Showing 281 - 300 results of 349 for search '((( (sourcess OR success) OR source) allocation algorithm ) OR ( sources allocation algorithm ))', query time: 0.21s Refine Results
  1. 281

    IntelliGrid AI: A Blockchain and Deep-Learning Framework for Optimized Home Energy Management with V2H and H2V Integration by Sami Binyamin, Sami Ben Slama

    Published 2025-02-01
    “…The core of IntelliGrid AI is an advanced Q-learning algorithm that intelligently allocates energy resources. …”
    Get full text
    Article
  2. 282

    The methodology for calculating the number of teaching staff using economically feasible norms by L. A. Krokhmal, Yu. A. Kovshun

    Published 2025-01-01
    “…The standard for financial support of the state assignment of universities is considered and the author’s algorithm for calculating the number of teaching staff, based on the integration of educational and economic plans of the university, is developed. …”
    Get full text
    Article
  3. 283

    Trajectory Planning Method for Formation Rendezvous of Underactuated Multi-UUV Under Multiple Constraints by Qingzhe Wang, Da Xu, Xiaoran Liu, Gengshi Zhang, Zhao Han

    Published 2024-11-01
    “…The simulation results show that the generated trajectory successfully achieves the formation rendezvous while satisfying multiple constraints.…”
    Get full text
    Article
  4. 284

    A spatially explicit containment modelling approach for escaped wildfires in a Mediterranean climate using machine learning by Gbenga Lawrence Alawode, Pere Joan Gelabert, Marcos Rodrigues

    Published 2025-12-01
    “…Conversely, steep mountainous regions with limited accessibility exhibited lower containment success rates. We also found temperature and windspeed to be critical factors influencing containment success. …”
    Get full text
    Article
  5. 285

    Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience by Dahhak Hajar, Nadia Afifi, Imane Hilal

    Published 2025-04-01
    “…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
    Get full text
    Article
  6. 286

    Zero-Shot Learning for Accurate Project Duration Prediction in Crowdsourcing Software Development by Tahir Rashid, Inam Illahi, Qasim Umer, Muhammad Arfan Jaffar, Waheed Yousuf Ramay, Hanadi Hakami

    Published 2024-10-01
    “…The implementation of the proposed automated duration prediction model is crucial for enhancing the success rate of crowdsourcing projects, optimizing resource allocation, managing budgets effectively, and improving stakeholder satisfaction.…”
    Get full text
    Article
  7. 287

    Smart Electric Vehicle Charging Management Using Reinforcement Learning on FPGA Platforms by Udhaya Mugil Damodarin, Gian Carlo Cardarilli, Luca Di Nunzio, Marco Re, Sergio Spanò

    Published 2025-04-01
    “…The FPGA implementation leverages hardware design strategies to ensure efficient operation and real-time response within a limited amount of required energy, allowing for its implementation in embedded applications and possibly enabling the use of an energy harvesting power source, like a small solar panel. The proposed design effectively manages multiple EV chargers by dynamically allocating current and prioritizing charging tasks to maintain service quality. …”
    Get full text
    Article
  8. 288

    Tackling the Optimal Phasor Measurement Unit Placement and Attack Detection Problems in Smart Grids by Incorporating Machine Learning by Ramzi Al-Sharawi, Abdelfatah Ali, Mostafa Shaaban, Nasser Qaddoumi, Mohamed S. Abdalzaher

    Published 2025-01-01
    “…These results highlight the success of our framework in concurrently optimizing attack detection performance, topological observability, and system cost.…”
    Get full text
    Article
  9. 289
  10. 290

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  11. 291

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  12. 292

    Processing streams in a monitoring cloud cluster by Alexey N. Nazarov

    Published 2020-01-01
    “…Hadoop web-programming environment is the technological basis for the development of algorithmic and software solutions for the synthesis of monitoring clusters, including information security and information counteraction systems. …”
    Get full text
    Article
  13. 293

