-
701
Numerical Recognition Algorithm for Power Equipment Monitoring Based on Light-Resnet Convolutional Neural Network
Published 2024-08-01“…This approach, leveraging the allocation of computational resources for task distribution, introduces a Light-Resnet-based numerical recognition algorithm, which enhances network training through the optimization of the D-Add loss function, enabling remote reading of electrical equipment monitoring data. …”
Get full text
Article -
702
Study and Implementation of Multi-GPU Parallel Algorithm for 3D Borehole Acoustic Field Simulation
Published 2025-04-01“…Using the simulation of ultrasonic guided waves in a cased well as an example, the algorithm efficiently divides the model, allocates resources, and coordinates computations to leverage the computational power of multiple GPUs. …”
Get full text
Article -
703
A Stackelberg game based content caching algorithm in energy-harvesting small cell networks
Published 2019-01-01“…To improve the users' satisfaction of download files, a caching based resource allocation algorithm in energy-harvesting small cell networks was proposed, which was established as a Stackelberg game that jointly optimized user accessing and small cells' content updating. …”
Get full text
Article -
704
Investigating Reddit Data on Type 2 Diabetes Management During the COVID-19 Pandemic Using Latent Dirichlet Allocation Topic Modeling and Valence Aware Dictionary for Sentiment Rea...
Published 2025-02-01“…This study demonstrates that social media data can be a qualitative data source for understanding patient perspectives.…”
Get full text
Article -
705
Dynamic optimal scheduling of airport special vehicles in complex operating environment
Published 2025-06-01“…This study focuses on the refueling vehicle as a case study and develops a dual-objective mixed integer programming model aimed at minimizing both the number of vehicles required and the total time spent on waiting, driving, and resource supplementation for special vehicles. An iterative algorithm, integrating the rolling time domain approach with the multi-chromosome band elite strategy from the non-dominated sorting genetic algorithm (NSGA-Ⅱ), is designed to solve the model. …”
Get full text
Article -
706
Quantum Approximate Optimization Algorithm for the Max-Cut Problem: JavaScript Programming Language Implementation
Published 2024-11-01“…The Max-Cut issue, which involves partitioning the vertices of a graph into two subsets such that the number of edges between the subsets is maximized, is a well-known NP-hard difficulty with numerous practical applications, including network design and resource allocation. The implementation of QAOA in JavaScript is a significant step towards integrating quantum computing with modern web technologies, thus broadening access to quantum algorithms among software developers. …”
Get full text
Article -
707
-
708
Optimizing protein-ligand docking through machine learning: algorithm selection with AutoDock Vina
Published 2025-07-01“…Abstract Context Understanding protein-ligand interactions is fundamental to drug design, where optimizing docking parameter selection can potentially enhance computational efficiency and resource allocation in virtual screening. While numerous algorithms exist for protein-ligand docking, achieving an optimal balance between accuracy and computational speed remains challenging. …”
Get full text
Article -
709
Enhancing Youbike Redistribution System: A Study on Station Recommendation Using a Genetic Algorithm
Published 2025-02-01“…This study proposes a novel approach to optimize YouBike allocation under resource constraints. We first used K-means clustering to group stations with similar rental profiles, reducing the number of models needed. …”
Get full text
Article -
710
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01“…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
Get full text
Article -
711
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01“…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
Get full text
Article -
712
Enhancing 5G Vehicular Edge Computing Efficiency with the Hungarian Algorithm for Optimal Task Offloading
Published 2024-10-01“…HATO leverages 5G’s low-latency, high-bandwidth communication to efficiently allocate tasks across edge servers and nearby vehicles, utilizing the Hungarian algorithm for optimal task assignment. …”
Get full text
Article -
713
A Two-Stage Bin Packing Algorithm for Minimizing Machines and Operators in Cyclic Production Systems
Published 2025-06-01“…The outcomes demonstrate the effectiveness of the proposed algorithm in optimizing resource utilization by reducing the number of machines and operators required. …”
Get full text
Article -
714
Dynamic multi-criteria scheduling algorithm for smart home tasks in fog-cloud IoT systems
Published 2024-12-01“…DMCS dynamically allocates tasks based on criteria such as computational complexity, urgency, and data size, ensuring that time-sensitive tasks are processed swiftly on fog nodes while resource-intensive computations are handled by cloud data centers. …”
Get full text
Article -
715
PERFORMANCE ANALYSIS OF TASK SCHEDULING USING HYBRID GENETIC MODIFIED WHALE OPTIMIZATION ALGORITHM IN CLOUD COMPUTING
Published 2024-08-01“…In this paper, the Hybrid Genetic Modified Whale optimization algorithm which is a combined Genetic and Modified Whale optimization algorithm to analyze the performance of the cloud computing system such as task completion time, execution cost, speedup, and efficiency with proper allocation and sharing of resources The performance of the proposed algorithm is compared with Genetic algorithm and Whale optimization algorithm. …”
Get full text
Article -
716
Optimization of artificial intelligence in localized big data real-time query processing task scheduling algorithm
Published 2024-10-01“…However, in the process of big data processing, the allocation of information resources is often unreasonable, leading to a decrease in efficiency. …”
Get full text
Article -
717
Programmable composite pipeline structure supporting scheduling of integrated network and computing
Published 2025-07-01“…The heterogeneous resource allocation strategy was solved based on resource pricing and cooperative game to realize the flexible scheduling of computing and network resources in the process of data forwarding. …”
Get full text
Article -
718
Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review
Published 2022-07-01“…The cognitive radio works in tandem with artificial intelligence and artificial intelligence methodologies to provide a flexible and intelligent allocation for continuous production cycles. The purpose is to provide a single source of information in the form of a survey research to enable academics better understand how artificial intelligence methodologies, such as fuzzy logics, genetic algorithms, and artificial neural networks, are used to various cognitive radio systems. …”
Get full text
Article -
719
Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA
Published 2023-01-01“…The study evaluates the proposed algorithm’s performance in terms of the make span, resource utilization, cost, response time, throughput, latency, execution time, speed, and bandwidth utilization. …”
Get full text
Article -
720