer‐to‐peer (P2P) energy trading and shared energy storage. The upper‐level model minimizes distribution system operator (DSO) operational costs, including network losses and storage management, while ensuring voltage stability. …”
    Get full text
    Article
  2. 182

    A Semi-Distributed Scheme for Mode Selection and Resource Allocation in Device-to-Device-Enabled Cellular Networks Using Matching Game and Reinforcement Learning by Ibrahim Sami Attar, Nor Muzlifah Mahyuddin, M. H. D. Nour Hindia

    Published 2025-02-01
    “…Furthermore, we suggest that the sub-channel of the CU is shared among several D2D pairs, and the optimum power is determined for each D2D pair sharing the same sub-channel, taking into consideration all types of interferences in the network. …”
    Get full text
    Article
  3. 183

    Wireless Protocol-Based Control of Smart Electric Drive Using Sampled Time Secure Communication of Chaotic Systems by Nhat Quang Dang, Huyen Chau Phan Thi, Quang Dich Nguyen, van Nam Giap

    Published 2025-01-01
    “…To further enhance the control precision, a homogeneous super-twisting algorithm (HSTA)-based disturbance observer (DO) is introduced, effectively compensating for external perturbations and ensuring smooth operation. …”
    Get full text
    Article
  4. 184

    Artificial Intelligence-driven optimization of V2G and charging point selection en-route: A systematic literature review by Christoph Sommer, M.J. Hossain

    Published 2025-04-01
    “…The common implementation of electric vehicles (EVs) necessitates effective integration strategies to ensure their seamless interaction with the electrical grid while meeting private EV customer preferences and enhancing grid stability. …”
    Get full text
    Article
  5. 185
  6. 186
  7. 187

    Improved Sliding Mode Active Disturbance Rejection Control for Single-inductance Dual-output Buck Converter by HUANG Jinfeng, ZHOU Jie

    Published 2025-07-01
    “…However, because both output branches share a single inductor, significant cross-coupling arises during input voltage transients and load disturbances, degrading output voltage performance. …”
    Get full text
    Article
  8. 188

    Overcoming Fairness and Latency Challenges in BBR With an Adaptive Delay Detection by Zewei Han, Go Hasegawa

    Published 2025-01-01
    “…In 2016, Google introduced a new congestion control algorithm called Bottleneck Bandwidth and Round-trip propagation time (BBR). …”
    Get full text
    Article
  9. 189

    Genetic Links Between Common Lung Diseases and Lung Cancer Progression: Bioinformatics and Machine Learning Insights by Md Ali Hossain, Tania Akter Asa, Md. Zulfiker Mahmud, AKM Azad, Mohammad Zahidur Rahman, Mohammad Ali Moni, Ahmed Moustafa

    Published 2025-04-01
    “…We began by identifying differentially expressed genes (DEGs) in LC and CLDs, and our gene-disease network revealed for the first time shared DEGs (LC shares significant genes with TB (36), asthma (10), pneumonia (17), COPD (18), and Idiopathic Pulmonary Fibrosis (IPF) (78)), providing insights into potential connections of LC with CLDs. …”
    Get full text
    Article
  10. 190
  11. 191

    A Reconfigurable Framework for Hybrid Quantum–Classical Computing by Pratibha, Naveed Mahmud

    Published 2025-05-01
    “…The proposed framework integrates field-programmable gate arrays (FPGAs) with quantum processing units (QPUs) for deploying HQC algorithms. The classical subroutines of the algorithms are accelerated on FPGA fabric using a high-throughput processing pipeline, while quantum subroutines are executed on the QPUs. …”
    Get full text
    Article
  12. 192

    PBD-YOLO: Dual-Strategy Integration of Multi-Scale Feature Fusion and Weak Texture Enhancement for Lightweight Particleboard Surface Defect Detection by Haomeng Guo, Zheming Chai, Huize Dai, Lei Yan, Pengle Cheng, Jianhua Yang

    Published 2025-04-01
    “…In order to improve the algorithm’s ability to detect multi-scale defects, this study introduced the ShareSepHead (Share Separated Head) and C2f_SAC (C2f module with Switchable Atrous Convolution) modules. …”
    Get full text
    Article
  13. 193

    Low Cost Safety Data Storage and Processing Framework Under Cloud Environment by Limin Zhang

    Published 2015-02-01
    “…The framework studied data mining algorithms based on the matrix, whose focus was the secure Top-k feature vector algorithm. …”
    Get full text
    Article
  14. 194

    Long-Term Multiyear Transmission Expansion Planning in Turkish Power System by Ahmet Ova, Erdi Dogan, Sevki Demirbas

    Published 2024-01-01
    “…In this study, a new binary version of the original FBI algorithm called the BFBI (binary forensic-based investigation) algorithm is developed to solve the binary TEP problem. …”
    Get full text
    Article
  15. 195

    A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals by Yanbing Liu, Shousheng Jia, Congcong Xing

    Published 2012-01-01
    “…The security of smart mobile terminals has been an increasingly important issue in recent years. While there are extensive researches on virus detections for smart mobile terminals, most of them share the same framework of virus detection as that for personal computers, and few of them tackle the problem from the standpoint of detection methodology. …”
    Get full text
    Article
  16. 196

    Application-centric congestion control by Danny De Vleeschauwer, Chia-Yu Chang, Koen De Schepper, Chrysa Papagianni

    Published 2025-06-01
    “…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
    Get full text
    Article
  17. 197

    The nonlinear impact of cycling environment on bicycle distance: A perspective combining objective and perceptual dimensions by Yantang Zhang, Xiaowei Hu

    Published 2024-03-01
    “…Land use demonstrates a threshold effect, with cycling distances increasing when the recreational facilities share exceeds 8%, transport facilities share remains below 25%, and commercial facilities share stays below 30%. …”
    Get full text
    Article
  18. 198

    Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy by Rania El-Badry, Moustafa Youssef, Ahmed Sultan

    Published 2010-01-01
    “…The Hidden Anchor algorithm exploits the inherently noisy wireless channel and uses identity cloning of neighboring trusted nodes to make anchors unobservable to un-trusted nodes while providing complete information to trusted nodes. …”
    Get full text
    Article
  19. 199

    Geometric Degree Reduction of Wang–Ball Curves by Yusuf Fatihu Hamza, Mukhtar Fatihu Hamza, Abedallah Rababah, Salisu Ibrahim

    Published 2023-01-01
    “…There are substantial methods of degree reduction in the literature. Existing methods share some common limitations, such as lack of geometric continuity, complex computations, and one-degree reduction at a time. …”
    Get full text
    Article
  20. 200

    Unitanony: a fine-grained and practical anonymization framework for better data utility by Shuguang Yuan, Jing Yu, Tengfei Yang, Chi Chen

    Published 2025-07-01
    “…K-anonymity and l-diversity secure against identity and attribute disclosure. Anonymization algorithms enforce the above models and are willing to reach two primary goals: achieving the privacy objective while maximizing data utility. …”
    Get full text
    Article