-
3961
Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model
Published 2025-01-01“…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
Get full text
Article -
3962
Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model
Published 2025-01-01“…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
Get full text
Article -
3963
Selecting the Strategic Port of “the Belt and Road” Based on the Global Network
Published 2021-01-01“…Under “the Belt and Road” initiative, China promoted cooperation between domestic enterprises and international ports vigorously, which brought back fruitful results, while the rational selection of strategic pivots ports and the optimization of the layout of the port network are important guarantees to a further promotion to the economic development of “the Belt and Road” ports and give full play to the driving and radiation role of strategic pivots ports. …”
Get full text
Article -
3964
Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models
Published 2024-01-01“…This single-signal approach allows the algorithm to accurately classify data without being distracted by different types of signals, in addition to eliminating the curse of dimensionality. …”
Get full text
Article -
3965
Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy
Published 2025-01-01“…Unlike previous approaches, this system enables simultaneous charging and load powering and is specifically optimized for energy-harvesting WSN environments. Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
Get full text
Article -
3966
Linear adaptive filtering of random sequences on basis of deterministic approach
Published 2018-09-01“…The optimal current estimate is based on both measurement results and extrapolated values. …”
Get full text
Article -
3967
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.…”
Get full text
Article -
3968
Energy-Efficient Adaptive Routing and Context-Aware Lifetime Maximization in Wireless Sensor Networks
Published 2014-11-01“…We design and implement a Bezier-based multipath routing algorithm that allows a given source node to send samples of data to a given sink node in large scale sensor networks. …”
Get full text
Article -
3969
Hydrofoil Installation and Performance Optimisation for Ship Resistance Reduction in Trimaran Through Particle Swarm Optimisation Method
Published 2025-03-01“…The primary aim of this hydrofoil is to reduce the overall resistance while the ship is moving. This study focuses on minimising the ship’s total resistance. …”
Get full text
Article -
3970
CBID: A Scalable Method for Distributed Data Aggregation in WSNs
Published 2010-07-01“…Herein we present CBID, a novel algorithm that calculates near-optimal routes for MAs that incrementally fuse the data as they visit the Sensor Nodes (SNs) while also enabling fast updates on the designed itineraries upon changes of network topology. …”
Get full text
Article -
3971
Intelligent resource scheduling scheme for UAV swarm collaborative sensing
Published 2025-03-01“…Furthermore, a multi-agent reinforcement learning (MARL) algorithm with an attention mechanism was employed to solve the optimization problem, enabling agents to extract critical environmental features more effectively. …”
Get full text
Article -
3972
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
3973
Automated Detection of Tailing Impoundments in Multi-Sensor High-Resolution Satellite Images Through Advanced Deep Learning Architectures
Published 2025-07-01“…Accurate spatial mapping of Tailing Impoundments (TIs) is vital for environmental sustainability in mining ecosystems. While remote sensing enables large-scale monitoring, conventional methods relying on single-sensor data and traditional machine learning-based algorithm suffer from reduced accuracy in cluttered environments. …”
Get full text
Article -
3974
Variational Quantum Simulation: A Case Study for Understanding Warm Starts
Published 2025-01-01“…While our main focus is on this case study of variational quantum simulation, we end by discussing how our results work in other iterative settings.…”
Get full text
Article -
3975
A grid-based reliable multi-hop routing protocol for energy-efficient wireless sensor networks
Published 2018-03-01“…In order to minimize and balance the energy consumption, our proposed protocol, grid-based reliable multi-hop routing protocol, optimizes the cluster head election process by combining individual ability which consists of node’s residual energy and node’s location, and local cognition which can balance energy consumption among clusters via a consultative mechanism based on cluster head’s lifetime expectancy, while considering data forwarding delay and reliable transmission of data. …”
Get full text
Article -
3976
Real-time motion detection using dynamic mode decomposition
Published 2025-05-01“…Effectiveness is analyzed using receiver operating characteristic curves, while we use cross-validation to optimize the threshold parameter that identifies movement.…”
Get full text
Article -
3977
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
3978
Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone
Published 2013-04-01“…The results indicated that the accelerometer was significant to PA recognition, while gyroscope and orientation sensor were effective to recognize the change of body posture and detect falls, respectively. …”
Get full text
Article -
3979
A Gaussian process approach for contextual bandit-based battery replacement
Published 2025-01-01“…This research aims to assist electric vehicle providers in optimizing battery replacement schedules, with the objective of minimizing operating losses while meeting evening peak demand. …”
Get full text
Article -
3980
A Distribution Model for Shared Parking in Residential Zones that Considers the Utilization Rate and the Walking Distance
Published 2020-01-01“…The particle swarm optimization (PSO) algorithm is used to solve this model. …”
Get full text
Article