Showing 281 - 300 results of 495 for search 'while share algorithm', query time: 0.10s Refine Results
  1. 281

    Evaluation of Soil Moisture Retrievals from a Portable L-Band Microwave Radiometer by Runze Zhang, Abhi Nayak, Derek Houtz, Adam Watts, Elahe Soltanaghai, Mohamad Alipour

    Published 2024-12-01
    “…By comparing PoLRa-based soil moisture retrievals against the simultaneous moisture values obtained by a handheld capacitance probe, the unbiased root mean square error (ubRMSE) and the Pearson correlation coefficient (R) are mostly below 0.05 m<sup>3</sup>/m<sup>3</sup> and above 0.7 for various algorithms adopted here. While SMAP models and the DCA algorithm can derive soil moisture from PoLRa observations, no single algorithm consistently outperforms the others. …”
    Get full text
    Article
  2. 282

    CriSALAD: Robust Visual Place Recognition Using Cross-Image Information and Optimal Transport Aggregation by Jinyi Xu, Yuhang Ming, Minyang Xu, Yaqi Fan, Yuan Zhang, Wanzeng Kong

    Published 2025-05-01
    “…Specifically, we adapt pre-trained VFMs for VPR by incorporating a parameter-efficient adapter inspired by Xception, ensuring effective task adaptation while preserving computational efficiency. Additionally, we employ the Sinkhorn Algorithm for Locally Aggregated Descriptors (SALAD) as a global descriptor to enhance place recognition accuracy. …”
    Get full text
    Article
  3. 283

    Low-dose computed tomography image denoising using pixel level non-local self-similarity prior with non-local means for healthcare informatics by Dawa Chyophel Lepcha, Bhawna Goyal, Ayush Dogra, Krunal Vaghela, Ashish Singh, K. S. Ravi Kumar, Durga Prasad Bavirisetti

    Published 2025-07-01
    “…Furthermore, the study incorporates an enhanced version of a recently proposed nonlocal means algorithm. This revised approach uses discrete neighbourhood filtering properties to enable efficient, vectorized, and parallel computation on modern shared-memory platforms thereby reducing computational complexity. …”
    Get full text
    Article
  4. 284

    A Lightweight SAR Ship Detection Network Based on Deep Multiscale Grouped Convolution, Network Pruning, and Knowledge Distillation by Boyi Hu, Hongxia Miao

    Published 2025-01-01
    “…Experimental validation is conducted on three SAR image ship detection datasets (SSDD, high-resolution SAR images dataset, large-scale SAR ship detection dataset-v1.0) to thoroughly assess the effectiveness of the proposed lightweight algorithm. Experimental results on the three datasets demonstrate that the proposed method achieves a model volume reduction to one-third of the baseline while maintaining a minimal decrease in detection accuracy. …”
    Get full text
    Article
  5. 285

    Next-Gen Video Watermarking with Augmented Payload: Integrating KAZE and DWT for Superior Robustness and High Transparency by Himanshu Agarwal, Shweta Agarwal, Farooq Husain, Rajeev Kumar

    Published 2025-05-01
    “…These platforms have become hotspots for the unauthorized sharing of copyrighted materials without due recognition to the original creators. …”
    Get full text
    Article
  6. 286

    PV Module Soiling Detection Using Visible Spectrum Imaging and Machine Learning by Boris I. Evstatiev, Dimitar T. Trifonov, Katerina G. Gabrovska-Evstatieva, Nikolay P. Valov, Nicola P. Mihailov

    Published 2024-10-01
    “…During the last decades photovoltaic solar energy has continuously increased its share in the electricity mix and has already surpassed 5% globally. …”
    Get full text
    Article
  7. 287

    Performance optimization of multilink laser powered UAV relay systems by Xuehui Zhao, Yuanchang Zhong, Zhongyuan Mao, Xunzhuo He

    Published 2025-04-01
    “…In this paper, we propose a laser-powered UAV relay system where UAVs harvest energy from ground-based laser transmitters and operate in a multi-link shared spectrum environment. With the goal of maximizing the minimum system link throughput, we formulate a joint optimization problem for UAV trajectory and power control and propose an iterative algorithm to efficiently manage energy and mitigate co-channel interference while solving this non-convex problem. …”
    Get full text
    Article
  8. 288

    Edge caching strategy based on multi-agent deep reinforcement learning in cloud-edge-end scenarios by WANG Haiyan, CHANG Bo, LUO Jian

