Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
Showing 621 - 640 results of 1,377 for search '(( (resource OR resources) allocation algorithm ) OR ( sources allocation algorithm ))', query time: 0.22s Refine Results
  1. 621

    Dynamic Optimization of Tunnel Construction Scheduling in a Reverse Construction Scenario by Jianying Wei, Yuming Liu, Xiaochun Lu, Rong Zhao, Gan Wang

    Published 2025-02-01
    “…The Mixed-Integer Programming (MIP) approach is used to build the mathematical model, solved with both exact algorithms and Genetic Algorithms (GA), and implemented in Python 3.12.7. …”
    Get full text
    Article
  2. 622
  3. 623

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    “…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
    Get full text
    Article
  4. 624

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    “…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
    Get full text
    Article
  5. 625

    Stochastic Explicit Calibration Algorithm for Survival Models by Jeongho Park, Sangwook Kang, Gwangsu Kim

    Published 2025-01-01
    “…In addition, we highlight how improved calibration can improve downstream tasks, including optimizing resource allocation and improving patient care decisions. …”
    Get full text
    Article
  6. 626

    DIDADTIC TOOLS FOR THE STUDENTS’ ALGORITHMIC THINKING DEVELOPMENT by T. P. Pushkaryeva, T. A. Stepanova, V. V. Kalitina

    Published 2017-12-01
    “…Stages to mastering a new discipline are allocated. It is proved that for development of AT skills when training in programming it is necessary to use kinesthetic tools at the stage of mental algorithmic maps formation; algorithmic animation and algorithmic mental maps at the stage of algorithmic model and conceptual images formation. …”
    Get full text
    Article
  7. 627

    IMSBA: A Novel Integrated Sensing and Communication Beam Allocation Based on Multi-Agent Reinforcement Learning for mmWave Internet of Vehicles by Jinxiang Lai, Deqing Wang, Yifeng Zhao

    Published 2025-05-01
    “…To address these challenges, this paper proposes an integrated sensing and communication (ISAC) beam allocation algorithm, termed IMSBA, which jointly optimizes beam direction, transmission power, and spectrum resource allocation to effectively mitigate the interference between I2V and V2V while maximizing the overall network performance. …”
    Get full text
    Article
  8. 628

    Optimizing grid-dependent and islanded network operations through synergic active-reactive power integration by Zohaib Hussain Leghari, Dalila Mat Said, Mazhar Baloch, Pervez Hameed Shaikh, Hafiz Mudassir Munir, Radomir Gono, Tomas Novak, Petr Moldrik

    Published 2024-12-01
    “…The first stage proposes an improved Jaya algorithm (IJaya) to optimize DG and SCB allocation during grid-connected operation, aiming to reduce power loss and improve voltage profiles. …”
    Get full text
    Article
  9. 629

    Coevolutionary Algorithm with Bayes Theorem for Constrained Multiobjective Optimization by Shaoyu Zhao, Heming Jia, Yongchao Li, Qian Shi

    Published 2025-04-01
    “…By utilizing past prior knowledge to estimate the probability of function value changes, offspring allocation is dynamically adjusted, optimizing resource utilization. …”
    Get full text
    Article
  10. 630
  11. 631

    Spatiotemporal Fusion Algorithm Based on Multikernal Adaptive Network by Qiuhui Wang, Qiong Ran, Ke Zheng, Jiaxin Li

    Published 2025-01-01
    “…Furthermore, to enhance the geometric consistency of DVPM during the process of cross-scale feature fusion of geophysical features, we design the Multi-Dimensional Perceptual Attention Module (MDPA), which integrates channel and spatial domain information enhancement techniques for precise feature identification and optimized pixel-level resource allocation. To comprehensively evaluate the performance advantages of MKAN, we conducted thorough experimental assessments on three datasets and benchmarked it against five spatiotemporal fusion algorithms. …”
    Get full text
    Article
  12. 632

    Optimizing performance of WPCN based on whale optimization algorithm by Lina Yuan, Huajun Chen, Tinghong Chang, Ging Gong

    Published 2025-05-01
    “…Abstract This paper investigates the optimization issues of wireless powered communication (WPC) networks and proposes a technique that is grounded in the whale optimization algorithm (WOA) to address key optimization problems such as node deployment, energy allocation, power control, and multi-user access within the network. …”
    Get full text
    Article
  13. 633

    Joint Optimization Strategy of Task Migration and Power Allocation Based on Soft Actor-Critic in Unmanned Aerial Vehicle-Assisted Internet of Vehicles Environment by Jingpan Bai, Yifan Zhao, Bozhong Yang, Houling Ji, Botao Liu, Yunhao Chen

    Published 2024-11-01
    “…First, communication models, computational resource allocation models, and computation models are established sequentially based on the computational resource and dynamic coordinate of each node. …”
    Get full text
    Article
  14. 634

    5G network slicing algorithm based on prediction by Jiageng ZHANG, Min ZHU, Feng DU, Qi WANG, Jun LIU, Zhihai SUO, Li WANG

    Published 2021-09-01
    “…5G on line scenario needs short build time of network slice, it can use prediction algorithm to isolate network resource in advance to reduce the construction time of network slice.A 5G network slicing algorithm based on prediction was proposed, which used fourth square as cost function to predict the network resource requests with accepted accurate and lower complexity of algorithm.And then based on the prediction result, virtual nodes and links resource were allocated, and container was pulled up when network slice request arrives to network, the dynamic creation of network slices was completed.The simulation results show that the proposed algorithm can get 90% accurate of prediction, and reduce 50% construction time of network slice, and improve the network utilization ration,when new network slice reusing the original network slice.…”
    Get full text
    Article
  15. 635
  16. 636

    Overhaul Scheduling Approach for Metro Vehicles Based on Genetic Algorithms by WANG Bingjing, LI Bingxin

    Published 2023-02-01
    “…In this scheduling approach, an evaluation function is applied to transform the train overhaul scheduling into the tasks to optimize the resource allocation for the overhaul process, and the resource allocation to the overhaul process is optimized leveraging the inherent parallelism and global optimization ability of the genetic algorithm, and the optimal chromosome is deemed as the final result of the overhaul scheduling. …”
    Get full text
    Article
  17. 637

    A Development Model for Identifying the Uncertainty Sources and Their Impacts on Bridge Construction Projects by Kayvan Mohammadi Atashgah, Rouzbeh Ghousi, Armin Monir Abbasi, Abbasali Tayefi Nasrabadi

    Published 2023-03-01
    “…Likewise, a modified algorithm is proposed for checking the consistency of the spherical fuzzy matrices. …”
    Get full text
    Article
  18. 638

    Computation task offloading algorithm and system level simulation for vehicles by Qicheng ZENG, Yuxuan SUN, Sheng ZHOU

    Published 2019-09-01
    “…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
    Get full text
    Article
  19. 639
  20. 640

    (IoT) Network intrusion detection system using optimization algorithms by Luo Shan

    Published 2025-07-01
    “…In multi-class attack identification scenarios, the framework mitigates feature confusion between rare attacks (e.g., user-to-root attacks) and normal traffic through adaptive feature weight allocation. This study further validates the potential of swarm intelligence algorithms in the field of IoT security, offering a novel methodological foundation for efficient threat detection in resource-constrained environments.…”
    Get full text
    Article