-
701
A Random Traffic Assignment Model for Networks Based on Discrete Dynamic Bayesian Algorithms
Published 2022-01-01“…We study the implementation of traffic assignment engineering in conjunction with the network stochastic model: first, we study the Bayesian algorithm theoretical model of control layer stripping in the network based on the discrete dynamic Bayesian algorithm theory and analyze the resource-sharing mechanism in different queuing rules; second, we study the extraction and evaluation theory of traffic assignment for the global view obtained by the control layer of the network and establish the Bayesian algorithm analysis model based on the traffic assignment; subsequently, the routing of bandwidth guarantee and delay guarantee in the network is studied based on Bayesian algorithm model and Bayesian algorithm network random traffic allocation theory. …”
Get full text
Article -
702
Hospital Length-of-Stay Prediction Using Machine Learning Algorithms—A Literature Review
Published 2024-11-01“…Predicting hospital length of stay is critical for efficient hospital management, enabling proactive resource allocation, the optimization of bed availability, and optimal patient care. …”
Get full text
Article -
703
Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms
Published 2025-12-01“…Moreover, integrating machine learning into risk management enhances decision-making by providing precise, data-driven predictions, allowing for more effective strategies and efficient resource allocation.Future research could incorporate additional data, such as historical records, economic indicators, and internal process information, to further improve prediction accuracy. …”
Get full text
Article -
704
Investigating the Nonlinear Relationship Between the Built Environment and Urban Vitality Based on Multi-Source Data and Interpretable Machine Learning
Published 2025-04-01“…The analytical outcomes of this study provide valuable insights for optimizing the spatial layout and resource allocation within urban settings, offering references for urban planning and sustainable development initiatives.…”
Get full text
Article -
705
Fuzzy clustering based scheduling algorithm for minimizing the tasks completion time in cloud computing environment
Published 2025-06-01“…With its focus on fuzzy resource allocation that considers task composition and priority, BDHEFT streamlines the project schedule, ultimately reducing both execution time and costs. …”
Get full text
Article -
706
Research on Nonlinear Error Compensation and Intelligent Optimization Method for UAV Target Positioning
Published 2025-07-01“…This study proposes an error allocation method based on the improved raccoon optimization algorithm (KYCOA) to resolve the problem of degradation of positioning accuracy due to multi-source error coupling during UAV target positioning. …”
Get full text
Article -
707
Rolling Bearing Dynamics Simulation Information-Assisted Fault Diagnosis with Multi-Adversarial Domain Transfer Learning
Published 2025-03-01“…Simultaneously, an improved loss function with embedded maximum mean discrepancy is designed to reduce the feature distribution gap between source and target domain data. Finally, a weight allocation mechanism for source domain and simulation domain samples is developed to promote positive transfer and suppress negative transfer. …”
Get full text
Article -
708
Numerical Algorithm for Solving Market Clearing Problem in Power Electronics-Based Power Distribution Systems
Published 2024-01-01“…Market-based control is a control approach that can be used to organize resource control problems by establishing an artificial market economy for the allocation of these resources. …”
Get full text
Article -
709
Developing Resilient and Expandable Adaptive Capacity Arbitration Algorithms for Future WCDMA (UMTS) Wireless Systems
Published 2023-10-01“… The objective of this research paper is to tackle the emerging challenges associated with resource management in future WCDMA (UMTS) wireless systems by presenting resilient and expandable adaptive capacity arbitration algorithms. …”
Get full text
Article -
710
QoS-aware enhanced proportional faire scheduling algorithm for real-time services in LTE networks
Published 2023-06-01“…This paper proposes a resource scheduling downlink algorithm for LTE networks. …”
Get full text
Article -
711
Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning
Published 2025-05-01“…Abstract Drought is one of the most significant natural hazards worldwide, affecting water resources, agriculture, and socio-economic stability. …”
Get full text
Article -
712
Study and Implementation of Multi-GPU Parallel Algorithm for 3D Borehole Acoustic Field Simulation
Published 2025-04-01“…Using the simulation of ultrasonic guided waves in a cased well as an example, the algorithm efficiently divides the model, allocates resources, and coordinates computations to leverage the computational power of multiple GPUs. …”
Get full text
Article -
713
Numerical Recognition Algorithm for Power Equipment Monitoring Based on Light-Resnet Convolutional Neural Network
Published 2024-08-01“…This approach, leveraging the allocation of computational resources for task distribution, introduces a Light-Resnet-based numerical recognition algorithm, which enhances network training through the optimization of the D-Add loss function, enabling remote reading of electrical equipment monitoring data. …”
Get full text
Article -
714
-
715
Multi-Link Fragmentation-Aware Deep Reinforcement Learning RSA Algorithm in Elastic Optical Network
Published 2025-06-01“…Deep reinforcement learning has been extensively applied for resource allocation in elastic optical networks. However, many studies focus on link-level state analysis and rarely discuss the influence between links, which may affect the performance of allocation algorithms. …”
Get full text
Article -
716
Dynamic optimal scheduling of airport special vehicles in complex operating environment
Published 2025-06-01“…This study focuses on the refueling vehicle as a case study and develops a dual-objective mixed integer programming model aimed at minimizing both the number of vehicles required and the total time spent on waiting, driving, and resource supplementation for special vehicles. An iterative algorithm, integrating the rolling time domain approach with the multi-chromosome band elite strategy from the non-dominated sorting genetic algorithm (NSGA-Ⅱ), is designed to solve the model. …”
Get full text
Article -
717
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01“…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
Get full text
Article -
718
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01“…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
Get full text
Article -
719
A Stackelberg game based content caching algorithm in energy-harvesting small cell networks
Published 2019-01-01“…To improve the users' satisfaction of download files, a caching based resource allocation algorithm in energy-harvesting small cell networks was proposed, which was established as a Stackelberg game that jointly optimized user accessing and small cells' content updating. …”
Get full text
Article -
720
Enhancing 5G Vehicular Edge Computing Efficiency with the Hungarian Algorithm for Optimal Task Offloading
Published 2024-10-01“…HATO leverages 5G’s low-latency, high-bandwidth communication to efficiently allocate tasks across edge servers and nearby vehicles, utilizing the Hungarian algorithm for optimal task assignment. …”
Get full text
Article