    Published 2025-06-01
    “…This approach was used to reduce the communication costs required for state sharing. The experimental results show that the proposed methods significantly improve the cache hit rate and service quality, while also reducing system overhead.…”
    Get full text
    Article
  9. 289

    Prediction of implant failure risk due to periprosthetic femoral fracture after primary elective total hip arthroplasty: a simplified and validated model based on 154,519 total hip... by M. A. Alagha, Justin Cobb, Alexander D. Liddle, Henrik Malchau, Ola Rolfson, Maziar Mohaddes

    Published 2025-01-01
    “…Model performance was tested using the area under the curve (AUC), and feature importance was identified in the best-performing algorithm. Results: The Lasso regression excelled in predicting 30-day revisions (area under the receiver operating characteristic curve (AUC) = 0.85), while the Gradient Boosting Machine (GBM) model outperformed other models by a slight margin for all remaining endpoints (AUC range: 0.79 to 0.86). …”
    Get full text
    Article
  10. 290

    Niche Overlap Between Two Sympatric Steppe Birds in Inner Mongolia: Habitat Selection and Insights for Conservation by Zheng Han, Xi Yang, Lishi Zhang, Frédéric Jiguet, Piotr Tryjanowski, Haitao Wang

    Published 2025-02-01
    “…Jankowski's Bunting favors areas with higher vegetation cover and height, while Meadow Bunting prefers sites with greater edge density. …”
    Get full text
    Article
  11. 291

    Thematic Analysis of Clinician Documentation Surrounding Treatment Discussions and Decision‐Making in Patients With Desmoid Tumors by Victoria Wytiaz, Tianyi Wang, Scott Schuetze, Nina J. Francis‐Levin, Rashmi Chugh

    Published 2025-08-01
    “…ABSTRACT Background Desmoid tumors are benign tumors without metastatic potential. While progression is rarely life‐threatening, it is often life‐affecting with significant morbidity. …”
    Get full text
    Article
  12. 292

    Controlling update distance and enhancing fair trainable prototypes in federated learning under data and model heterogeneity by Kangning Yin, Zhen Ding, Xinhui Ji, Zhiguo Wang

    Published 2025-05-01
    “…These methods allow for the sharing of only class representatives between heterogeneous clients while maintaining privacy. …”
    Get full text
    Article
  13. 293

    IMSBA: A Novel Integrated Sensing and Communication Beam Allocation Based on Multi-Agent Reinforcement Learning for mmWave Internet of Vehicles by Jinxiang Lai, Deqing Wang, Yifeng Zhao

    Published 2025-05-01
    “…To address these challenges, this paper proposes an integrated sensing and communication (ISAC) beam allocation algorithm, termed IMSBA, which jointly optimizes beam direction, transmission power, and spectrum resource allocation to effectively mitigate the interference between I2V and V2V while maximizing the overall network performance. …”
    Get full text
    Article
  14. 294

    A Gaussian process approach for contextual bandit-based battery replacement by Zhou Tianshi

    Published 2025-01-01
    “…The sharing economy has recently become a distinctive business model in China, offering advantages such as low prices and ease of use. …”
    Get full text
    Article
  15. 295

    A Novel Fault-Tolerant Information Fusion Method for Integrated Navigation Systems Based on Fuzzy Inference by Yixian Zhu, Minmin Zhang, Ling Zhou, Ting Cai

    Published 2025-03-01
    “…Additionally, the information sharing coefficients, determined by the observation quality factors, ensure dependable fault isolation while improving the sensitivity of fault detection to gradual faults. …”
    Get full text
    Article
  16. 296

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The architectures data warehouses are distributed in the cloud center and at the edge, making data storage and processing more flexible and supporting business such as data security, data privacy and cross-geographic data sharing while ensuring query efficiency. This paper designed a scheduling framework based on cloud edge multi-data warehouses, integrated the query cost prediction model with machine learning technology as the core, and realized cloud edge collaborative execution and cloud edge selective execution on multiple query granularity, so as to improve the performance and query efficiency of the whole system. …”
    Get full text
    Article
  17. 297

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The architectures data warehouses are distributed in the cloud center and at the edge, making data storage and processing more flexible and supporting business such as data security, data privacy and cross-geographic data sharing while ensuring query efficiency. This paper designed a scheduling framework based on cloud edge multi-data warehouses, integrated the query cost prediction model with machine learning technology as the core, and realized cloud edge collaborative execution and cloud edge selective execution on multiple query granularity, so as to improve the performance and query efficiency of the whole system. …”
    Get full text
    Article
  18. 298

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. …”
    Get full text
    Article
  19. 299

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  20. 300

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article