Showing 661 - 680 results of 1,377 for search '((( resources OR resources) allocation algorithm ) OR ( (source OR sources) allocation algorithm ))', query time: 0.28s Refine Results
  1. 661
  2. 662

    Dynamic Optimization of Tunnel Construction Scheduling in a Reverse Construction Scenario by Jianying Wei, Yuming Liu, Xiaochun Lu, Rong Zhao, Gan Wang

    Published 2025-02-01
    “…The Mixed-Integer Programming (MIP) approach is used to build the mathematical model, solved with both exact algorithms and Genetic Algorithms (GA), and implemented in Python 3.12.7. …”
    Get full text
    Article
  3. 663

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  4. 664

    Modeling and Optimization of Cable Production Scheduling by Incorporating an Ant Colony Algorithm by Changbiao Zhu, Chongxin Wang, Zhonghua Ni, Xiaojun Liu, Abbas Raza

    Published 2025-04-01
    “…This work proposed a cable production scheduling optimization method based on an ant colony algorithm, aiming at solving the problems of the inefficiency and underutilization of resources in the process of traditional cable scheduling. …”
    Get full text
    Article
  5. 665
  6. 666

    Mission Planning for LEO Satellite IoT Constellation Based on Genetic Algorithm by Yanhong LI, Qiang LYU, Junmin LIANG, Shigang FENG, Junhou MIAO

    Published 2024-06-01
    “…A mission planning algorithm based on genetic algorithm was designed for LEO satellite IoT constellation with no inter-satellite links, aimed to achieve real-time data communication through multiple ground stations while maximized the resource allocation of satellites and ground stations.Firstly, the objective function to maximized the service duration of satellites in orbit and the constraints on clashed tasks were designed, constructed the mission planning model for LEO satellite IoT constellation.Then, based on genetic algorithm, clashed tasks and early stopping mechanism were introduced, and the mission planning algorithm for the LEO satellite IoT constellation was designed.On this basis, experiments were conducted use a constellation of 18 LEO communication satellites without inter-satellite links and 4 ground stations.In addition, in order to verified the performance of the algorithm, first come first service (FCFS) algorithm was also used for mission planning of the experimental data.The experiments compared with FCFS showed that the designed mission planning algorithm for LEO satellite IoT constellation could significantly improve the scheduling capacity of ground stations for receiving data of communication satellites, addressed the contradiction of insufficient ground stations with a large number of satellites.…”
    Get full text
    Article
  7. 667

    AUV path planning method based on improved sparrow search algorithm by Lijun TANG, Yunxia FAN, Xingyu ZHOU, Qian SUN

    Published 2025-06-01
    “…Finally, the population size is dynamically updated using Thompson sampling, allowing the algorithm to adaptively allocate computational resources based on the complexity of the environment. …”
    Get full text
    Article
  8. 668

    A multi-greedy spectrum auction algorithm for cognitive small cell networks by Feng Zhao, Bo Liu, Hongbin Chen

    Published 2017-06-01
    “…The proposed algorithm can achieve conflict-free spectrum allocations that maximize the utility and spectrum allocation efficiency. …”
    Get full text
    Article
  9. 669

    DROVE: An Algorithm for Spatial and Temporal Disaggregation of On-road Vehicle Emission Inventories by Carlos M. González, Carlos D. Gómez, Beatriz H. Aristizábal

    Published 2020-08-01
    “…Hence, exercises for estimating atmospheric pollutant emissions are developed only in a macro-scale way, without allocating in space and time the emissions. In this study, we present a new computational algorithm named DROVE, for the disaggregation of on-road vehicle emissions in space and time. …”
    Get full text
    Article
  10. 670
  11. 671

    Novel cooperative power control game algorithm for cognitive radio systems by CHENG Shi-lun1, YANG Zhen1, ZHANG Hui2

