Showing 61 - 80 results of 495 for search 'while share algorithm', query time: 0.07s Refine Results
  1. 61

    An Adaptive Wireless Droop Control with Adaptive Virtual Resistance for Power Sharing Management in MTDC Grid by Hasan Alrajhi , Ahmed Al-Zahrani , Syed A. Raza , Fahad Al-Shareef 

    Published 2025-05-01
    “…The main objective of this methodology is to increase the reliability of the MTDC system by eliminating the need for fast communication links and ensuring proper power sharing between inverters. Additionally, this communication-free scheme includes a power management algorithm that controls power sharing during peak hours of the inverters among the rectifiers as per mutual agreements between the operators to mitigate the risk of a system overload and optimize the power sharing. …”
    Get full text
    Article
  2. 62
  3. 63

    Heterogeneity in willingness to share personal health information: a nationwide cluster analysis of 20,000 adults in Japan by Miho Sassa, Akifumi Eguchi, Keiko Maruyama-Sakurai, Takanori Fujita, Yumi Kawamura, Takayuki Kawashima, Yuta Tanoue, Daisuke Yoneoka, Hiroaki Miyata, Takanori Yamashita, Naoki Nakashima, Shuhei Nomura

    Published 2025-04-01
    “…Abstract Background While Personal Health Records (PHRs) are increasingly adopted globally, understanding public attitudes toward health information sharing remains crucial for successful implementation. …”
    Get full text
    Article
  4. 64

    C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks by Dapeng Wu, Jian Liu, Yangliang Wan, Zhigang Yang, Ruyan Wang, Xinqi Lin

    Published 2025-04-01
    “…With the increasing popularity of digital photography and Internet technology, more and more users are sharing images on CPN. However, many images are shared without any privacy processing, exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI) algorithms. …”
    Get full text
    Article
  5. 65

    Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users by Bangyan Chen, Jun Ye

    Published 2025-02-01
    “…This research proposes a method to safely share the effort of multiple users in an encrypted state and perform the reinforcement learning with outsourcing service to reduce users calculations combined with the homomorphic properties of cryptographic algorithms and multi-key ciphertext fusion mechanism. …”
    Get full text
    Article
  6. 66
  7. 67

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…Second, in order to further reduce the size of the model while ensuring the detection accuracy, Feature Interaction Shared Detection Head (FISH) is introduced. …”
    Get full text
    Article
  8. 68

    e-Fuel: An EV-Friendly Urgent Electrical Charge-Sharing Model with Preference-Based Off-Grid Services by Ahmad Nahar Quttoum, Mohammed N. AlJarrah, Fawaz A. Khasawneh, Mohammad Bany Taha

    Published 2024-11-01
    “…In e-Fuel, we are proposing a stable weight-based vehicle-to-vehicle matching algorithm, through which drivers of EVs will be capable of requesting instant mobile charge-sharing service for their EVs. …”
    Get full text
    Article
  9. 69

    Shared blood gene signature in lung adenocarcinoma and microbial lung infections: a bioinformatic analysis and in silico validation by Milad Sheervalilou, Mostafa Ghanei, Masoud Arabfard

    Published 2025-07-01
    “…Immune cell infiltration was assessed using xCell deconvolution algorithm. Results Ninety-three significant DEGs were shared between LUAD and infection datasets, including 40 upregulated and 53 downregulated genes. …”
    Get full text
    Article
  10. 70

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
    Get full text
    Article
  11. 71

    A Modified Nearest Level Control Scheme for Improved Submodule Current Sharing in a CHB Converter with Integrated EDLCs by Viktor Döhlen, Kent Bertilsson

    Published 2025-03-01
    “…A modification of the sort and select algorithm to determine which submodule is to be inserted and bypassed when using the Nearest Level Control algorithm is proposed to distribute the activation time and the experienced RMS current of the submodules. …”
    Get full text
    Article
  12. 72

    Appling A Hybrid Encryption Algorithm in Cloud Computing‎ by Esraa Alobaydi, Muna Jawhar

