Showing 5,241 - 5,260 results of 12,962 for search 'while algorithm', query time: 0.13s Refine Results
  1. 5241

    Multiuser computation offloading for edge-cloud collaboration using submodular optimization by Bing LIANG, Wen JI

    Published 2020-10-01
    “…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
    Get full text
    Article
  2. 5242

    Pattern mining and prediction techniques for user behavioral trajectories in e-commerce. by Xin Wang, Dong-Feng Liu

    Published 2025-01-01
    “…Second, it introduces a frequent sub-trajectory mining algorithm that emphasizes the order of user visits for trajectory analysis and prediction. …”
    Get full text
    Article
  3. 5243

    Lightweight YOLOv8s-Based Strawberry Plug Seedling Grading Detection and Localization via Channel Pruning by CHEN Junlin, ZHAO Peng, CAO Xianlin, NING Jifeng, YANG Shuqin

    Published 2024-11-01
    “…Furthermore, a two-stage seedling-hole matching algorithm was introduced based on the pruned YOLOv8s model. …”
    Get full text
    Article
  4. 5244

    A Review of Numerical Techniques for Frictional Contact Analysis by Govind Vashishtha, Sumika Chauhan, Riya Singh, Manpreet Singh, Ghanshyam G. Tejani

    Published 2025-01-01
    “…The choice of contact algorithm significantly impacts accuracy and efficiency; penalty methods, though computationally efficient, can lack accuracy at high friction coefficients; whereas, Lagrange multiplier methods, while more accurate, are computationally more demanding. …”
    Get full text
    Article
  5. 5245

    Feature fusion with attributed deepwalk for protein–protein interaction prediction by Mei-Yuan Cao, Suhaila Zainudin, Kauthar Mohd Daud

    Published 2025-04-01
    “…Abstract protein–protein interactions (PPIs) are crucial for understanding cellular processes and disease mechanisms. While experimental methods for detecting PPIs exist, computational approaches offer a more efficient alternative. …”
    Get full text
    Article
  6. 5246

    SHAPING THE STOCK PORTFOLIO BY THE INVESTMENT RATING METHOD by Svyatoslav N. Digo, Aleksandra M. Sokolova

    Published 2018-02-01
    “…For the last five years capitalization of joint stock companies in Russia nearly doubled while the major indicator of stock market  development, i. e. …”
    Get full text
    Article
  7. 5247

    PV<i>k</i>NN: A Publicly Verifiable and Privacy-Preserving Exact <i>k</i>NN Query Scheme for Cloud-Based Location Services by Jingyi Li, Yuqi Song, Chengliang Tian, Weizhong Tian

    Published 2025-06-01
    “…The <i>k</i>-nearest- neighbor (<i>k</i>NN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. …”
    Get full text
    Article
  8. 5248

    RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT by Guanwei Jia, Zhaoyu Shen, Hongye Sun, Jingbo Xin, Dongyu Wang

    Published 2025-01-01
    “…This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. …”
    Get full text
    Article
  9. 5249

    Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control by Jibran Saleem, Umar Raza, Mohammad Hammoudeh, William Holderbaum

    Published 2025-04-01
    “…This research presents the SmartIoT Hybrid Machine Learning (ML) Model, a novel integration of Attribute-Based Authentication and a lightweight machine learning algorithm designed to enhance security while minimising computational overhead. …”
    Get full text
    Article
  10. 5250

    DRACO: Decentralized Asynchronous Federated Learning Over Row-Stochastic Wireless Networks by Eunjeong Jeong, Marios Kountouris

    Published 2025-01-01
    “…Our approach leverages continuous communication, allowing edge devices to perform local training and exchange model updates along a continuous timeline, thereby eliminating the need for synchronized timing. Additionally, our algorithm decouples communication and computation schedules, enabling complete autonomy for all users while effectively addressing straggler issues. …”
    Get full text
    Article
  11. 5251

    Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks by Zeinab Sasan, Siavash Khorsandi

    Published 2025-07-01
    “…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
    Get full text
    Article
  12. 5252

