Showing 181 - 200 results of 495 for search 'while share algorithm', query time: 0.11s Refine Results
  1. 181

    Artificial Intelligence-driven optimization of V2G and charging point selection en-route: A systematic literature review by Christoph Sommer, M.J. Hossain

    Published 2025-04-01
    “…The common implementation of electric vehicles (EVs) necessitates effective integration strategies to ensure their seamless interaction with the electrical grid while meeting private EV customer preferences and enhancing grid stability. …”
    Get full text
    Article
  2. 182

    Development of a Conditional Generative Adversarial Network Model for Television Spectrum Radio Environment Mapping by Oluwatobi Emmanuel Dare, Kennedy Okokpujie, Emmanuel Adetiba, Olabode Idowu-Bismark, Abdultaofeek Abayomi, Raymond Jules Kala, Emmanuel Owolabi, Udeme Christopher Ukpong

    Published 2024-01-01
    “…The U-Net generator is a 3-channel input, 16-layer architecture while the PatchGan discriminator is a 6-channel input, 7-layer architecture. …”
    Get full text
    Article
  3. 183
  4. 184

    Improved Sliding Mode Active Disturbance Rejection Control for Single-inductance Dual-output Buck Converter by HUANG Jinfeng, ZHOU Jie

    Published 2025-07-01
    “…However, because both output branches share a single inductor, significant cross-coupling arises during input voltage transients and load disturbances, degrading output voltage performance. …”
    Get full text
    Article
  5. 185

    Overcoming Fairness and Latency Challenges in BBR With an Adaptive Delay Detection by Zewei Han, Go Hasegawa

    Published 2025-01-01
    “…In 2016, Google introduced a new congestion control algorithm called Bottleneck Bandwidth and Round-trip propagation time (BBR). …”
    Get full text
    Article
  6. 186

    Genetic Links Between Common Lung Diseases and Lung Cancer Progression: Bioinformatics and Machine Learning Insights by Md Ali Hossain, Tania Akter Asa, Md. Zulfiker Mahmud, AKM Azad, Mohammad Zahidur Rahman, Mohammad Ali Moni, Ahmed Moustafa

    Published 2025-04-01
    “…We began by identifying differentially expressed genes (DEGs) in LC and CLDs, and our gene-disease network revealed for the first time shared DEGs (LC shares significant genes with TB (36), asthma (10), pneumonia (17), COPD (18), and Idiopathic Pulmonary Fibrosis (IPF) (78)), providing insights into potential connections of LC with CLDs. …”
    Get full text
    Article
  7. 187

    A Reconfigurable Framework for Hybrid Quantum–Classical Computing by Pratibha, Naveed Mahmud

    Published 2025-05-01
    “…The proposed framework integrates field-programmable gate arrays (FPGAs) with quantum processing units (QPUs) for deploying HQC algorithms. The classical subroutines of the algorithms are accelerated on FPGA fabric using a high-throughput processing pipeline, while quantum subroutines are executed on the QPUs. …”
    Get full text
    Article
  8. 188

    PBD-YOLO: Dual-Strategy Integration of Multi-Scale Feature Fusion and Weak Texture Enhancement for Lightweight Particleboard Surface Defect Detection by Haomeng Guo, Zheming Chai, Huize Dai, Lei Yan, Pengle Cheng, Jianhua Yang

    Published 2025-04-01
    “…In order to improve the algorithm’s ability to detect multi-scale defects, this study introduced the ShareSepHead (Share Separated Head) and C2f_SAC (C2f module with Switchable Atrous Convolution) modules. …”
    Get full text
    Article
  9. 189

    Low Cost Safety Data Storage and Processing Framework Under Cloud Environment by Limin Zhang

    Published 2015-02-01
    “…The framework studied data mining algorithms based on the matrix, whose focus was the secure Top-k feature vector algorithm. …”
    Get full text
    Article
  10. 190

    Long-Term Multiyear Transmission Expansion Planning in Turkish Power System by Ahmet Ova, Erdi Dogan, Sevki Demirbas

