Search alternatives:
method » methods (Expand Search)
Showing 61 - 80 results of 345 for search 'probability allocation method', query time: 0.13s Refine Results
  1. 61

    Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach by Liubin Song, Daoxing Guo

    Published 2025-02-01
    “…A key operational aspect in large-scale UAV swarm networks is slot allocation for large capacity and a low probability of conflict. …”
    Get full text
    Article
  2. 62

    Multiobjective optimization of buffer capacity allocation in multiproduct unreliable production lines using improved adaptive NSGA-II algorithm by jianguo duan, nan xie, Haochen Li, Qinglei Zhang

    Published 2020-12-01
    “…Buffer capacity allocation occupies an essential position in the designing of production systems. …”
    Get full text
    Article
  3. 63

    A Multi-Objective Dynamic Resource Allocation Model for Search and Rescue and First Aid Tasks in Disaster Response by Employing Volunteers by Emine Nisa Kapukaya, Sule Itir Satoglu

    Published 2025-03-01
    “…<i>Methods</i>: To address the resource allocation challenges in disaster response, a multi-objective two-stage stochastic programming model is developed for search and rescue and first aid activities. …”
    Get full text
    Article
  4. 64

    Joint antenna selection and resource allocation for mm‐wave directional D2D communications using distributed deep reinforcement learning by Pouya Akhoundzadeh, Ghasem Mirjalily

    Published 2024-10-01
    “…To address the complexity of this problem, a method based on multi‐agent distributed deep reinforcement learning in which an autonomous intelligent agent is deployed for each user equipment is proposed. …”
    Get full text
    Article
  5. 65
  6. 66
  7. 67

    Spatial analysis of prehospital emergency medical services accessibility: a comparative evaluation of the GAUSS-probability two-step floating catchment area model in Handan City by Feng Tian, Feng Tian, Feng Tian, Saicong Lu, Saicong Lu, Saicong Lu, Zhenjie Yang, Tingting Zhao, Tingting Zhao, Tingting Zhao, Penghui Li, Penghui Li, Penghui Li, Haifang Zhang

    Published 2025-03-01
    “…Prehospital EMS is often highly urgent, requiring effective intervention for patients in the shortest possible time.MethodsTo meet this need, the model incorporated distance-based selection probabilities to optimize decision making by considering both geographical location and the distribution of emergency resources, making it more compatible with the practical demands of prehospital EMS. …”
    Get full text
    Article
  8. 68
  9. 69

    DECISION SUPPORT SYSTEM STATISTICAL SYNTHESIS, BASED ON AN ASSESSMENT CARRIED OUT WITH THE INTENSITY OF INTERACTION TEACH AND THE LEARNING ENVIRONMENT by E. V. Kondratyonok, V. A. Kondratyonok

    Published 2016-11-01
    “…It was assumed that the transition probabilities of the interaction intensity of the same, the transition probability density estimates is allocated in accordance with the truncated left and right of a Gaussian distribution (the procedure for determining the expectation of a Gaussian density estimation and standard deviation in the article described), and the a priori probability density for the first step can be approximated Gaussian probability density based on a priori information on the results of the student to him for study providing disciplines. …”
    Get full text
    Article
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    Interference alignment based secure transmission scheme in multi-user interference networks by Lin HU, Jiabing FAN, Hong WEN, Jie TANG, Qianbin CHEN

    Published 2023-06-01
    “…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
    Get full text
    Article
  15. 75

    Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer by Ali kuhestani, Abbas Mohammadi, Mohammad Javad Emadi

    Published 2016-11-01
    “…To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. …”
    Get full text
    Article
  16. 76

    Cumulative Distribution-Based Method for Pavement Performance Modeling by Chenhao Tu, Wenya Ye, Rui Zhang, Xudong Qian, Qun Yang

    Published 2024-06-01
    “…First, after comparing performance metrics such as pile-by-pile single-point, probability density, and cumulative distribution, it is evident that the cumulative distribution is the most reliable method for describing pavement conditions. …”
    Get full text
    Article
  17. 77

    SUBHORIZONTAL GEODYNAMIC ACTIVE ZONES AT THE PLATFORMS - METHODS OF IDENTIFICATION AND EVALUATION by V. M. Makeev, E. A. Karfidova, I. V. Korobova

    Published 2016-08-01
    “…Authors developed a geoinformation(GIS) method considering the degree of disagreement between the key horizons of the different ages for the detection and evaluation of the subhorizontal geodynamic active zones at the platforms. …”
    Get full text
    Article
  18. 78

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  19. 79

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  20. 80

    Intelligent Priority-Aware Spectrum Access in 5G Vehicular IoT: A Reinforcement Learning Approach by Adeel Iqbal, Tahir Khurshaid, Yazdan Ahmad Qadri

    Published 2025-07-01
    “…Selecting the appropriate RL method, RL-PASM offers a robust and adaptable solution for scalable, intelligent, and priority-aware spectrum access in vehicular communication infrastructures.…”
    Get full text
    Article