-
61
A Long-Term Shared Autonomous Vehicle System Design Problem considering Relocation and Pricing
Published 2022-01-01“…Compared to conventional private vehicles (CPVs), shared autonomous vehicles (SAVs) provide users the potential for the reduced value of time (VoT), improved mobility experience, and less traffic congestion. …”
Get full text
Article -
62
An Adaptive Wireless Droop Control with Adaptive Virtual Resistance for Power Sharing Management in MTDC Grid
Published 2025-05-01“…The main objective of this methodology is to increase the reliability of the MTDC system by eliminating the need for fast communication links and ensuring proper power sharing between inverters. Additionally, this communication-free scheme includes a power management algorithm that controls power sharing during peak hours of the inverters among the rectifiers as per mutual agreements between the operators to mitigate the risk of a system overload and optimize the power sharing. …”
Get full text
Article -
63
Game-based resource allocation in heterogeneous downlink CR-NOMA network without subchannel sharing
Published 2025-01-01Get full text
Article -
64
Heterogeneity in willingness to share personal health information: a nationwide cluster analysis of 20,000 adults in Japan
Published 2025-04-01“…Abstract Background While Personal Health Records (PHRs) are increasingly adopted globally, understanding public attitudes toward health information sharing remains crucial for successful implementation. …”
Get full text
Article -
65
Development of a Conditional Generative Adversarial Network Model for Television Spectrum Radio Environment Mapping
Published 2024-01-01“…The U-Net generator is a 3-channel input, 16-layer architecture while the PatchGan discriminator is a 6-channel input, 7-layer architecture. …”
Get full text
Article -
66
C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks
Published 2025-04-01“…With the increasing popularity of digital photography and Internet technology, more and more users are sharing images on CPN. However, many images are shared without any privacy processing, exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI) algorithms. …”
Get full text
Article -
67
Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users
Published 2025-02-01“…This research proposes a method to safely share the effort of multiple users in an encrypted state and perform the reinforcement learning with outsourcing service to reduce users calculations combined with the homomorphic properties of cryptographic algorithms and multi-key ciphertext fusion mechanism. …”
Get full text
Article -
68
Biologging intelligent Platform (BiP): an integrated and standardized platform for sharing, visualizing, and analyzing biologging data
Published 2025-04-01“…Abstract Sharing biologging data can facilitate collaborative research and biological conservation by providing maps showing animals’ distribution and movements. …”
Get full text
Article -
69
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…Second, in order to further reduce the size of the model while ensuring the detection accuracy, Feature Interaction Shared Detection Head (FISH) is introduced. …”
Get full text
Article -
70
e-Fuel: An EV-Friendly Urgent Electrical Charge-Sharing Model with Preference-Based Off-Grid Services
Published 2024-11-01“…In e-Fuel, we are proposing a stable weight-based vehicle-to-vehicle matching algorithm, through which drivers of EVs will be capable of requesting instant mobile charge-sharing service for their EVs. …”
Get full text
Article -
71
Shared blood gene signature in lung adenocarcinoma and microbial lung infections: a bioinformatic analysis and in silico validation
Published 2025-07-01“…Immune cell infiltration was assessed using xCell deconvolution algorithm. Results Ninety-three significant DEGs were shared between LUAD and infection datasets, including 40 upregulated and 53 downregulated genes. …”
Get full text
Article -
72
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Published 2025-06-01“…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
Get full text
Article -
73
A Modified Nearest Level Control Scheme for Improved Submodule Current Sharing in a CHB Converter with Integrated EDLCs
Published 2025-03-01“…A modification of the sort and select algorithm to determine which submodule is to be inserted and bypassed when using the Nearest Level Control algorithm is proposed to distribute the activation time and the experienced RMS current of the submodules. …”
Get full text
Article -
74
Appling A Hybrid Encryption Algorithm in Cloud Computing
Published 2024-06-01“…While these algorithms are diverse, effective, and strong in protection, which yields the contribution significantly to increasing the level of security in the field of storing sensitive data in the cloud. …”
Get full text
Article -
75
Tunnel Crack Segmentation Algorithm Based on Feature Enhancement
Published 2025-01-01“…However, due to the complex lighting conditions, background noise, and diverse nature of cracks inside tunnels, traditional image segmentation algorithms often struggle to achieve sufficient accuracy in crack segmentation tasks. …”
Get full text
Article -
76
Investigation of Load Sharing and Dynamic Load Characteristics of a Split Torque Transmission System with Double-Helical Gear Modification
Published 2021-01-01“…Following the modification of a double-helical gear, the dynamic load characteristics of the split torque transmission system are significantly improved, while its load sharing characteristics are improved to a certain extent.…”
Get full text
Article -
77
SSPRD: A Shared-Storage-Based Hardware Packet Reordering and Deduplication System for Multipath Transmission in Wide Area Networks
Published 2024-10-01“…We also develop a sub-buffer-based timeout event handling algorithm. While supporting four sessions, SSPRD achieves a deep reorder buffer on hardware, with a depth of up to 15,360 packets per session. …”
Get full text
Article -
78
-
79
BA-AMST: A blockchain-assisted anonymous and multi-keyword searchable-traceable data sharing system in Industrial Internet of Things
Published 2025-06-01“…Ensuring equitable and precise data searches, while safeguarding sensitive industrial data, is therefore of paramount importance in industrial data-sharing systems. …”
Get full text
Article -
80
ALGORITHM FOR OPTIMIZING ORGANIC CARBON AND NITROGEN FLOWS ON RECLAIMED LANDS
Published 2024-11-01“…Results. An algorithm that operates with two main regulators: the application mass of mineral nitrogen and organic matter, and determines the optimal balance for them, ensuring at least a non-negative trend in stable humus reproduction while achieving target indicators for the level of agrocenosis bioproductivity, has been developed. …”
Get full text
Article