    Published 2024-01-01
    “…In this study, a new binary version of the original FBI algorithm called the BFBI (binary forensic-based investigation) algorithm is developed to solve the binary TEP problem. …”
    Get full text
    Article
  11. 191

    A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals by Yanbing Liu, Shousheng Jia, Congcong Xing

    Published 2012-01-01
    “…The security of smart mobile terminals has been an increasingly important issue in recent years. While there are extensive researches on virus detections for smart mobile terminals, most of them share the same framework of virus detection as that for personal computers, and few of them tackle the problem from the standpoint of detection methodology. …”
    Get full text
    Article
  12. 192

    Application-centric congestion control by Danny De Vleeschauwer, Chia-Yu Chang, Koen De Schepper, Chrysa Papagianni

    Published 2025-06-01
    “…Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
    Get full text
    Article
  13. 193

    The nonlinear impact of cycling environment on bicycle distance: A perspective combining objective and perceptual dimensions by Yantang Zhang, Xiaowei Hu

    Published 2024-03-01
    “…Land use demonstrates a threshold effect, with cycling distances increasing when the recreational facilities share exceeds 8%, transport facilities share remains below 25%, and commercial facilities share stays below 30%. …”
    Get full text
    Article
  14. 194

    Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy by Rania El-Badry, Moustafa Youssef, Ahmed Sultan

    Published 2010-01-01
    “…The Hidden Anchor algorithm exploits the inherently noisy wireless channel and uses identity cloning of neighboring trusted nodes to make anchors unobservable to un-trusted nodes while providing complete information to trusted nodes. …”
    Get full text
    Article
  15. 195

    Geometric Degree Reduction of Wang–Ball Curves by Yusuf Fatihu Hamza, Mukhtar Fatihu Hamza, Abedallah Rababah, Salisu Ibrahim

    Published 2023-01-01
    “…There are substantial methods of degree reduction in the literature. Existing methods share some common limitations, such as lack of geometric continuity, complex computations, and one-degree reduction at a time. …”
    Get full text
    Article
  16. 196

    Unitanony: a fine-grained and practical anonymization framework for better data utility by Shuguang Yuan, Jing Yu, Tengfei Yang, Chi Chen

    Published 2025-07-01
    “…K-anonymity and l-diversity secure against identity and attribute disclosure. Anonymization algorithms enforce the above models and are willing to reach two primary goals: achieving the privacy objective while maximizing data utility. …”
    Get full text
    Article
  17. 197

    Adaptive Bayesian optimization for proportional derivative control in double-acting piston pump ventilators by Cong Toai Truong, Trung Dat Phan, Van Tu Duong, Huy Hung Nguyen, Thanh Truong Nguyen, Tan Tien Nguyen

    Published 2025-07-01
    “…Numerous studies have developed simple ventilators, including bag valve mask ventilators, centrifugal blower ventilators, pneumatic ventilators, or double-acting piston pump ventilators, to prepare for future respiratory pandemics. While these ventilators share the common goal of maintaining precise air volume and pressure control, the practical development of control systems for double-acting piston pump ventilators remains under-explored. …”
    Get full text
    Article
  18. 198

    DRL-based max-min fair RIS discrete phase shift optimization for MISO-OFDM systems by Peng Chen, Huaqian Zhang, Xiao Li, Shi Jin

    Published 2023-09-01
    “…Simulation results demonstrate that the proposed DRL-based algorithm can achieve almost optimal performance, while has much less computation consumption.…”
    Get full text
    Article
  19. 199

    Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China by Jieying Gao, Huan Guo, Xin Xu

    Published 2022-01-01
    “…The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
    Get full text
    Article
  20. 200

    Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach by Liubin Song, Daoxing Guo

    Published 2025-02-01
    “…In this paper, we propose a distributed time coalition formation game algorithm that ensures the absence of internal interference and collisions while sharing time slot resources, thereby enhancing the network’s throughput performance. …”
    Get full text
    Article