    Application-oriented resource matching model based on trust for internet-based virtual computing environment by Chun-ge ZHU, Xin-ran LIU, Yi-xian YANG, Hong ZHANG

    Published 2013-09-01
    “…In order to solve the problem of reasonable resource s ing in the virtual computing environment (iVCE),a resource matching model,based on trust “resource sliding window” model,was proposed.Firstly,the resources were classified in advance by their static properties.Then the resource nodes were evaluated by a trust model based on the time window and Bayesian algorithm,and the evaluated results as well as the resource load were fused to determine the levels of the dynamic real-time performance.Finally,the scheduling resources were allocated according to the comprehensive assessment of the static and dynamic properties of the resource nodes.The proposed model provides a basis of scheduling strategy for different resources with different tasks and attributes,thus achieving the goal of “proper resources’ serving proper tasks”.Simulation results show that,compared the previous scheduling algorithm,the proposed model has better performance in the success rate of task execution and the rate of resource utilization.…”
    Get full text
    Article
  14. 294
  15. 295

    Adaptive Resource Optimization for IoT-Enabled Disaster-Resilient Non-Terrestrial Networks using Deep Reinforcement Learning by Fathe Jeribi, R. John Martin

    Published 2025-06-01
    “…Additionally, unmanned aerial vehicles (UAVs) are used to provide optimal coverage for IoT nodes in disaster areas, with coverage optimization achieved through the non-linear smooth optimization (NLSO) algorithm. Furthermore, we develop the multi-variable double deep reinforcement learning (MVD-DRL) framework for resource management, which addresses congestion and transmission power of IoT nodes to enhance network performance by maximize successful connections. …”
    Get full text
    Article
  16. 296

    Discrete Phase Shift IRS-Assisted Energy Harvesting in Cognitive Radio Networks With Spectrum Sensing by Lilian Chiru Kawala, Guoquan Li, Mihertie Habtamu Demeke, Junzhou Xiong, Hao Xiong, Hang Hu

    Published 2025-01-01
    “…Simulation results demonstrate the superior performance of the proposed framework and the novel resource allocation algorithm based on alternating optimization. …”
    Get full text
    Article
  17. 297

    Resource Efficient Handover Strategy for LTE Femtocells by Sungkwan Youm, Jai-Jin Jung, Youngwoong Ko, Eui-Jik Kim

    Published 2015-09-01
    “…The performance of the proposed algorithm is verified through a simulation, and the simulation results indicate that the proposed handover algorithm improves the reusability of the cell bandwidth and increases the overall capacity of the network.…”
    Get full text
    Article
  18. 298

    Predicting hospital outpatient volume using XGBoost: a machine learning approach by Lingling Zhou, Qin Zhu, Qian Chen, Ping Wang, Hao Huang

    Published 2025-05-01
    “…Accurate prediction of outpatient demand can significantly enhance operational efficiency and optimize the allocation of medical resources. This study aims to develop a predictive model for daily hospital outpatient volume using the XGBoost algorithm. …”
    Get full text
    Article
  19. 299

    Intelligent Beam-Hopping-Based Grant-Free Random Access in Secure IoT-Oriented Satellite Networks by Zhongliang Deng, Yicheng Liao

    Published 2025-01-01
    “…This technique utilizes orthogonal resource allocation algorithms to facilitate efficient resource sharing, effectively tackling the irregular and dynamic traffic. …”
    Get full text
    Article
  20. 300

    Fatty Acids of European Sardine (<i>Sardina pilchardus</i>) White Muscle Can Discriminate Geographic Origin Along the Iberian Atlantic Coast by Ricardo Calado, Marcos Palma, Maria Rosário Domingues, Fernando Ricardo, Felisa Rey

    Published 2025-01-01
    “…An average 83% correct allocation of landed specimens was achieved, with some landing locations presenting 100% correct allocation (e.g., Ría de Pontevedra in northern Spain and Peniche in central Portugal). …”
    Get full text
    Article