    Published 2024-06-01
    “…While these algorithms are diverse, effective, and strong in protection, ‌which yields the contribution significantly to increasing the level of security in the field of storing ‌sensitive data in the cloud. …”
    Get full text
    Article
  13. 73

    Tunnel Crack Segmentation Algorithm Based on Feature Enhancement by Lihua Feng, Aijun Yao, An Huang

    Published 2025-01-01
    “…However, due to the complex lighting conditions, background noise, and diverse nature of cracks inside tunnels, traditional image segmentation algorithms often struggle to achieve sufficient accuracy in crack segmentation tasks. …”
    Get full text
    Article
  14. 74

    Investigation of Load Sharing and Dynamic Load Characteristics of a Split Torque Transmission System with Double-Helical Gear Modification by Xuan Liu, Zongde Fang, Haitao Jia, Ning Zhao, Yunbo Shen, Hui Guo, Xijin Zhang

    Published 2021-01-01
    “…Following the modification of a double-helical gear, the dynamic load characteristics of the split torque transmission system are significantly improved, while its load sharing characteristics are improved to a certain extent.…”
    Get full text
    Article
  15. 75

    SSPRD: A Shared-Storage-Based Hardware Packet Reordering and Deduplication System for Multipath Transmission in Wide Area Networks by Jiandong Ma, Zhichuan Guo, Mangu Song

    Published 2024-10-01
    “…We also develop a sub-buffer-based timeout event handling algorithm. While supporting four sessions, SSPRD achieves a deep reorder buffer on hardware, with a depth of up to 15,360 packets per session. …”
    Get full text
    Article
  16. 76

    BA-AMST: A blockchain-assisted anonymous and multi-keyword searchable-traceable data sharing system in Industrial Internet of Things by Leyou Zhang, Runze Tian, Qing Wu, Fatemeh Rezaeibagha

    Published 2025-06-01
    “…Ensuring equitable and precise data searches, while safeguarding sensitive industrial data, is therefore of paramount importance in industrial data-sharing systems. …”
    Get full text
    Article
  17. 77

    ALGORITHM FOR OPTIMIZING ORGANIC CARBON AND NITROGEN FLOWS ON RECLAIMED LANDS by Mikhail N. Lytov

    Published 2024-11-01
    “…Results. An algorithm that operates with two main regulators: the application mass of mineral nitrogen and organic matter, and determines the optimal balance for them, ensuring at least a non-negative trend in stable humus reproduction while achieving target indicators for the level of agrocenosis bioproductivity, has been developed. …”
    Get full text
    Article
  18. 78

    Land Use Transition and Regional Development Patterns Under Shared Socioeconomic Pathways: Evidence from Prefecture-Level Cities in China by Xiaodong Zhang, Mingjie Yang, Rui Guo, Yaolong Li, Fanglei Zhong

    Published 2025-02-01
    “…This study evaluates the spatial–temporal evolution of land use intensity and regional development under five shared socioeconomic pathways (SSPs) through prefecture-level projections in China (2020–2050). …”
    Get full text
    Article
  19. 79

    Recurrent Neural-Based Vehicle Demand Forecasting and Relocation Optimization for Car-Sharing System: A Real Use Case in Thailand by Peerapon Vateekul, Panyawut Sri-iesaranusorn, Pawit Aiemvaravutigul, Adsadawut Chanakitkarnchok, Kultida Rojviboonchai

    Published 2021-01-01
    “…Finally, the Minimum Cost Maximum Flow algorithm is deployed to maximize forecasted demands, while minimizing the amount of relocations. …”
    Get full text
    Article
  20. 80

    MGL-YOLO: A Lightweight Barcode Target Detection Algorithm by Yuanhao Qu, Fengshou Zhang

    Published 2024-11-01
    “…Finally, a Lightweight Shared Multi-Scale Detection Head (LSMD) is proposed, which improves the model’s detection accuracy and adaptability while reducing the model’s parameter size and computational complexity. …”
    Get full text
    Article