Showing 161 - 180 results of 349 for search '((( (sourcess OR success) OR source) allocation algorithm ) OR ( sources allocation algorithm ))', query time: 0.23s Refine Results
  1. 161

    Two-Layer Heuristic Information-Driven Frequency Plan Design for Multi-Gateway Multi-Beam Satellite Systems by Longteng Yi, Zhihui Chen, Zanyang Dong, Muxin Wei, Hong Zhao, Rui Chen

    Published 2024-01-01
    “…Under the provided datasets, THISA achieves 100% frequency spectrum utilization, outperforming classic heuristic algorithms. The proposed THISA algorithm has been successfully applied in practical multi-gateway multi-beam satellite systems.…”
    Get full text
    Article
  2. 162

    Enhancing 5G Vehicular Edge Computing Efficiency with the Hungarian Algorithm for Optimal Task Offloading by Mohamed Kamel Benbraika, Okba Kraa, Yassine Himeur, Khaled Telli, Shadi Atalla, Wathiq Mansoor

    Published 2024-10-01
    “…HATO leverages 5G’s low-latency, high-bandwidth communication to efficiently allocate tasks across edge servers and nearby vehicles, utilizing the Hungarian algorithm for optimal task assignment. …”
    Get full text
    Article
  3. 163

    Oil Well Characterization and Artificial Gas Lift Optimization Using Neural Networks Combined with Genetic Algorithm by Chukwuka G. Monyei, Aderemi O. Adewumi, Michael O. Obolo

    Published 2014-01-01
    “…This paper presents a successive application of modified artificial neural network (MANN) combined with a mild intrusive genetic algorithm (MIGA) to the oil well characteristics with promising results. …”
    Get full text
    Article
  4. 164
  5. 165

    The Toulouse algorithm identifies patients with increased risk of cardiac decompensation only in patients with TIPS for refractory ascites by Emma Vanderschueren, Youri Bekhuis, Jan Clerick, Jappe Decock, Philippe Meersseman, Alexander Wilmer, Eveline Claus, Lawrence Bonne, Guido Claessen, Chris Verslype, Geert Maleux, Wim Laleman

    Published 2025-01-01
    “…Correspondingly, the Toulouse algorithm successfully identified patients at risk for CD, however only in the RA population (zero risk 0% vs. low risk 12.5% vs. high risk 35.3% with CD; p = 0.003). …”
    Get full text
    Article
  6. 166
  7. 167

    Computation offloading scheme for RIS-empowered UAV edge network by Bin LI, Wenshuai LIU, Wancheng XIE, Zesong FEI

    Published 2022-10-01
    “…In order to address the challenge of low offloading rate caused by the obstacles blocking in the links between unmanned aerial vehicle (UAV) and ground users (GU) in urban scene, a partial task offloading scheme for UAV-enabled mobile edge computing with the aid of reconfigurable intelligence surface was proposed.A nonconvex and multivariable coupling stochastic optimization problem was formulated by the joint design of the computation task allocation, the transmit power of GU, the phase shift of RIS, UAV computation resource, and UAV trajectory, aiming at maximizing the minimum average data throughput of GU.By leveraging the properties of mathematical expectation, the stochastic optimization problem was transformed into a deterministic optimization problem.Then, the deterministic optimization problem was decomposed into three subproblems by using the block coordinate descent (BCD) algorithm.By introducing auxiliary variables, the nonconvex problems were transformed into convex optimization problems via the successive convex approximation and semidefinite relaxation, and then the approximate suboptimal solution of the original problem was obtained.The simulation results show that the proposed algorithm has good convergence performance and effectively improves the average data throughput of GU.…”
    Get full text
    Article
  8. 168

    Research on Cooperative Search and Dynamic Target Encirclement of Unmanned Surface Vehicle Swarms Based on Improved Pheromone Algorithm by Antong Zhang, Yunfan Yang, Zhuo Chen, Tao Bao, Yu Guo, Xu Liu, Wenhui Yin

    Published 2025-01-01
    “…The effectiveness and rationality of this method were successfully confirmed through simulations and experiments.…”
    Get full text
    Article
  9. 169

