Showing 321 - 340 results of 495 for search 'while share algorithm', query time: 0.08s Refine Results
  1. 321

    Radiomics for Machine Learning—A Multi-Class System for the Automatic Detection of COVID-19 and Community-Acquired Pneumonia from Computed Tomography Images by Vasileia Paschaloudi, Dimitris Fotopoulos, Ioanna Chouvarda

    Published 2025-04-01
    “…Since COVID-19 and CAP share similar characteristics, it is challenging to develop a model that can distinguish these diseases. …”
    Get full text
    Article
  2. 322

    Power Efficient Clustering for Wireless Multimedia Sensor Network by Seng-Kyoun Jo, Muhammad Ikram, Ilgu Jung, Won Ryu, Jinsul Kim

    Published 2014-04-01
    “…We propose a resource and energy efficient distributed image compression algorithm that dynamically configures according to the energy levels and the forwarding strategy that is based on the entropy of the image. …”
    Get full text
    Article
  3. 323

    Development of an enhanced base unit generation framework for predicting demand in free‐floating micro‐mobility by Dohyun Lee, Kyoungok Kim

    Published 2024-12-01
    “…The approach was evaluated using shared e‐scooter data from two cities, Kansas City and Minneapolis, and it was compared to the traditional grid method. …”
    Get full text
    Article
  4. 324

    Research on an adaptive multimodal cognitive load classification method by Xiangxin Yu, Ruizhen Wang

    Published 2025-12-01
    “…The IMDA module aims to mitigate the inter-subject variability of fNIRS signals by extracting shared features among subjects, while the CMDA module leverages electroencephalography (EEG) to align the spatiotemporal information of fNIRS, thereby capturing intrinsic relationships between physiological signals to overcome the limitations in model feature representation caused by the scarcity of fNIRS data. …”
    Get full text
    Article
  5. 325

    A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks by Yanxia Chen, Zhe Li, Rongxin Zhu

    Published 2024-12-01
    “…These networks predominantly utilize acoustic communication, characterized by an open and shared acoustic channel and energy-limited underwater nodes, which underscores the critical importance of node authentication and management. …”
    Get full text
    Article
  6. 326

    SATELLITE ALTIMETER DATA FILTERING AND SMOOTHING IN THE COURSE OF GROUND-BASED RETRACKING by D. S. Borovitsky, A. E. Zhesterev, V. P. Ipatov, R. M. Mamchur

    Published 2019-04-01
    “…Satellite altimeter on-board delay-lock loop, by a widely shared concept, is operationally just a tool of a reliable retaining of received echo-signal within the tracking window, while “fine” altimetric parameter (orbit height, significant wave height, scattering cross section per unit of a probed surface, etc.) measuring is committed to the ground-based retracking of data. …”
    Get full text
    Article
  7. 327

    Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks by Jagadeesan Srinivasan

    Published 2025-04-01
    “…A wormhole attack disrupts communication through tunneling, while a blackhole attack manipulates network traffic by impersonating the source. …”
    Get full text
    Article
  8. 328

    Consensus-Based Intelligent Distributed Secondary Control for Multiagent Islanded Microgrid by Ali M. Jasim, Basil H. Jasim, Flah Aymen, Hossam Kotb, Ahmed Althobaiti

    Published 2023-01-01
    “…Isolated microgrids (MGs) face challenges in performance stability and active/reactive power sharing as a result of frequency/voltage deviations and mismatched line impedance issues. …”
    Get full text
    Article
  9. 329

    Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption by Wei Guo, Kai Liang, Yuewen Song, Xiaoli Chu, Gan Zheng, Kai-Kit Wong

    Published 2025-05-01
    “…Specifically, we first divide the computing resources at the BS into a shared part for both URLLC and eMBB users and an exclusive part only for eMBB users, and propose a queuing mechanism with preemptive-resume priority for accessing the shared computing resources. …”
    Get full text
    Article
  10. 330

    Design and Research on a Reed Field Obstacle Detection and Safety Warning System Based on Improved YOLOv8n by Yuanyuan Zhang, Zhongqiu Mu, Kunpeng Tian, Bing Zhang, Jicheng Huang

    Published 2025-05-01
    “…Additionally, we employ a Lightweight Shared Convolutional Separable Batch Normalization Detection Head in the detection head, which significantly reduces the number of parameters while improving detection accuracy. …”
    Get full text
    Article
  11. 331

