Showing 101 - 120 results of 495 for search 'while share algorithm', query time: 0.10s Refine Results
  1. 101

    Enhancing Diversity and Convergence in MMOPs with a Gaussian Similarity-Based Evolutionary Algorithm by Shizhao Wei, Da-Jung Cho

    Published 2025-01-01
    “…Multi-modal multi-objective optimization problems (MMOPs) are challenging due to multiple solutions sharing similar objective values. Existing algorithms for solving MMOPs typically evaluate the crowding in the decision space and objective space independently, leading to an imbalance in diversity between the two spaces. …”
    Get full text
    Article
  2. 102
  3. 103

    A Federated Learning Algorithm That Combines DCScaffold and Differential Privacy for Load Prediction by Yong Xiao, Xin Jin, Tingzhe Pan, Zhenwei Yu, Li Ding

    Published 2025-03-01
    “…Experimental results demonstrate that the proposed algorithm enables federated training without the need for sharing raw load data, facilitating load scheduling and energy management operations in smart grids while safeguarding user privacy. …”
    Get full text
    Article
  4. 104

    Intrusion detection algorithm of wireless network based on network traffic anomaly analysis by Xiangqian Nie, Jiao Xing, Qimeng Li, Fan Xiao

    Published 2025-06-01
    “…To promptly identify and mitigate abnormal behaviors while ensuring normal operation and security, this paper proposes an algorithm for detecting compromised nodes in wireless networks based on network traffic anomaly analysis. …”
    Get full text
    Article
  5. 105

    LE-YOLO: A Lightweight and Enhanced Algorithm for Detecting Surface Defects on Particleboard by Chao He, Yongkang Kang, Anning Ding, Wei Jia, Huaqiong Duo

    Published 2025-07-01
    “…A dynamic mixed convolutional network module is introduced to construct a lightweight backbone architecture. Moreover, the Shared Dilated Feature Pyramid (SDFP) module is employed in the neck network, effectively reducing computational overhead while preserving detection accuracy. …”
    Get full text
    Article
  6. 106

    Algorithms to Identify Copied and Manipulated Spectrum Occupancy Data in Cognitive Radio Networks by Joseph Tolley, Carl B. Dietrich

    Published 2025-01-01
    “…Spectrum Access Systems (SASs) and similar systems coordinate access to shared radio frequency bands to efficiently allocate the use of spectrum between users in a locality. …”
    Get full text
    Article
  7. 107

    RTL-Net: real-time lightweight Urban traffic object detection algorithm by Zhiqing Cui, Jiahao Yuan, Haibin Xu, Yamei Wei, Zhenglong Ding

    Published 2025-05-01
    “…Secondly, the Lightweight Shared Convolutional Detection (LSCD) head was replaced to ensure the detection performance and significantly improve the lightweight performance of the algorithm. …”
    Get full text
    Article
  8. 108

    SACWOM: Synergistic Adaptive Congestion Window Optimization Mechanism for Self-Clocked Algorithm by Haider Dhia Zubaydi, Ahmed Samir Jagmagji, Sandor Molnar

    Published 2025-01-01
    “…Congestion Control (CC) is essential in networked systems, especially in environments with strict delay and throughput requirements. While CC algorithms like Self-Clocked Rate Adaptation for Multimedia (SCReAM) and Bottleneck Bandwidth and Round-trip propagation time (BBR) have shown progress, each faces limitations: BBR encounters difficulty in balancing responsiveness and fairness when rapid fluctuations in network conditions arise, which can lead to inefficient performance in shared environments. …”
    Get full text
    Article
  9. 109

    Design and Application of Algorithm Intensive Environment for CMA Big Data and Cloud Platform by Huo Qing, He Wenchun, He Lin, Gao Feng, Chen Shiwang, Xu Yongjun

    Published 2024-01-01
    “…The algorithm library facilitates the standardization, unified management and sharing of algorithms. …”
    Get full text
    Article
  10. 110

    Deep reinforcement learning-based resource reservation algorithm for emergency Internet-of-things slice by Guolin SUN, Ruijie OU, Guisong LIU

    Published 2020-09-01
    “…Based on the requirements of ultra-low latency services for emergency Internet-of-things (EIoT) applications,a multi-slice network architecture for ultra-low latency emergency IoT was designed,and a general methodology framework based on resource reservation,sharing and isolation for multiple slices was proposed.In the proposed framework,real-time and automatic inter-slice resource demand prediction and allocation were realized based on deep reinforcement learning (DRL),while intra-slice user resource allocation was modeled as a shape-based 2-dimension packing problem and solved with a heuristic numerical algorithm,so that intra-slice resource customization was achieved.Simulation results show that the resource reservation-based method enable EIoT slices to explicitly reserve resources,provide a better security isolation level,and DRL could guarantee accuracy and real-time updates of resource reservations.Compared with four existing algorithms,dueling deep Q-network (DQN) performes better than the benchmarks.…”
    Get full text
    Article
  11. 111

    A lightweight UAV target detection algorithm based on improved YOLOv8s model by Fubao Ma, Ran Zhang, Bowen Zhu, Xirui Yang

    Published 2025-05-01
    “…To tackle these challenges, this paper proposes LW-YOLOv8, a lightweight object detection algorithm based on the YOLOv8s model for UAV deployment. …”
    Get full text
    Article
  12. 112

