-
361
Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments
Published 2025-06-01“…First, this paper proposes a new multi-cloud approach to preserve privacy, which includes two main components, named the Transaction Hewer and Allocator module and the Facile Hash Algorithm (FHA), in extracting the frequent itemset. …”
Get full text
Article -
362
Spectroscopic Ages for 4 Million Main-sequence Dwarf Stars from LAMOST DR10 Estimated with a Data-driven Approach
Published 2025-01-01“…While precise stellar ages for evolved stars have been derived from large ground- and space-based stellar surveys, reliable age determination for cool main-sequence dwarf stars remains a challenge. In this work, we set out to estimate the age of dwarf stars from the LAMOST spectra with a data-driven approach. …”
Get full text
Article -
363
-
364
Trust transitivity algorithm based on multiple influencing factors for grid environment
Published 2011-01-01“…A trust deployment scheme based on layered idea was given for grid environment,which reduced the man-agement costs of system.The fine-grain trust model was proposed which was based on interaction capability and honesty ability.It enhanced the rationality of the model.At the same time,4 influencing factors about trust transitivity were dis-cussed,such as cycle path,path length threshold,node honesty threshold and further trust information.On this condition,the trust transitivity algorithm for grid was studied which was based on depth-first traversal.Example and experimental results show that the model and algorithm are feasible and correct.…”
Get full text
Article -
365
A simple and efficient algorithm for genome‐wide homozygosity analysis in disease
Published 2009-09-01Get full text
Article -
366
Co-evolutionary algorithm with a region-based diversity enhancement strategy
Published 2025-03-01“…The proposed algorithm consists of two populations: a main population dedicated to exploring the constrained Pareto front and an auxiliary population tasked with exploring the unconstrained Pareto front. …”
Get full text
Article -
367
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm
Published 2023-02-01“…The main purpose of design smart door lock, using Jaro Winkler algorithm is to compare the registered password security with each entered password which may contain some wrong or swapped characters. …”
Get full text
Article -
368
Optimization of data allocation in hierarchical memory for blocked shortest paths algorithms
Published 2021-10-01“…This paper is devoted to the reduction of data transfer between the main memory and direct mapped cache for blocked shortest paths algorithms (BSPA), which represent data by a D[M×M] matrix of blocks. …”
Get full text
Article -
369
Features of modern algorithm of examination and treatment patients with endo-perio lesions
Published 2020-04-01Get full text
Article -
370
Cognitive Radio Transceivers: RF, Spectrum Sensing, and Learning Algorithms Review
Published 2014-01-01“…Sophisticated spectrum sensing algorithms that overcome main sensing challenges such as model uncertainty, hardware impairments, and wideband sensing are highlighted. …”
Get full text
Article -
371
Review of One-Stage Universal Object Detection Algorithms in Deep Learning
Published 2025-05-01“…The general object detection algorithms under deep learning are mainly divided into one-stage object detection and two-stage object detection. …”
Get full text
Article -
372
-
373
Visual System Inspired Algorithm for Enhanced Visibility in Coronary Angiograms (VIAEVCA)
Published 2025-01-01“…We propose a novel visibility enhancement algorithm, whose main body is inspired by a line completion mechanism of the visual system, i.e., lateral interactions. …”
Get full text
Article -
374
Research and implementation of mobile DPI association algorithm with big data technology
Published 2017-12-01Get full text
Article -
375
Research and implementation of mobile DPI association algorithm with big data technology
Published 2017-12-01Get full text
Article -
376
Application of the spectral bisection algorithm for the analysis of criminal communities in social networks
Published 2024-07-01“…The purpose of the study is to substantiate the use of one of the graph separation methods – the spectral bisection algorithm for the analysis of social networks, as well as to evaluate the possibilities of software implementation of this algorithm during the collection of evidence-based information in the investigation of crimes committed using information and telecommunications technologies.Method. …”
Get full text
Article -
377
ALGORITHMS FOR IDENTIFICATION OF CUES WITH AUTHORS’ TEXT INSERTIONS IN BELARUSIAN ELECTRONIC BOOKS
Published 2016-10-01“…The main stages of algorithms for characters’ gender identification in Belarusian electronic texts are described. …”
Get full text
Article -
378
A Novel Acceleration Estimation Algorithm Based on Least Square Method
Published 2018-01-01Get full text
Article -
379
Seismic Inversion Problem Using a Multioperator Whale Optimization Algorithm
Published 2022-01-01“…The whale optimization algorithm (WOA) is a metaheuristic algorithm based on swarm intelligence and it mimics the hunting behavior of whales. …”
Get full text
Article -
380
Wireless sensor indoor positioning based on an improved particle filter algorithm
Published 2020-02-01“…Positioning by wireless sensor network is one of its main functions and has been widely used in many fields. …”
Get full text
Article