Showing 1,041 - 1,060 results of 1,377 for search '((( resourcesss OR resources) allocation algorithm ) OR ( sources allocation algorithm ))', query time: 0.14s Refine Results
  1. 1041

    Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR by Mingjun Wang, Xuezhi Zhang, Feng Jing, Mei Gao

    Published 2025-04-01
    “…While BBR offers lower latency and higher throughput compared to traditional congestion control algorithms, it still faces challenges. These include the periodic triggering of the ProbeRTT phase, which impairs data transmission efficiency, data over-injection caused by the congestion window (CWND) value-setting policy, and the difficulty of coordinating resource allocation across multiple concurrent flows. …”
    Get full text
    Article
  2. 1042

    An Expert Fitness Diagnosis System Based on Elastic Cloud Computing by Kevin C. Tseng, Chia-Chuan Wu

    Published 2014-01-01
    “…In addition, an elastic algorithm based on Poisson distribution is presented to allocate computation resources dynamically. …”
    Get full text
    Article
  3. 1043

    Energy- and Spectral-Efficiency Trade-Off in OFDMA-Based Cooperative Cognitive Radio Networks by Xiaomao Chen, Shan Ouyang

    Published 2014-02-01
    “…Optimum transmit power of user is got by analysis; validity of theory is verified by simulation, and the proposed algorithm can adaptively allocate resource for CCRN.…”
    Get full text
    Article
  4. 1044

    Energy Harvesting for Throughput Enhancement of Cooperative Wireless Sensor Networks by Van-Dinh Nguyen, Chuyen T. Nguyen, Oh-Soon Shin

    Published 2016-07-01
    “…We then propose an iterative power allocation algorithm which converges to a locally optimal solution at a Karush-Kuhn-Tucker point. …”
    Get full text
    Article
  5. 1045

    Toward a conceptual model to improve the user experience of a sustainable and secure intelligent transport system by Abdullah Alsaleh

    Published 2025-05-01
    “…This study proposes a Vehicular Cloud-based Intelligent Transportation System (VCITS) model, integrating vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication through roadside units (RSUs) and cloudlets to provide real-time access to cloud resources. A novel search and management protocol, supported by a tailored algorithm, was developed to enhance resource allocation success rates for vehicles within a defined area of interest. …”
    Get full text
    Article
  6. 1046

    Smart grid stability prediction model using two-way attention based hybrid deep learning and MPSO by Umesh Kumar Lilhore, Surjeet Dalal, Magdalena Radulescu, Marinela Barbulescu

    Published 2025-01-01
    “…In smart grid management, precise stability prediction is a complicated task that adds to the effective allocation of resources with grid stability. Specifically, demand-side management is considered an essential element of the overall Smart Grids system. …”
    Get full text
    Article
  7. 1047

    The clinical performance of an office-based risk scoring system for fatal cardiovascular diseases in North-East of Iran. by Sadaf G Sepanlou, Reza Malekzadeh, Hossein Poustchi, Maryam Sharafkhah, Saeed Ghodsi, Fatemeh Malekzadeh, Arash Etemadi, Akram Pourshams, Paul D Pharoah, Christian C Abnet, Paul Brennan, Paolo Boffetta, Sanford M Dawsey, Farin Kamangar

    Published 2015-01-01
    “…Risk scoring systems for CVD are needed to prioritize allocation of limited resources. Most of these risk score algorithms have been based on a long array of risk factors including blood markers of lipids. …”
    Get full text
    Article
  8. 1048

    Genetics of kidney stones and the role of genetic testing in prevention: a guide for urologists by Francesco Pintus, Noemi Giordano, Daniela Francesca Giachino, Giorgia Mandrile

    Published 2025-07-01
    “…This paper reviews the updated evidences in KSD genetics and suggest a diagnostic algorithm aimed to increase the diagnostic rate of genetic stones, allowing a personalized treatment and, in turn, a higher disease-free survival for the patients and a more efficient allocation of resources, analyzing the cost-effectiveness of genetic testing in urolithiasis. …”
    Get full text
    Article
  9. 1049

    Prediction of dengue disease severity among pediatric Thai patients using early clinical laboratory indicators. by James A Potts, Robert V Gibbons, Alan L Rothman, Anon Srikiatkhachorn, Stephen J Thomas, Pra-On Supradish, Stephenie C Lemon, Daniel H Libraty, Sharone Green, Siripen Kalayanarooj

    Published 2010-08-01
    “…Earlier diagnosis of severe dengue illnesses would have a substantial impact on the allocation of health resources in endemic countries.…”
    Get full text
    Article
  10. 1050

    Energy-Efficient Aerial STAR-RIS-Aided Computing Offloading and Content Caching for Wireless Sensor Networks by Xiaoping Yang, Quanzeng Wang, Bin Yang, Xiaofang Cao