    Adaptive-clustered image-block hierarchical DCT hybrid digital-analog wireless transmission method by Shu TANG, Peng YANG, Xianzhong XIE, Guangyi ZHOU, Jiaqing LI, Yu ZHAO

    Published 2024-01-01
    “…In order to achieve high quality image transmission, a novel hybrid digital-analog (HDA) wireless transmission method was proposed.Firstly, the image residual layer was constructed by subtracting the downsampled and upsampled images from the original image respectively.Secondly, an adaptive-clustered block-level discrete cosine transform (DCT) algorithm was proposed to efficiently remove the correlation between image pixels in the residual layer.Finally, an image block level-based unequal power allocation strategy for further boosting the quality of received images was proposed.Extensive experiments results demonstrate that the proposed method is significantly superior to existing successful hybrid digital analog image wireless transmission methods in both qualitative evaluation and quantitative measurement.…”
    Get full text
    Article
  10. 170

    SC-PA: A spot-checking model based on Stackelberg game theory for improving peer assessment by Jia Xu, Panyuan Yang, Teng Xiao, Pin Lv, Minghe Yu, Ge Yu

    Published 2025-03-01
    “…In particular, to ensure the utilities of both of the teachers and students, an algorithm that computes the optimal allocation plan for review resources is carefully designed based on Stackelberg equilibrium. …”
    Get full text
    Article
  11. 171
  12. 172

    Modified Algorithm for Calculating the Parameters of Maneuvers of Coplanar Meeting of Spacecraft in a Near-Circular Orbit Using Low-Thrust Engines by Andrey A. Baranov, Adilson P. Olivio

    Published 2025-07-01
    “…In the second stage, maneuvers are allocated across the available turns to ensure a successful rendezvous by minimizing a selected control variable. …”
    Get full text
    Article
  13. 173

    Fairness-Aware Utility Maximization for Multi-UAV-Aided Terrestrial Networks by Nishant Gupta, Satyam Agarwal, Aymen Fakhreddine

    Published 2024-01-01
    “…In the second stage, we utilize the solution obtained in the first part and develop an interference-aware iterative scheme to jointly optimize user scheduling, resource allocation, and ABS placement. Given the non-convex nature of this problem, we employ the successive convex approximation technique to approximate the non-convex objectives and constraints. …”
    Get full text
    Article
  14. 174
  15. 175

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  16. 176

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  17. 177

    Electricity pinch analysis method for flexibility supply-demand matching in power systems by Yaling Mao, Tiejiang Yuan, Xueqin Tian, Yue Teng

    Published 2025-10-01
    “…First, the net-load profile is decomposed by successive variational mode decomposition (SVMD) optimized with the Red-billed Blue Magpie Optimization (RBMO) algorithm to construct a flexibility demand model. …”
    Get full text
    Article
  18. 178

    Particle Swarm Optimization Algorithm for Determining Global Optima of Investment Portfolio Weight Using Mean-Value-at-Risk Model in Banking Sector Stocks by Moh. Alfi Amal, Herlina Napitupulu, Sukono

    Published 2024-12-01
    “…The results of this study indicate that the adapted PSO algorithm successfully determines the optimal portfolio weight composition, calculates the expected return and VaR in the optimal portfolio, creates an efficient frontier surface graph, and establishes portfolio performance measures. …”
    Get full text
    Article
  19. 179

    Asset management using an extended Markowitz theorem by Paria Karimi

    Published 2014-06-01
    “…The method has been widely used to solve many applications, successfully. In this paper, we present a multi objective Markowitz model to determine asset allocation by considering cardinality constraints. …”
    Get full text
    Article
  20. 180

    ADVCSO: Adaptive Dynamically Enhanced Variant of Chicken Swarm Optimization for Combinatorial Optimization Problems by Kunwei Wu, Liangshun Wang, Mingming Liu

    Published 2025-05-01
    “…For collaborative multi-subproblem optimization, the ADVCSO exhibits a superior performance in both Multiple Traveling Salesman Problems (MTSPs) and Multiple Knapsack Problems (MKPs), reducing the maximum path length in MTSPs by 6.0% to 358.27 units while enhancing the MKP optimal solution success rate by 62.5%. The proposed algorithm demonstrates an exceptional performance in combinatorial optimization and holds a significant engineering application value.…”
    Get full text
    Article