    A Lightweight Pavement Defect Detection Algorithm Integrating Perception Enhancement and Feature Optimization by Xiang Zhang, Xiaopeng Wang, Zhuorang Yang

    Published 2025-07-01
    “…Secondly, the dynamic upsampling module DySample is introduced into the efficient feature pyramid, constructing a new feature fusion pyramid (Generalized Dynamic Sampling Feature Pyramid Network, GDSFPN) to optimize the multi-scale feature fusion effect. In addition, a shared detail-enhanced convolution lightweight detection head (SDCLD) was designed, which significantly reduces the model’s parameters and computation while improving localization and classification performance. …”
    Get full text
    Article
  13. 113

    Traffic environment perception algorithm based on multi-task feature fusion and orthogonal attention by Zhengfeng LI, Mingen ZHONG, Yihong ZHANG, Kang FAN, Zhiying DENG, Jiawei TAN

    Published 2025-06-01
    “…In the realm of autonomous driving, the design and implementation of collaborative multi-task perception algorithms pose significant challenges. These challenges are primarily rooted in the need for real-time processing speeds, effective feature sharing among diverse tasks, and seamless information fusion. …”
    Get full text
    Article
  14. 114

    Integrated energy microgrid bi-level game scheduling optimization taking into account electricity-heat-hydrogen enriched compressed natural gas coupling and shared energy storage by Changgang Wang, Xiaoning Sun

    Published 2025-08-01
    “…Additionally, tiered carbon trading mechanisms, integrated demand response strategies, and shared energy storage are introduced to optimize carbon reduction on both the demand and storage sides while effectively constraining energy emissions. …”
    Get full text
    Article
  15. 115

    A Two-Phase Embedding Approach for Secure Distributed Steganography by Kamil Woźniak, Marek R. Ogiela, Lidia Ogiela

    Published 2025-02-01
    “…The algorithm effectively reduces key management complexity while enhancing resilience against sophisticated steganalytic attacks. …”
    Get full text
    Article
  16. 116

    MetaboLINK is a novel algorithm for unveiling cell-specific metabolic pathways in longitudinal datasets by Jared Lichtarge, Gerarda Cappuccio, Gerarda Cappuccio, Soumya Pati, Soumya Pati, Alfred Kwabena Dei-Ampeh, Alfred Kwabena Dei-Ampeh, Senghong Sing, Senghong Sing, Senghong Sing, LiHua Ma, Zhandong Liu, Zhandong Liu, Mirjana Maletic-Savatic, Mirjana Maletic-Savatic, Mirjana Maletic-Savatic

    Published 2025-01-01
    “…This method is designed to reduce the dimensionality of large datasets while preserving significant variance. For the first time, we applied the PCA-GLASSO algorithm (i.e., MetaboLINK) to metabolomics data derived from Nuclear Magnetic Resonance (NMR) spectroscopy performed on neural cells at various developmental stages, from human embryonic stem cells to neurons.ResultsThe MetaboLINK analysis of longitudinal metabolomics data has revealed distinct pathways related to amino acids, lipids, and energy metabolism, uniquely associated with specific cell progenies. …”
    Get full text
    Article
  17. 117

    LH-YOLO: A Lightweight and High-Precision SAR Ship Detection Model Based on the Improved YOLOv8n by Qi Cao, Hang Chen, Shang Wang, Yongqiang Wang, Haisheng Fu, Zhenjiao Chen, Feng Liang

    Published 2024-11-01
    “…Additionally, a reused and shared convolutional detection (RSCD) head is designed using a weight sharing mechanism. …”
    Get full text
    Article
  18. 118

    APPLICATION OF QUADRATIC PROGRAMMING ON PORTFOLIO OPTIMIZATION USING WOLFE’S METHOD AND PARTICLE SWARM OPTIMIZATION ALGORITHM by Syaripuddin Syaripuddin, Fidia Deny Tisna Amijaya, Wasono Wasono, Shanaz Tulzahrah, Rara Suciati

    Published 2024-05-01
    “…Based on the result, using Wolfe’s method, the ASII and ITMG stock portfolios are obtained, namely the optimal proportion of ASII shares = 0.76401 or 76.401% and ITMG shares = 0.23598 or 23.598%, while the PSO algorithm obtains a portfolio of ASII and ITMG shares, namely ASII shares = 75.02% and ITMG shares = 24.98%. …”
    Get full text
    Article
  19. 119

    EfficientNet-b0-Based 3D Quantification Algorithm for Rectangular Defects in Pipelines by Di Wu, Yong Hong, Jie Wang, Shaojun Wu, Zhihao Zhang, Yizhang Liu

    Published 2025-01-01
    “…The network uses the EfficientNet structure for feature extraction, while the training and validation process utilizes the PyTorch Lightning framework. …”
    Get full text
    Article
  20. 120

    Optimising islanded AC microgrid control: A hierarchical approach with FCS-VMPC and consensus algorithm by Zawar Khan, Muhammad Aamir, Rizwanullah Khan, Mohd Fairouz Mohd Yousof

    Published 2025-03-01
    “…The primary layer is typically implemented using a linear controller, while the secondary control relies on complex control strategies. …”
    Get full text
    Article