Showing 2,641 - 2,660 results of 8,683 for search 'optimal computing algorithms', query time: 0.31s Refine Results
  1. 2641

    Edge computing offloading policies and resource allocation considering system fairness in trusted environments by Shouyi YANG, Fukang LI, Ruimin REN

    Published 2024-03-01
    “…Considering the fairness problem in edge computing in an unreliable trust environment, the offloading decision and resource allocation problem of edge computing was studied for a multi-user multi-server scenario.Based on the proposed real-time trust model, system fairness was defined from the perspective of user satisfaction, a joint optimization model considering trust and fairness was established, and a trust-based task offloading and resource allocation (TOA) algorithm was proposed on this basis.The original NP-hard problem was converted into multiple deterministic optimization subproblems, the offloading strategy was determined based on the backtracking algorithm, and the optimization of resource allocation was accomplished by using the Lagrange multiplier method, the convex optimization toolbox, and the bifurcated iterative search method, so as to achieve system fairness and enhance user satisfaction.Simulation experimental results show that the proposed algorithm outperforms other benchmark algorithms.…”
    Get full text
    Article
  2. 2642
  3. 2643

    A Novel Latin Hypercube Algorithm via Translational Propagation by Guang Pan, Pengcheng Ye, Peng Wang

    Published 2014-01-01
    “…Metamodels have been widely used in engineering design to facilitate analysis and optimization of complex systems that involve computationally expensive simulation programs. …”
    Get full text
    Article
  4. 2644

    Research on secure transport strategy of mobile edge computing based on deep reinforcement learning by WANG Yijun, LI Jiaxin, YAN Zhiying, LYU Jingying, QIAN Zhihong

    Published 2025-04-01
    “…Secondly, while ensuring the unloading of L-UAV within a specified period, the multi-agent depth deterministic policy gradient (Attention-MADDPG) algorithm with the addition of attention mechanism was adopted to solve and optimize the problem with the aim of maximizing the safety unloading efficiency of the communication system. …”
    Get full text
    Article
  5. 2645
  6. 2646
  7. 2647

    Adaptive Top-K Algorithm for Medical Conversational Diagnostic Model by Yiqing Yang, Guoyin Zhang, Yanxia Wu, Zhixiang Zhao, Yan Fu

    Published 2024-08-01
    “…Nevertheless, such systems in acute medical situations need to process information quickly and accurately, but the complexity of differential diagnosis increases the system’s computational cost. To improve the efficiency and accuracy of telemedicine diagnostic systems, this study developed an optimized algorithm for the Top-K algorithm. …”
    Get full text
    Article
  8. 2648
  9. 2649

    Nature-Inspired Multi-Level Thresholding Integrated with CNN for Accurate COVID-19 and Lung Disease Classification in Chest X-Ray Images by Wafa Gtifa, Ayoub Mhaouch, Nasser Alsharif, Turke Althobaiti, Anis Sakly

    Published 2025-06-01
    “…<b>Methods</b>: The approach combines multi-level thresholding with the advanced metaheuristic optimization algorithms animal migration optimization (AMO), electromagnetism-like optimization (EMO), and the harmony search algorithm (HSA) to enhance image segmentation. …”
    Get full text
    Article
  10. 2650

    Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing by Mengdi Zhao, Huiyan Chen

    Published 2025-07-01
    “…Furthermore, simulation-based experiments show that for a 1 MB file and lattice dimension of <i>n</i> = 128, the computation times for core algorithms such as <b>TagGen</b>, <b>GenProof</b>, and <b>CheckProof</b> are approximately 20.76 s, 13.75 s, and 3.33 s, respectively. …”
    Get full text
    Article
  11. 2651

    Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function by Yuxin Han, Yang Liu, Yaping Sun, Kai Niu, Nan Ma, Shuguang Cui, Ping Zhang

    Published 2025-06-01
    “…To address scenarios where synonymous mappings are unknown, we develop an optimization framework that combines the EBA algorithm with simulated annealing. …”
    Get full text
    Article
  12. 2652

    A High-Performance and Lightweight Maritime Target Detection Algorithm by Shidan Sun, Zhiping Xu, Xiaochun Cao, Jiachun Zheng, Jiawen Yang, Ni Jin

    Published 2025-03-01
    “…Furthermore, the proposed algorithm runs three times faster with only half of the computation resources, and maintains nearly same accuracy in the maritime surface with low visibility. …”
    Get full text
    Article
  13. 2653

    Combining Parallel Stochastic Methods and Mixed Termination Rules in Optimization by Vasileios Charilogis, Ioannis G. Tsoulos, Anna Maria Gianni

    Published 2024-09-01
    “…Parallel optimization enables faster and more efficient problem-solving by reducing computational resource consumption and time. …”
    Get full text
    Article
  14. 2654

    An Effective Branch and Bound Algorithm for Minimax Linear Fractional Programming by Hong-Wei Jiao, Feng-Hui Wang, Yong-Qiang Chen

    Published 2014-01-01
    “…The proposed branch and bound algorithm is convergent to the global optimal solution of the problem (MLFP) through the successive refinement of the feasible region and solutions of a series of the LRP. …”
    Get full text
    Article
  15. 2655
  16. 2656

    Optimized Travel Itineraries: Combining Mandatory Visits and Personalized Activities by Parida Jewpanya, Pinit Nuangpirom, Siwasit Pitjamit, Warisa Nakkiew

    Published 2025-02-01
    “…However, due to constraints in designing customized tour routes such as travel time and budget, many still require assistance with vacation planning to optimize their experiences. Therefore, this paper proposes an algorithm for personalized tourism planning that considers tourists’ preferences. …”
    Get full text
    Article
  17. 2657

    An Effective Algorithm for Globally Solving Sum of Linear Ratios Problems by Hongwei Jiao, Lei Cai, Zhisong Hou, Chunyang Bai

    Published 2017-01-01
    “…Thirdly, in order to improve the computational efficiency of the algorithm, an out space pruning technique is derived, which offers a possibility of pruning a large part of the out space region which does not contain the optimal solution of the equivalent problem. …”
    Get full text
    Article
  18. 2658

    Perception of premium services based on the evolution of hyper-service network in mobile edge computing by Xiaojun Zhang, Zhizhong Liu, Dianhui Chu, Meiyue Zhao

    Published 2025-05-01
    “…First, based on the hypergraph theory, we construct a hyper-service network with the optimal connection method. Then, we develop the evolution mechanism of the hyper-service network and optimize the hyper-service network with the hyperdegree premium value evolution algorithm, thus to conduct the evolution of the service networks. …”
    Get full text
    Article
  19. 2659
  20. 2660

    Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions by Dandu Varalakshmi, N Shirisha, K Suresh, Saidhbi Shaik, V Venkatesh, C F Theresa Cenate

    Published 2025-01-01
    “…The main innovation consists of a light and energy-saving blockchain construct that minimizes computing overhead and is sustained by an AI-based anomaly detection algorithm to achieve real-time threat mitigation using built-in smart contracts. …”
    Get full text
    Article