-
621
Energy consumption optimization scheme in UAV-assisted MEC system based on optimal SIC order
Published 2024-02-01“…In uplink non-orthogonal multiple access (NOMA)-based unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, the successive interference cancellation (SIC) order of NOMA became a bottleneck limiting the transmission performance of task offload in uplink link.To reduce the energy consumption of the system, the SIC order was discussed and the optimal SIC order based on channel gain and task delay constraint was proposed.The optimization problem of minimizing the system energy consumption was proposed based on the optimal SIC order while satisfying the constraints of the given task delay of the device, the maximum transmit power constraint of the device, and the UAV trajectory.Since the problem was a complex non-convex problem, an alternating optimization method was adopted to solve the optimization problem to achieve power allocation and UAV trajectory optimization.A low-complexity algorithm based on matching theory was proposed to obtain the optimal device grouping in different time slots.Simulation results show that the optimal SIC order can realize smaller system energy consumption under the same task delay constraint compared with other SIC order, the proposed low-complexity device grouping algorithm can obtain the optimal device grouping.…”
Get full text
Article -
622
Energy consumption optimization scheme in UAV-assisted MEC system based on optimal SIC order
Published 2024-02-01“…In uplink non-orthogonal multiple access (NOMA)-based unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, the successive interference cancellation (SIC) order of NOMA became a bottleneck limiting the transmission performance of task offload in uplink link.To reduce the energy consumption of the system, the SIC order was discussed and the optimal SIC order based on channel gain and task delay constraint was proposed.The optimization problem of minimizing the system energy consumption was proposed based on the optimal SIC order while satisfying the constraints of the given task delay of the device, the maximum transmit power constraint of the device, and the UAV trajectory.Since the problem was a complex non-convex problem, an alternating optimization method was adopted to solve the optimization problem to achieve power allocation and UAV trajectory optimization.A low-complexity algorithm based on matching theory was proposed to obtain the optimal device grouping in different time slots.Simulation results show that the optimal SIC order can realize smaller system energy consumption under the same task delay constraint compared with other SIC order, the proposed low-complexity device grouping algorithm can obtain the optimal device grouping.…”
Get full text
Article -
623
An Integrated Optimization Method for Resource-Constrained Schedule Compression Under Uncertainty in Construction Projects
Published 2025-04-01“…An integrated solution that considers the shortening of scheduling and the planning of resource integration was conceived. The proposed method allocates the resources and the execution mode costs effectively in order to minimize the project duration and the cost of construction activities. …”
Get full text
Article -
624
(IoT) Network intrusion detection system using optimization algorithms
Published 2025-07-01“…In multi-class attack identification scenarios, the framework mitigates feature confusion between rare attacks (e.g., user-to-root attacks) and normal traffic through adaptive feature weight allocation. This study further validates the potential of swarm intelligence algorithms in the field of IoT security, offering a novel methodological foundation for efficient threat detection in resource-constrained environments.…”
Get full text
Article -
625
Application of the Random Forest Algorithm for Accurate Bipolar Disorder Classification
Published 2025-03-01“…Its ability to reduce diagnostic delays, improve classification accuracy, and optimize resource allocation make it a promising tool for integrating artificial intelligence into psychiatric care. …”
Get full text
Article -
626
From algorithms to negotiations: Why health diplomacy must adapt.
Published 2025-01-01Get full text
Article -
627
Random Regret-Minimization Model for Emergency Resource Preallocation at Freeway Accident Black Spots
Published 2018-01-01“…At the same time, we propose a three-stage random regret-minimization (RRM) model to minimize the regret value of the attribute of overall response time, cost, and demand, which allocates limited emergency resources to more likely to happen accident spots. …”
Get full text
Article -
628
Anti-Jamming RIS Communications Using DQN-Based Algorithm
Published 2022-01-01“…To this end, we formulate an anti-jamming communication optimization problem as a Markov decision process (MDP) framework and then design a deep Q network (DQN)-based algorithm to generate an optimal policy. As a result, the optimal resource allocation is achieved through trial-and-error interactions with environment by observing the predefined rewards and the network state transition. …”
Get full text
Article -
629
Optimized Dual-Battery System with Intelligent Auto-Switching for Reliable Soil Nutrient Monitoring in Remote IoT Applications
Published 2025-05-01“…The proposed system integrates Lithium-Sulphur (Li-S) and Lithium-Ion (Li-Ion) batteries with advanced switching algorithms—specifically, the Dynamic Load Balancing–Power Allocation Optimisation (DLB–PAO) and Dynamic Load Balancing–Genetic Algorithm (DLB–GA)—tailored to maximise sensor operational longevity. …”
Get full text
Article -
630
Study on network reconfiguration algorithms in software-defined sensor networks
Published 2016-07-01“…Simulation results show that the proposed routing algorithm can efficiently allocate resources to satisfy the requirements of multi-service's QoS and to prolong the lifetime of network.…”
Get full text
Article -
631
A node deployment and resource optimization method for CPDS based on cloud‐fog‐edge collaboration
Published 2024-11-01“…Subsequently, an improved multi‐objective particle swarm optimization algorithm (MWM‐MOPSO) is employed to solve the task resource allocation problem. …”
Get full text
Article -
632
Multiple UAV Swarms Collaborative Firefighting Strategy Considering Forest Fire Spread and Resource Constraints
Published 2024-12-01“…To address the demands of efficient forest fire detection and suppression, an adaptive multiple UAV swarm collaborative firefighting strategy considering dynamic forest fire spread and resource constraints was proposed in this paper. The multiple UAV swarm adaptive information-driven collaborative search (MUSAIDCS) algorithm and the resource-limited firefighting model were established. …”
Get full text
Article -
633
A Multiconstrained Grid Scheduling Algorithm with Load Balancing and Fault Tolerance
Published 2015-01-01“…A scheduling algorithm is said to be efficient if and only if it performs better resource allocation even in case of resource failure. …”
Get full text
Article -
634
Human resource management model based on multi-objective differential evolution and multi-skill scheduling
Published 2025-12-01“…This provides a scientific basis for enterprises to allocate human resources reasonably and improve project efficiency. …”
Get full text
Article -
635
A Novel NSGA-III-GKM++ Framework for Multi-Objective Cloud Resource Brokerage Optimization
Published 2025-06-01“…Cloud resource brokerage is a fundamental challenge in cloud computing, requiring the efficient selection and allocation of services from multiple providers to optimize performance, sustainability, and cost-effectiveness. …”
Get full text
Article -
636
Application of improved clustering algorithm in mixed teaching of modern educational technology
Published 2025-08-01“…The improved clustering algorithm demonstrates high precision and flexibility, enabling accurate resource allocation, effective teaching content, and targeted pacing adjustments based on students’ learning progress. …”
Get full text
Article -
637
Intelligent Integration Method of AI English Teaching Resource Information under Multi-Agent Collaboration
Published 2022-01-01“…Moreover, this article analyzes the principles and properties of the three algorithms, ALO, GWO, and MFO, and integrates them into the D2D power allocation problem in the two communication modes. …”
Get full text
Article -
638
An Approach for Multi-Source Land Use and Land Cover Data Fusion Considering Spatial Correlations
Published 2025-03-01“…The proposed multi-source land use data fusion method and its products can provide support and services for urban sustainable construction, resource management, and environmental monitoring and protection, demonstrating significant research value and importance.…”
Get full text
Article -
639
An Improved Coral Reef Optimization-Based Scheduling Algorithm for Cloud Computing
Published 2021-01-01“…In this paper, we establish a resource allocation framework and propose a novel task scheduling algorithm. …”
Get full text
Article -
640
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article