Showing 261 - 280 results of 495 for search 'while share algorithm', query time: 0.10s Refine Results
  1. 261

    Application of novel security technique in cloud environment using attribute dependent authentication for health care by D. Deena Rose, C. Agees Kumar

    Published 2025-07-01
    “…To achieve better key security, the Strong key dependent Subkey Generation Algorithm (SKSGA) is proposed. A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. …”
    Get full text
    Article
  2. 262

    Photovoltaic Power Forecasting with Weather Conditioned Attention Mechanism by Xuetao Jiang, Yuchun Gou, Meiyu Jiang, Lihui Luo, Qingguo Zhou

    Published 2025-04-01
    “…Notably, the attention modules adeptly learn patterns under diverse conditions, while simultaneously, the sharing of weights among the remaining components of the model effectively enhances prediction accuracy and facilitates a reduction in training time. …”
    Get full text
    Article
  3. 263

    Calibration Transfer of Soil Total Carbon and Total Nitrogen between Two Different Types of Soils Based on Visible-Near-Infrared Reflectance Spectroscopy by Xue-Ying Li, Yan Liu, Mei-Rong Lv, Yan Zou, Ping-Ping Fan

    Published 2018-01-01
    “…The former could only be used for correction among instruments, while the latter fundamentally solved the problem of model sharing across different samples.…”
    Get full text
    Article
  4. 264
  5. 265

    Deployment and Operation of Battery Swapping Stations for Electric Two-Wheelers Based on Machine Learning by Yu Feng, Xiaochun Lu

    Published 2022-01-01
    “…With the rapid development of shared electric bicycles and takeaways, the scale of electric two-wheeler users is expanding while generating a huge demand for battery swapping. …”
    Get full text
    Article
  6. 266
  7. 267

    Disturbance types play a key role in post-disturbance vegetation recovery in boreal forests of Northeast China by Yue Yu, Zhihua Liu, Wenjuan Wang, Wenru Xu, Qiushuang Lv, Kaili Li, Wenhua Guo, Lei Fang, Qinglong Zhang, Zhiwei Wu, Bo Liu

    Published 2024-11-01
    “…Fire disturbance constituted the largest share at 49.4 % (SE = 0.4 %), followed by harvest disturbance at 45.3 % (SE = 0.4 %) and urbanization disturbance at 4.8 % (SE = 0.3 %). …”
    Get full text
    Article
  8. 268

    SVF: Support Vector Federation by Mirko Polato, Roberto Esposito, Lorenzo Sciandra

    Published 2025-01-01
    “…This study addresses and overcomes this limitation by proposing an innovative approach: instead of sharing weight vectors, we advocate sharing support vectors while safeguarding client data privacy through vector perturbation. …”
    Get full text
    Article
  9. 269

    Usage of short video applications (SVAs): Exploring Italian users’ social representations of short video creators and trust in informational and educational SVA content providers by Willow-G. Curry, Elisa Colì

    Published 2025-05-01
    “…Trust is further shaped by communication skills, responsiveness, and the creator's willingness to create and share content. Lastly, algorithmic recommendations, user-friendly interfaces, and the accessibility of content are key factors that drive SVA usage. …”
    Get full text
    Article
  10. 270

    Model-Based Hardware-Software Codesign of ECT Digital Processing Unit by Atef Allam, Wael Deabes

    Published 2021-01-01
    “…Using MBD with the proposed segmented architecture, the system design can be flexibly tailored to the designer specifications to fulfill the required performance while meeting the resources constraint. In the linear-back projection image reconstruction algorithm, the segmentation scheme has exhibited high resource saving of 43% and 71% for a small degradation in a frame rate of 3% and 14%, respectively.…”
    Get full text
    Article
  11. 271

    Evaluative representations of the student audience in the context of current processes in Donbas: comparison of studies by L. B. Vnukova

    Published 2025-01-01
    “…Accordingly, a dichotomy of opinions appears: some share the belief that Russia is a strong power with an independent path of development, while others see themselves as part of a European (global) civilization. …”
    Get full text
    Article
  12. 272

    Biased perceptions of public opinion don't define echo chambers but reveal systematic differences in political awareness. by Crispin H V Cooper, Kevin Fahey, Regan Jones

    Published 2025-01-01
    “…Echo chambers both feed and are fed by the false consensus effect, whereby people overestimate the degree to which others share their views, with algorithmic filtering of social media also a contributing factor. …”
    Get full text
    Article
  13. 273

    Communication resource allocation method in vehicular networks based on federated multi-agent deep reinforcement learning by Qingli Liu, Yongjie Ma

    Published 2025-08-01
    “…The simulation results show that the system spectrum efficiency is improved by 19.1% on average compared with the centralized DDPG, MADDPG, MAPPO and FL-DuelingDQN algorithms in the Vehicle Networking scenario, while the transmission success rate of the V2V link is improved by 9.3% on average, and the total capacity of the V2I link is increased by 16.1% on average.…”
    Get full text
    Article
  14. 274

    An Efficient Fine-Grained Access Control Scheme Based on Policy Protection in SGs by Xiaoqing Guo, Huayi Wu, Zhen Qin, Ruonan Ying, Jilai Yang

    Published 2025-01-01
    “…With the rapid advancement of smart grid technology, data sharing between grid devices and between the grid and users has become increasingly frequent. …”
    Get full text
    Article
  15. 275

    Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization by Latha P, Thangaraj M

    Published 2025-08-01
    “…As data streams become increasingly prevalent across various sectors, preserving the privacy of sensitive information while maintaining data utility is a significant challenge. …”
    Get full text
    Article
  16. 276

    FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection by Hassan Jalil Hadi, Alina Khalid, Faisal Bashir Hussain, Naveed Ahmad, Mohammed Ali Alshara

    Published 2025-01-01
    “…As technology advances, the frequency and complexity of cyberattacks continue to rise, with Android OS, given its significant market share, becoming a prime target for sophisticated malware attacks. …”
    Get full text
    Article
  17. 277

    Predicting emergency department visits for non-traumatic dental-related conditions among Medicaid beneficiaries by Sung Eun Choi, Rindala Fayyad, Daniel Nolte, Christine Riedy, Sharon-Lise Normand

    Published 2025-06-01
    “…Abstract Patients who use the emergency department (ED) for non-traumatic dental-related conditions are likely to return for multiple visits, accounting for a disproportionate share of healthcare cost. Reliance on the ED for receiving dental care continues to rise, particularly among Medicaid beneficiaries. …”
    Get full text
    Article
  18. 278

    Innovative approaches in marketing for the development of the tourism industry by Yuliia Stasiuk, Andrii Kobchenko

    Published 2024-06-01
    “…For instance, AI-powered chatbots and virtual assistants provide real-time customer support, while machine learning algorithms analyze booking patterns to offer personalized travel recommendations. …”
    Get full text
    Article
  19. 279

    Enhancing Streamflow Prediction in Ungauged Basins Using a Nonlinear Knowledge‐Based Framework and Deep Learning by Parnian Ghaneei, Ehsan Foroumandi, Hamid Moradkhani

    Published 2024-11-01
    “…The results reveal that the combination of clustering algorithms with the PCA method may lead to loss of information while the nonlinear method (UMAP) can extract more informative features. …”
    Get full text
    Article
  20. 280

    Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks by Zeinab Sasan, Siavash Khorsandi

    Published 2025-07-01
    “…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
    Get full text
    Article