Showing 1 - 20 results of 502 for search 'while (shark OR share) algorithm', query time: 0.12s Refine Results
  1. 1

    Algorithmic Gossiping: sharing and non-sharing that evolve algorithmic imaginaries to folk theories by Gaohui Cao, Zhang Wen, Puyi Liu

    Published 2025-05-01
    “…This paper presents a work-in-progress diary study exploring how algorithmic gossiping contributes to the transformation of individual, momentary algorithmic imaginaries into shared and consolidated folk theories. …”
    Get full text
    Article
  2. 2

    Comparative Study of White Shark Optimization and Combined Meta-Heuristic Algorithm for Enhanced MPPT in Photovoltaic Systems by Fajar Kurnia Al Farisi, Zhi-Kai Fan, Kuo-Lung Lian

    Published 2025-04-01
    “…This paper proposes a novel hybrid metaheuristic algorithm (MHA) for maximum power point tracking (MPPT), integrating particle swarm optimization (PSO), the differential evolution algorithm (DEA), and the grey wolf optimizer (GWO). …”
    Get full text
    Article
  3. 3

    Key distribution and recovery algorithm based on Shamir's secret sharing by Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG

    Published 2015-03-01
    “…In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. …”
    Get full text
    Article
  4. 4

    Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm by Jawhara Aljabri

    Published 2025-04-01
    “…This paper presents a multi-head attention-driven intrusion detection with improved white shark optimization algorithm (MHAID-IWSOA) methodology in IoT networks. …”
    Get full text
    Article
  5. 5
  6. 6

    Individual health passport storage, sharing and verification scheme based on blockchain by GAO Hancheng, JI Haoyu, GAO Chenhao, HUANG Haiping

    Published 2024-04-01
    “…To tackle the challenges associated with the global sharing of individual health passports, including information fragmentation, privacy concerns, and the risk of counterfeiting, a blockchain-based scheme for the secure storage, sharing, and verification of individual health passports was developed. …”
    Get full text
    Article
  7. 7

    Security and Fairness in Multiparty Quantum Secret Sharing Protocol by Alessio Di Santo, Walter Tiberti, Dajana Cassioli

    Published 2025-01-01
    “…Several state-of-the-art studies aim to transpose classical secret sharing into the quantum realm, while maintaining their reliance on traditional network topologies (e.g., star, ring, and fully connected), and require that all the <inline-formula><tex-math notation="LaTeX">$n$</tex-math></inline-formula> players calculate the secret. …”
    Get full text
    Article
  8. 8

    Privacy-Preserving Data Uploading SchemeBased on Threshold Secret Sharing Algorithm for Internet of Vehicles by Zheng Jiang, Fang-Fang Chua, Amy Hui-Lan Lim

    Published 2025-05-01
    “…Therefore, this study proposed a scheme called Privacy-Preserving Data Uploading Scheme (PriDUS), which relied on Threshold Secret Sharing Algorithm (TSSA). The scheme worked by grouping vehicle dynamically, calculating sub-IDs to replace real vehicle IDs during data uploads. …”
    Get full text
    Article
  9. 9

    Solving the Electric Share-A-Ride Problem Using a Hybrid Variable Neighborhood Search Algorithm by Vincent F. Yu, Sy Hoang Do, Pham Tuan Anh, Cheng-Ta Yeh

    Published 2025-01-01
    “…The MIP model provides optimal solutions for small E-SARP instances using the CPLEX solver, while the HVNS algorithm is designed to solve larger E-SARP instances. …”
    Get full text
    Article
  10. 10

    Dynamic allocation of regional shared parking spaces based on assignment problem model by Shuo Zheng, Ruijun Guo

    Published 2025-06-01
    “…The core concept of shared parking lies in the strategic allocation of parking spaces. …”
    Get full text
    Article
  11. 11

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article
  12. 12

    Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem by Pablo Zúñiga-Valenzuela, Broderick Crawford, Felipe Cisternas-Caneo, Eduardo Rodriguez-Tello, Ricardo Soto, José Barrera-Garcia, Fernando Lepe-Silva

    Published 2025-07-01
    “…This study introduces a binary White Shark Optimizer (WSO) enhanced with V3 transfer functions, elitist binarization, and chaotic maps. …”
    Get full text
    Article
  13. 13

    Datacasting: TikTok’s Algorithmic Flow as Televisual Experience by Ellenrose Firth, Alberto Marinelli

    Published 2025-02-01
    “…Recommendation algorithms have acquired a central role in the suggestion of content within both subscription video on demand (SVOD) and advertising-based video on demand (AVOD) services and media-sharing platforms. …”
    Get full text
    Article
  14. 14

    A framework for heat energy community planning with a special focus on cost sharing by Bernadette Fina

    Published 2024-11-01
    “…For the efficient and EC-suitable planning of a district heating grid, a shortest path problem is solved using Dijkstra’s algorithm. To address the issue of distributing investment costs among EC participants, eight different cost sharing scenarios are developed. …”
    Get full text
    Article
  15. 15

    Secure gray image sharing framework with adaptive key generation using image digest by C. Nithya, C. Lakshmi, K. Thenmozhi, M. V. Harshavardhan, R. Kumaran, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan

    Published 2025-03-01
    “…Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To mitigate the vulnerability in information sharing over public networks, it is crucial to develop privacy-preserving algorithms and system security schemes that ensure the safety, ownership and integrity of the information that travels through the network. …”
    Get full text
    Article
  16. 16

    A multi-objective optimization framework based on information sharing for serially connected robot design by Jiliang Zhao, Wei Peng, Handing Wang, Wen Yao

    Published 2025-08-01
    “…Experimental results show that the proposed algorithm outperforms the other design algorithm in most tasks. …”
    Get full text
    Article
  17. 17
  18. 18

    Integrated Scheduling Optimization for Multi-Line Production and Transportation of Prefabricated Components Considering Shared Resources by Yiran Dan, Chengshuang Sun, Qianmai Luo

    Published 2025-01-01
    “…This article adopts the genetic algorithm to design the solution algorithm for this model, and the effectiveness of the model and algorithm is verified through an example. …”
    Get full text
    Article
  19. 19

    Shared energy storage planning based on the adjustable potential of data center based on visual IOT platform by Lei Su, Wanli Feng, Haoyu Ma, Mingjiang Wei, RuoShi Gu, Ziya Chen, Junda Qin

    Published 2025-08-01
    “…Abstract To address the challenges of low utilization and poor economic efficiency associated with decentralized energy storage configurations in data centers, this study proposes a shared energy storage planning method for data center groups based on the adjustable potential of data center based on visual IOT platform, which leverages differences and complementarities in energy storage requirements under different scenarios to minimize investment costs while maximizing operational benefit. …”
    Get full text
    Article
  20. 20

    Zero-Error Frequency Regulation Control Method for Microgrids Based on Consensus Algorithm by Yue WANG, Guohua YANG, Jiayi ZHUANG, Huan PAN, Yuqi ZOU, Shijun HAN

    Published 2020-10-01
    “…Through the consistency algorithm, the micro-power source in the micro-grid obtains the self-adjusting amount of the droop coefficient to achieve no static difference in the frequency of the micro-grid, while ensuring that the active power shares the load according to the rated capacity. …”
    Get full text
    Article