-
181
Power Adaptation for Optimizing Secrecy Energy Efficiency in NOMA-Enabled Underlay Cognitive Radio Networks and DNN-Based Evaluation
Published 2025-01-01“…The computation of the JOTPA for the SUs is enabled by an iterative algorithm that utilizes the Dinkelbach method. It is demonstrated that the suggested JOTPA scheme significantly enhances the SEE of the secondary network in comparison to the random transmit power allocation and equal transmit power allocation strategies. …”
Get full text
Article -
182
Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels
Published 2024-01-01“…Considering the eavesdropper as an illegitimate user, whose channel state information matrix is unknown to the legitimate receiver and does not follow a simple distribution pattern, this study employs random matrix theory to model the channel of an unknown eavesdropper. It uses the successive convex approximation algorithm to analyze the optimal power allocation strategy and the maximum number of eavesdropper antennas that the system can tolerate under these conditions. …”
Get full text
Article -
183
Mitigating Dead Node Impact on Coverage and Connectivity in Wireless Sensor Networks Using a Hybrid Approach
Published 2025-04-01“…Previous research in the same context indicates the need for further investigation to achieve optimal trade-offs in network resource allocation. This research introduces a hybrid Artificial Bee Colony-Sequential Re-connectivity and Coverage Algorithm (ABC-SRCA) approach, combining the ABC algorithm with a developed SRCA. …”
Get full text
Article -
184
Generalized BER Performance Analysis for SIC-Based Uplink NOMA
Published 2025-01-01“…It is shown that these expressions are essential for designing optimal uplink power allocation (PA) strategies and mitigating SIC error floors, as evidenced by the proposed PA algorithm which achieves significant performance gains. …”
Get full text
Article -
185
Application of Collective Intelligence of Artificial Bee Colony Algorithm in Optimization of Estimation and Zoning of Wind Erosion Intensity Using Geomorphological data (Case Study...
Published 2016-08-01“…Then optimization of bee colony algorithm was implemented in three steps: (1) the allocation process, (2) the investigation process and (3) conclusion process by the bees. …”
Get full text
Article -
186
Dynamic scheduling strategies for cloud-based load balancing in parallel and distributed systems
Published 2025-07-01“…The allocation step is followed by the Hybrid Ant Genetic Algorithm (HAGA), which is used to schedule tasks in parallel. …”
Get full text
Article -
187
The financial impact of human resources configuration: A quantitative analysis based on modified single candidate optimizer
Published 2025-03-01“…Recently, by complicated and fast changing business environments, the effective allocation of Human Resources (HR) is considered as an important task to achieve success within organizations. …”
Get full text
Article -
188
Novel Application of Quantum Computing for Routing and Spectrum Assignment in Flexi-Grid Optical Networks
Published 2024-10-01“…In this small network, the algorithm successfully converged to an optimal solution in less than 30 iterations, with a total runtime of approximately 10.7 s with an accuracy of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>78.8</mn><mo>%</mo></mrow></semantics></math></inline-formula>. …”
Get full text
Article -
189
Machine Learning in the National Economy
Published 2025-07-01“…Through the use of advanced algorithms and tools, such as linear regression, decision trees, and neural networks, it is possible to effectively model and predict key macroeconomic indexes, including GDP growth, inflation, and financial risks. …”
Get full text
Article -
190
A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment
Published 2025-01-01“…For migration, the Improved Sparrow Search Algorithm (ISSA) is applied, factoring in CPU, memory, and server security thresholds to identify suitable migration servers for Virtual Network Functions (VNFs). …”
Get full text
Article -
191
Data Compression with a Time Limit
Published 2025-03-01“…In this paper, we explore a framework to identify an optimal choice of compression algorithms that enables the best allocation of computing resources in a large-scale data storage environment: our goal is to maximize the efficiency of data compression given a time limit that must be observed by the compression process. …”
Get full text
Article -
192
A Regret-Enhanced DEA Approach to Mapping Renewable Energy Efficiency in Asia’s Growth Economies
Published 2025-05-01Get full text
Article -
193
Analysis of Short Texts Using Intelligent Clustering Methods
Published 2025-05-01Get full text
Article -
194
Pulse Sequence Division in Mixed Signal Flow
Published 2017-06-01“…Based on the classification improved algorithm for the allocation sequence is developed. …”
Get full text
Article -
195
Enabling Power Systems With SQKD in Presence of Remote Nodes
Published 2025-01-01“…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
Get full text
Article -
196
Experimental Study on Heuristics Energy Management Strategy for Hybrid Energy Storage System
Published 2024-11-01“…The energy management strategy (EMS) is a decision-making algorithm for effective power allocation between storage devices in a hybrid energy storage system (HESS). …”
Get full text
Article -
197
Resource Management Based on Security Satisfaction Ratio with Fairness-Aware in Two-Way Relay Networks
Published 2015-07-01“…We model the security resource management problem as a mixed integer programming problem, which is decomposed into three subproblems, distributed power allocation, distributed subchannel allocation, and distributed subchannel pairing, and then solved it in constraint particle swarm optimization (CPSO), binary CPSO (B_CPSO), and classic Hungarian algorithm (CHA) method, respectively. …”
Get full text
Article -
198
Cooperative Transmission in Cognitive Radio Ad Hoc Networks
Published 2012-05-01“…We propose a heuristic algorithm to solve the resource allocation problem, which is based on the metric of utility-spectrum ratio of transmission groups. …”
Get full text
Article -
199
Energy Efficiency of Full-Duplex Bidirectional Relaying with Asymmetric Traffics
Published 2020-06-01“…The simulation experiments reveal that the proposed algorithm performs well in terms of energy efficiency when the source nodes have asymmetric traffics. …”
Get full text
Article -
200
Visual analytics of urban epidemic situation development and dynamic regulation
Published 2023-11-01“…In order to solve the reasonable allocation of limited medical resources for patients, a visual platform for dynamic control of cabin hospital was built based on the dataset of the COVID-19 epidemic in Wuhan cabin hospital, which integrates multi-source data such as public opinion, space-time trajectory and science popularization.The droppingwater diagram was introduced to dynamically monitor the overall situation of the cabin hospital.The theme model and sentiment dictionary were used to extract the emotional features of the masses, the WordStream were used to visually present the trend of urban public opinion.The path planning algorithm based on hospital load capacity were built for treatment route, the population-oriented science information of access to cabin hospital and the urban recovery model can enhance anti-epidemic confidence.The system is helpful to realize the reasonable allocation of human and material resources, timely guide the emotional trend of the masses, pay attention to the change of public opinion after the release of new polices/decisions, and slow down the phenomenon of patients gathering.The function and effectiveness of the system was verified by the analysis of several cases.…”
Get full text
Article