    Human-Aware Robot Collaborative Task Planning Using Artificial Potential Field and DQN Reinforcement Learning by Jayesh Prakash, Sam Altnji, Karthick Thiyagarajan, Jogesh S. Nanda, Abhijit Biswas, Abhra Roy Chowdhury

    Published 2025-01-01
    “…Experimental results show that DQN trained model performed better than Bezier interpolation in reaching the final goal position with an accuracy of 74mm while avoiding obstacles at the same time in a shared environment. …”
    Get full text
    Article
  12. 332

    Semantic RF Waveform Adaptation in Flying Ad Hoc Networks via Hybrid Knowledge Bases and Deep Reinforcement Learning by Weiqiang Lyu, Linsheng He, Jiamiao Zhao, Fei Hu

    Published 2025-01-01
    “…We propose a framework that jointly optimizes modulation order and cyclic prefix length while considering the semantic importance of transmitted data. …”
    Get full text
    Article
  13. 333

    SCL-YOLOv11: A Lightweight Object Detection Network for Low-Illumination Environments by Shulong Zhuo, Hao Bai, Lifeng Jiang, Xiaojian Zhou, Xu Duan, Yiqun Ma, Zihan Zhou

    Published 2025-01-01
    “…Experimental results on the ExDark dataset demonstrate that the proposed algorithm achieves 67.6% mAP@0.5 and 42.4% mAP@0.5:0.95, while reducing parameter count by 38.5% and computational cost by 25.4%. …”
    Get full text
    Article
  14. 334

    Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme by DUAN Jie, GU Wei, ZHANG Shujuan, GONG Xin

    Published 2025-05-01
    “…[Methods] First, edge nodes were introduced to achieve ciphertext retrieval, for effectively sharing the computational cost of cloud computing while reducing the risk of leakage in data transmission paths. …”
    Get full text
    Article
  15. 335

    Experimental Study on Heuristics Energy Management Strategy for Hybrid Energy Storage System by Alok Ranjan, Sanjay Bodkhe, Gaurav Goyal, Archana Belge, Sneha Tibude

    Published 2024-11-01
    “…The energy management strategy (EMS) is a decision-making algorithm for effective power allocation between storage devices in a hybrid energy storage system (HESS). …”
    Get full text
    Article
  16. 336

    Reduction of Energy Consumption in Mobile Cloud Computing by ‎Classification of Demands and Executing in Different Data Centers by H. Yeganeh, A. Salahi, M. A Pourmina

    Published 2018-06-01
    “…We derived a penalty function for cost and then by using Lyapunov optimization theorem; we designed an algorithm to minimize the average cost of energy consumption based on the online information in MCC. …”
    Get full text
    Article
  17. 337

    Dynamic Split Computing Framework for Multi-Task Learning Models: A Deep Reinforcement Learning Approach by Haneul Ko, Sangwon Seo, Sangheon Pack

    Published 2025-01-01
    “…However, conventional split computing schemes fail to effectively support multi-task learning (MTL) models, which feature a shared backbone and multiple task-specific branches. …”
    Get full text
    Article
  18. 338

    A novel blockchain-based privacy-preserving framework for online social networks by Shiwen Zhang, Tingting Yao, Voundi Koe Arthur Sandor, Tien-Hsiung Weng, Wei Liang, Jinshu Su

    Published 2021-07-01
    “…Therefore, it is a challenge to ensure the security of sensitive data while providing efficient and privacy-preserving social network services for users. …”
    Get full text
    Article
  19. 339

    Domain generalization for image classification based on simplified self ensemble learning. by Zhenkai Qin, Xinlu Guo, Jun Li, Yue Chen

    Published 2025-01-01
    “…However, as cross-domain data evolves, the discrepancies between domains grow increasingly intricate and difficult to manage, rendering effective knowledge transfer across multiple domains a persistent challenge. While existing methods concentrate on minimizing domain discrepancies, they frequently encounter difficulties in maintaining effectiveness when confronted with high data complexity. …”
    Get full text
    Article
  20. 340

    A blockchain-based access control method for large-scale electronic medical records by Zhen Chu, Wangjie Qiu, Tianyu Lei, Jinchun He, Qinnan Zhang

    Published 2025-05-01
    “…Through rigorous security evaluations and experimental simulations, we demonstrate that the proposed framework enables robust accessor management, secure data sharing, and effective support for large-scale, high-frequency access while maintaining operational efficiency. …”
    Get full text
    Article