    Optimizing the train timetable in a high-speed rail corridor: The implications on departure time, fare cost and seat preference of passengers. by Zhipeng Huang, Limin Yang, Jinlian Li, Tao Zhang, Zixian Qu, Yusen Miao

    Published 2025-01-01
    “…Using the Lanzhou-Xi'an high-speed railway corridor as a case study, we apply a genetic algorithm combined with a nested Frank-Wolfe method to solve the model. …”
    Get full text
    Article
  13. 5253

    Low-Power Portable System for Power Grid Foreign Object Detection Based on the Lightweight Model of Improved YOLOv7 by Yonghuan He, Rong Wu, Chao Dang

    Published 2025-01-01
    “…Foreign objects caught and entangled on power grid transmission lines, power towers and other equipment can pose potential threats to the power system. The detection algorithm for foreign objects in the power grid cannot achieve the optimal balance in terms of accuracy and efficiency. …”
    Get full text
    Article
  14. 5254

    External phantom-based validation of a deep-learning network trained for upscaling of digital low count PET data by Anja Braune, René Hosch, David Kersting, Juliane Müller, Frank Hofheinz, Ken Herrmann, Felix Nensa, Jörg Kotzerke, Robert Seifert

    Published 2025-04-01
    “…Conclusions Phantom-based validation of AI-based algorithms allows for a detailed assessment of the performance, limitations, and generalizability of deep-learning based algorithms for PET image enhancement. …”
    Get full text
    Article
  15. 5255

    Dual-coding Contrastive Learning Based on the ConvNeXt and ViT Models for Morphological Classification of Galaxies in COSMOS-Web by Shiwei Zhu, Guanwen Fang, Chichun Zhou, Jie Song, Zesen Lin, Yao Dai, Xu Kong

    Published 2025-01-01
    “…Using the GoogLeNet algorithm, we classify the morphology of the remaining 27% of galaxies. …”
    Get full text
    Article
  16. 5256

    Genotyping Identification of Maize Based on Three-Dimensional Structural Phenotyping and Gaussian Fuzzy Clustering by Bo Xu, Chunjiang Zhao, Guijun Yang, Yuan Zhang, Changbin Liu, Haikuan Feng, Xiaodong Yang, Hao Yang

    Published 2025-01-01
    “…By leveraging the 3D reconstruction algorithm SFM (Structure from Motion), we promptly obtained point clouds of the maize tassels. …”
    Get full text
    Article
  17. 5257
  18. 5258

    An Improved COLD Approach for Monitoring Construction Dynamics Using HLS and LULC Data: A Case Study in the New Capital of Egypt by M. Abdallah, M. Abdallah, M. Abdallah, E. Ali, E. Ali, X. Ding, X. Ding, S. Wu, S. Wu

    Published 2025-07-01
    “…The Continuous Monitoring of Land Disturbances (COLD) algorithm is a widely used method for detecting rapid ground changes using Harmonized Landsat and Sentinel (HLS) data. …”
    Get full text
    Article
  19. 5259

    Possibilities of using a FRAX® risk calculator for 10-year probability of fractures assessment in patients with rheumatoid arthritis by O. A. Nikitinskaya, N. V. Toroptsova, E. L. Nasonov

    Published 2019-07-01
    “…The FRAX® calculator can be used to assess a fracture risk without entering the femoral neck BMD data into the algorithm for RA patients aged 50 years and older. …”
    Get full text
    Article
  20. 5260

    Evaluation of Soil Moisture Retrievals from a Portable L-Band Microwave Radiometer by Runze Zhang, Abhi Nayak, Derek Houtz, Adam Watts, Elahe Soltanaghai, Mohamad Alipour

    Published 2024-12-01
    “…By comparing PoLRa-based soil moisture retrievals against the simultaneous moisture values obtained by a handheld capacitance probe, the unbiased root mean square error (ubRMSE) and the Pearson correlation coefficient (R) are mostly below 0.05 m<sup>3</sup>/m<sup>3</sup> and above 0.7 for various algorithms adopted here. While SMAP models and the DCA algorithm can derive soil moisture from PoLRa observations, no single algorithm consistently outperforms the others. …”
    Get full text
    Article