-
2641
Edge computing offloading policies and resource allocation considering system fairness in trusted environments
Published 2024-03-01“…Considering the fairness problem in edge computing in an unreliable trust environment, the offloading decision and resource allocation problem of edge computing was studied for a multi-user multi-server scenario.Based on the proposed real-time trust model, system fairness was defined from the perspective of user satisfaction, a joint optimization model considering trust and fairness was established, and a trust-based task offloading and resource allocation (TOA) algorithm was proposed on this basis.The original NP-hard problem was converted into multiple deterministic optimization subproblems, the offloading strategy was determined based on the backtracking algorithm, and the optimization of resource allocation was accomplished by using the Lagrange multiplier method, the convex optimization toolbox, and the bifurcated iterative search method, so as to achieve system fairness and enhance user satisfaction.Simulation experimental results show that the proposed algorithm outperforms other benchmark algorithms.…”
Get full text
Article -
2642
A traffic pattern detection algorithm based on multimodal sensing
Published 2018-10-01Get full text
Article -
2643
A Novel Latin Hypercube Algorithm via Translational Propagation
Published 2014-01-01“…Metamodels have been widely used in engineering design to facilitate analysis and optimization of complex systems that involve computationally expensive simulation programs. …”
Get full text
Article -
2644
Research on secure transport strategy of mobile edge computing based on deep reinforcement learning
Published 2025-04-01“…Secondly, while ensuring the unloading of L-UAV within a specified period, the multi-agent depth deterministic policy gradient (Attention-MADDPG) algorithm with the addition of attention mechanism was adopted to solve and optimize the problem with the aim of maximizing the safety unloading efficiency of the communication system. …”
Get full text
Article -
2645
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
Published 2022-04-01Get full text
Article -
2646
A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment
Published 2022-09-01Get full text
Article -
2647
Adaptive Top-K Algorithm for Medical Conversational Diagnostic Model
Published 2024-08-01“…Nevertheless, such systems in acute medical situations need to process information quickly and accurately, but the complexity of differential diagnosis increases the system’s computational cost. To improve the efficiency and accuracy of telemedicine diagnostic systems, this study developed an optimized algorithm for the Top-K algorithm. …”
Get full text
Article -
2648
A Bicriteria Model to Determine Pareto Optimal Pulse Vaccination Strategies
Published 2024-01-01Get full text
Article -
2649
Nature-Inspired Multi-Level Thresholding Integrated with CNN for Accurate COVID-19 and Lung Disease Classification in Chest X-Ray Images
Published 2025-06-01“…<b>Methods</b>: The approach combines multi-level thresholding with the advanced metaheuristic optimization algorithms animal migration optimization (AMO), electromagnetism-like optimization (EMO), and the harmony search algorithm (HSA) to enhance image segmentation. …”
Get full text
Article -
2650
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
Published 2025-07-01“…Furthermore, simulation-based experiments show that for a 1 MB file and lattice dimension of <i>n</i> = 128, the computation times for core algorithms such as <b>TagGen</b>, <b>GenProof</b>, and <b>CheckProof</b> are approximately 20.76 s, 13.75 s, and 3.33 s, respectively. …”
Get full text
Article -
2651
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01“…To address scenarios where synonymous mappings are unknown, we develop an optimization framework that combines the EBA algorithm with simulated annealing. …”
Get full text
Article -
2652
A High-Performance and Lightweight Maritime Target Detection Algorithm
Published 2025-03-01“…Furthermore, the proposed algorithm runs three times faster with only half of the computation resources, and maintains nearly same accuracy in the maritime surface with low visibility. …”
Get full text
Article -
2653
Combining Parallel Stochastic Methods and Mixed Termination Rules in Optimization
Published 2024-09-01“…Parallel optimization enables faster and more efficient problem-solving by reducing computational resource consumption and time. …”
Get full text
Article -
2654
An Effective Branch and Bound Algorithm for Minimax Linear Fractional Programming
Published 2014-01-01“…The proposed branch and bound algorithm is convergent to the global optimal solution of the problem (MLFP) through the successive refinement of the feasible region and solutions of a series of the LRP. …”
Get full text
Article -
2655
Optimizing Investment Portfolios with Bacterial Foraging and Robust Risk Management
Published 2025-02-01Get full text
Article -
2656
Optimized Travel Itineraries: Combining Mandatory Visits and Personalized Activities
Published 2025-02-01“…However, due to constraints in designing customized tour routes such as travel time and budget, many still require assistance with vacation planning to optimize their experiences. Therefore, this paper proposes an algorithm for personalized tourism planning that considers tourists’ preferences. …”
Get full text
Article -
2657
An Effective Algorithm for Globally Solving Sum of Linear Ratios Problems
Published 2017-01-01“…Thirdly, in order to improve the computational efficiency of the algorithm, an out space pruning technique is derived, which offers a possibility of pruning a large part of the out space region which does not contain the optimal solution of the equivalent problem. …”
Get full text
Article -
2658
Perception of premium services based on the evolution of hyper-service network in mobile edge computing
Published 2025-05-01“…First, based on the hypergraph theory, we construct a hyper-service network with the optimal connection method. Then, we develop the evolution mechanism of the hyper-service network and optimize the hyper-service network with the hyperdegree premium value evolution algorithm, thus to conduct the evolution of the service networks. …”
Get full text
Article -
2659
A memetic algorithm for high‐strength covering array generation
Published 2023-08-01Get full text
Article -
2660
Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions
Published 2025-01-01“…The main innovation consists of a light and energy-saving blockchain construct that minimizes computing overhead and is sustained by an AI-based anomaly detection algorithm to achieve real-time threat mitigation using built-in smart contracts. …”
Get full text
Article