    Published 2007-01-01
    “…In order to fair optimally allocate the limited cognitive radio resource,a cognitive radio system was developed based on STBC OFDM-CDMA network systems and a novel Nash bargaining solution named NBS of cooperative power control was adopted in this system,the transmitted power was dynamically adapted based on channel conditions,maxi-mal network throughput and power limits.Simulation results show that the novel algorithm can regulate their transmitter powers,fair optimally allocate radio resource.At the same power consumption,the network throughput is thereby im-proved obviously.…”
    Get full text
    Article
  12. 672

    Novel cooperative power control game algorithm for cognitive radio systems by CHENG Shi-lun1, YANG Zhen1, ZHANG Hui2

    Published 2007-01-01
    “…In order to fair optimally allocate the limited cognitive radio resource,a cognitive radio system was developed based on STBC OFDM-CDMA network systems and a novel Nash bargaining solution named NBS of cooperative power control was adopted in this system,the transmitted power was dynamically adapted based on channel conditions,maxi-mal network throughput and power limits.Simulation results show that the novel algorithm can regulate their transmitter powers,fair optimally allocate radio resource.At the same power consumption,the network throughput is thereby im-proved obviously.…”
    Get full text
    Article
  13. 673

    Improved salp swarm algorithm based optimization of mobile task offloading by Aishwarya R., Mathivanan G.

    Published 2025-05-01
    “…Results This technique harnesses the optimization capabilities of the improved salp swarm algorithm (ISSA) to intelligently allocate computing tasks between mobile devices and the cloud, aiming to concurrently minimize energy consumption, and memory usage, and reduce task completion delays. …”
    Get full text
    Article
  14. 674

    Optimizing music course scheduling with real number encoding and chaos genetic algorithm by Shu Li

    Published 2025-12-01
    “…Traditional scheduling systems usually use simple algorithms or manual intervention, resulting in low efficiency and uneven resource allocation. …”
    Get full text
    Article
  15. 675

    Comparative Performance Evaluation of Scheduling Algorithms using 5G‑Air‑Simulator by Moaath Saleh Abdulrahman, Buthaina Mosa Omran

    Published 2025-05-01
    “…With the spread of new applications, efficient scheduling algorithms are mandatory to handle the allocation of the limited spectrum resources to various types of traffic and to guarantee the requirements of the quality of service and the quality of experience informed by users. …”
    Get full text
    Article
  16. 676

    A New Multiobjective A∗ Algorithm With Time Window Applied to Large Airports by Bosheng Ba, Ye Yu, Ruixin Wang, Jean-Baptiste Gotteland, Yunqi Gao

    Published 2024-01-01
    “…This study proposes a multiobjective A∗ algorithm with time windows which takes into account the allocation of resources on airport taxiways and introduces factors such as turning angles, dynamic turning speeds, and dynamic characteristics of the ground operations. …”
    Get full text
    Article
  17. 677

    The Evaluation of Online Education Course Performance Using Decision Tree Mining Algorithm by Yongxian Yang

    Published 2021-01-01
    “…The decision tree mining algorithm can classify the data, grasp the teaching process of the teacher, and analyze the overall performance of the students, so as to realize the dynamic management of the educational administration and help the educational administration personnel to make the right decision, with more reasonable allocation of resources. …”
    Get full text
    Article
  18. 678

    Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks by Dong WANG, Yong-cheng LI, Bo BAI, Man-xi WANG

    Published 2017-01-01
    “…The maximization problem of secure energy efficiency (EE) in decode-and-forward relay networks was investigated considering the power and energy constraints in physical-layer secure transmission.An iterative algorithm for power allocation was proposed based on fractional programming and DC (difference of convex functions) programming.This algorithm jointly allocated power for source and relay nodes to achieve energy-efficient secure transmission,subject to the peak power constraint of each node and the minimum secrecy rate requirement of the system.Simulation results demonstrate that the propose algorithm can improve the secure EE significantly compared with the conventional secrecy rate maximization strategy.…”
    Get full text
    Article
  19. 679
  20. 680