    Published 2025-01-01
    “…Given the non-convex nature of this problem, we decompose it into a content caching decision subproblem, a computing offloading decision subproblem, a hovering position subproblem, and a STAR-RIS resource allocation subproblem. We propose a deep reinforcement learning (DRL)–successive convex approximation (SCA) combined algorithm to iteratively achieve near-optimal solutions with low complexity. …”
    Get full text
    Article
  11. 1051
  12. 1052

    Presenting a multi-objective mathematical model with an integrated approach to scheduling and financial flow in production projects using NSGA-II by Sajad Janbaz, Seyed Mohammadreza Davoodi, Abdolmajid Abdolbaghi Ataabadi

    Published 2023-11-01
    “…The objective is to develop a multi-objective mathematical model that integrates scheduling and financial considerations to optimize resource allocation and minimize costs. The statistical population is in the form of a case study, and the required information and data were collected through interviews with managers of Kisson Construction Company.Findings: NSGA-II was used as an optimization algorithm to find efficient multi-objective solutions, and optimal results were presented to select civil and construction projects.Originality/Value: This research contributes to the field by proposing a novel multi-objective mathematical model that integrates scheduling and financial flow considerations in production projects. …”
    Get full text
    Article
  13. 1053

    Placental Growth Factor (PlGF) in Women with Suspected Pre-Eclampsia Prior to 35 Weeks' Gestation: A Budget Impact Analysis. by Suzy Duckworth, Lucy C Chappell, Paul T Seed, Lucy Mackillop, Andrew H Shennan, Rachael Hunter

    Published 2016-01-01
    “…<h4>Objective</h4>To model the resource implications of placental growth factor (PlGF) testing in women with suspected pre-eclampsia prior to 35 weeks' gestation as part of a management algorithm, compared with current practice.…”
    Get full text
    Article
  14. 1054

    Mechanism for green unicast routing protection in multi-granularity transport networks by Jun-ling SHI, Xing-wei WANG, Min HUANG

    Published 2014-10-01
    “…The mechanism for green unicast routing protection is designed with the constraint of quality of service (QoS),energy consumption and the survivability of single link or node failure considered.The path is calculated under the constraint of QoS based on K-shortest path algorithm.The resource allocation is done on multi-layer auxiliary graph considering the minimum times of wavelength conversion.Three protection levels are provided according to the service demands.The mechanism is implemented over EON (Europe optical network) topology by simulation.Performance evaluation has been done on the blocking probability,the protecting/working resource ratio and the load balance degree by comparing with certain existent mechanism.It has been shown that the proposed mechanism is both feasible and effective.…”
    Get full text
    Article
  15. 1055

    Mechanism for green unicast routing protection in multi-granularity transport networks by Jun-ling SHI, Xing-wei WANG, Min HUANG

    Published 2014-10-01
    “…The mechanism for green unicast routing protection is designed with the constraint of quality of service (QoS),energy consumption and the survivability of single link or node failure considered.The path is calculated under the constraint of QoS based on K-shortest path algorithm.The resource allocation is done on multi-layer auxiliary graph considering the minimum times of wavelength conversion.Three protection levels are provided according to the service demands.The mechanism is implemented over EON (Europe optical network) topology by simulation.Performance evaluation has been done on the blocking probability,the protecting/working resource ratio and the load balance degree by comparing with certain existent mechanism.It has been shown that the proposed mechanism is both feasible and effective.…”
    Get full text
    Article
  16. 1056

    NOMA Performance Improvement with Downlink Sectorization by Hurianti Vidyaningtyas, . Iskandar, . Hendrawan, Aloysius A. Pramudita

    Published 2025-02-01
    “…The primary objective is to improve system performance by implementing a downlink sectorization strategy, which groups users into distinct sectors to manage interference and optimize resource allocation. A Sequential Power Allocation (SePA) algorithm was introduced to enhance power distribution within sectors, aiming to maximize both user capacity and overall sum rate. …”
    Get full text
    Article
  17. 1057

    GES: A New Building Damage Data Augmentation and Detection Method Based on Extremely Imbalanced Data and Unique Spatial Distribution of Satellite Images by Xiaopeng Sha, Zhoupeng Guo, Xinqi Sang, Shuyu Wang, Yuliang Zhao

    Published 2024-01-01
    “…The outstanding experimental results demonstrate the effectiveness of the GES algorithm, which is crucial for the accuracy and reliability of postdisaster assessments, thereby promoting more efficient and effective disaster response and resource allocation.…”
    Get full text
    Article
  18. 1058

    Federated Synergy: Hierarchical Multi-Agent Learning for Sustainable Edge Computing in IIoT by S. Benila, K. Devi

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) presents significant challenges in task offloading, resource allocation, and energy efficiency, necessitating intelligent, scalable, and adaptive solutions. …”
    Get full text
    Article
  19. 1059

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  20. 1060

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article