-
41
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…Additionally, our external sharing algorithm resolves the prevalent issue of medical data silos by facilitating better data categorization and enabling selective, secure external sharing through the social blockchain. …”
Get full text
Article -
42
Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations
Published 2017-01-01“…To achieve these two goals, an iterative fast Fourier transform (FFT) algorithm is used to synthesize sum and difference patterns with the main focus on obtaining a maximum allowable sharing percentage in the element excitations. …”
Get full text
Article -
43
Predicting Trip Duration and Distance in Bike-Sharing Systems Using Dynamic Time Warping
Published 2025-12-01“…Bike-sharing systems (BSSs) have recently become important in urban transportation due to several factors, such as their cost-effectiveness and environmental considerations. …”
Get full text
Article -
44
Robust QoT Assured Resource Allocation in Shared Backup Path Protection Based EONs
Published 2022-01-01“…Next, we employ our SBPP-IA algorithm for dynamic traffic scenario and compare it with existing algorithms in terms of different QoT parameters. …”
Get full text
Article -
45
Deep deterministic policy gradient-based automatic negotiation framework for shared decision-making
Published 2025-07-01“…Abstract Shared Decision-Making (SDM), a patient-centered approach to medical care, improves treatment outcomes and patient satisfaction. …”
Get full text
Article -
46
Space-time spectrum sharing based on game theory:dynamic access and penalty strategy
Published 2023-12-01“…To tackle the challenge of inefficient utilization of spatiotemporal spectrum resources in heterogeneous networks, a reliable spectrum sharing strategy based on game theory was proposed for scenarios where multiple secondary users dynamically access through sensing spatiotemporal spectrum opportunities.Firstly, secondary users sensed the activity state of primary users through channel sampling and subsequently seek suitable spatiotemporal spectrum opportunities.Each secondary user aimed to access more spectrum resources while preventing quality degradation between primary users.Consequently, a negotiation of individual utilities between secondary and primary users was needed, in order to reach a mixed Nash equilibrium.When the secondary user's transmission power was abnormal, its behavior would be regarded as a violation.Then, a backoff time compensation algorithm was presented to penalize the secondary users, according to the number of violations and active nodes in the network.Finally, simulation results validate the effectiveness of the spatiotemporal spectrum opportunities sharing strategy with the penalty mechanism.…”
Get full text
Article -
47
Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying
Published 2012-11-01“…An opportunistic spectrum sharing protocol based on OFDM cooperation relaying was proposed.When the primary user experiences weak channel conditions,it could not achieve its target rate.If the cognitive user could help the primary user achieve its target rate,it accessed the pectrum of the primary user in the cooperation way.In this access way,the cognitive user used a fraction of the subcarriers to amplify-and-forward the signal of the primary user,to help the primary user achieve its target rate.And uses the remained subcarriers to transmit its own signal.The resource allocation was analyzed in this cooperation way.An optimal resource allocation algorithm based on dual ethod was proposed,which maximized the rate of the cognitive user while g anteeing the primary user achieve its target rate.If the cognitive user could not help the primary user achieve its target rate,to make use the spectrum efficiently,the cognitive user accessed the spectrum of the primary user in the non-cooperation way,and uses the whole accessed spectrum to transmit its own signal.The simulation demonstrates the efficiency of the proposed spectrum sharing protocol as well as its benefit to both primary and cognitive user.…”
Get full text
Article -
48
CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity
Published 2025-01-01“…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. In many cases, deep neural networks (DNNs) serve as the backbone algorithm in federated processes. …”
Get full text
Article -
49
NCG-TSM: A Noncooperative Game for the Taxi Sharing Model in Urban Road Networks
Published 2023-01-01“…Taxi sharing is a promising method to save resource consumption and alleviate traffic congestion while satisfying people’s commuting needs. …”
Get full text
Article -
50
A method of vehicle networking environment information sharing based on distributed fountain code
Published 2024-01-01“…Secondly, we design a mobile prediction model and information transmission control algorithm to reduce traffic while ensuring information reliability. …”
Get full text
Article -
51
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Conclusions: The ciphertext policy hiding access control scheme based on blockchain and supporting data sharing constructed in this paper solves the problems of single point of failure, low efficiency, non-support for data sharing and privacy leakage in traditional attribute-based encryption schemes.Firstly,the attribute vector and policy vector generation algorithm proposed in this paper not only supports AND-gates on+/-,but also supports AND-gates on multi-valued attributes by extension. …”
Get full text
Article -
52
Exploring the Shared Genetic Characteristics of Peri-Implantitis and Osteoporosis: A Transcriptomic Analysis Perspective
Published 2025-10-01“…This study aimed to investigate the shared genes and molecular mechanisms underlying the co-pathogenesis of peri-implantitis and osteoporosis. …”
Get full text
Article -
53
An enhanced image protection framework: polynomial-based secret sharing meets information hiding
Published 2025-07-01“…Abstract The security of modern communication requires not only the confidentiality of communication content but also the concealment of communication behavior. Secret image sharing has emerged as a prominent research topic in recent years, aiming to transfer meaningful shares while ensuring that covert communication activities remain hidden from potential attackers' monitoring and analysis. …”
Get full text
Article -
54
Navigating the landscape: Unveiling the reflection of AI in the sharing economy through bibliometric-based approach
Published 2024-12-01“…Additionally, AI plays a crucial role in promoting energy-efficient behaviour in smart accommodations, while algorithmic oversight is increasingly integrated into digital labour platforms to balance automation with human dignity. …”
Get full text
Article -
55
Heterogeneous Multi-Agent Deep Reinforcement Learning for Cluster-Based Spectrum Sharing in UAV Swarms
Published 2025-05-01“…However, due to the scarcity of spectrum resources, UAV swarm clustering technology has emerged as an effective method for achieving spectrum sharing among UAV swarms. This paper introduces a distributed heterogeneous multi-agent deep reinforcement learning algorithm, named HMDRL-UC, which is specifically designed to address the cluster-based spectrum sharing problem in heterogeneous UAV swarms. …”
Get full text
Article -
56
Joint Allocation of Shared Yard Space and Internal Trucks in Sea–Rail Intermodal Container Terminals
Published 2025-05-01“…Numerical experiments verify the model and algorithm performance, revealing that the proposed method achieves an optimality gap of only 1.82% compared to CPLEX in small-scale instances while outperforming benchmark algorithms in solution quality. …”
Get full text
Article -
57
Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment
Published 2023-11-01“…., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
Get full text
Article -
58
A Distribution Model for Shared Parking in Residential Zones that Considers the Utilization Rate and the Walking Distance
Published 2020-01-01“…The results demonstrate that the proposed model increases the occupying rates of parking lots in residential zones while decreasing the walking distance. The shared use of parking spaces maximizes the utility and alleviates the shortage of parking spaces in downtown.…”
Get full text
Article -
59
Research on Laser Radar Inspection Station Planning of Vehicle Body-In-White (BIW) with Complex Constraints
Published 2025-05-01“…Firstly, a parametric geometric modeling approach is developed to define measurement spaces for individual features, accompanied by an innovative maximal complete subgraph mining algorithm to intelligently identify shared feasible measurement regions among multiple features. …”
Get full text
Article -
60
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Published 2025-03-01Get full text
Article