Search alternatives:
many » may (Expand Search)
Showing 521 - 540 results of 9,662 for search '(many OR main) algorithm', query time: 0.18s Refine Results
  1. 521

    Analysis of Brand Visual Design Based on Collaborative Filtering Algorithm by Gao Chaomeng, Wang Yonggang

    Published 2022-01-01
    “…Finally, the collaborative filtering algorithm is optimized to improve the consumer similarity based on the original algorithm. …”
    Get full text
    Article
  2. 522
  3. 523

    Translation Mechanism of Neural Machine Algorithm for Online English Resources by Yanping Ye

    Published 2021-01-01
    “…Specifically, this article uses the word alignment structure of statistical machine translation as the external vocabulary alignment information and introduces it into the decoding step of neural machine translation. The model is mainly based on neural machine translation, and the statistical machine translation vocabulary alignment structure is integrated on the basis of neural networks and continuous expression of words. …”
    Get full text
    Article
  4. 524

    Posture detection of athletes in sports based on posture solving algorithms by Huan Zhang

    Published 2024-12-01
    “…However, the current attitude solving algorithm has the limitation of low precision and low efficiency. …”
    Get full text
    Article
  5. 525

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  6. 526

    Self-Supervised Social Recommendation Algorithm Fusing Residual Networks by WANG Yujie, YANG Zhe

    Published 2024-12-01
    “…However, the existing algorithms mainly utilize the static social graph structure, which is unable to mine the potential linking relationship between users, and at the same time do not solve the noise problem in the user-item interaction behavior. …”
    Get full text
    Article
  7. 527
  8. 528

    Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher by Minh Thang Vu, Van Nghi Nguyen, Quoc Dat Le, Quang Trung Do

    Published 2024-10-01
    “…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
    Get full text
    Article
  9. 529

    Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher by Minh Thang Vu, Van Nghi Nguyen, Quoc Dat Le, Quang Trung Do

    Published 2024-10-01
    “…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
    Get full text
    Article
  10. 530

    Enjeux définitionnels et scientifiques de la littératie algorithmique : entre mécanologie et rétro-ingénierie documentaire by Olivier LE DEUFF, Rayya ROUMANOS

    Published 2022-07-01
    “…We then analyse the possible bridges that can be built with the many fields of social sciences that study algorithms and their effects. …”
    Get full text
    Article
  11. 531

    A Novel Scheme for Improving Accuracy of KNN Classification Algorithm Based on the New Weighting Technique and Stepwise Feature Selection by Saeid Sheikhi, Mohammad Taghi Kheirabadi, Amin Bazzazi

    Published 2020-12-01
    “…Though the KNN algorithm is highly effective in many cases, it has some essential deficiencies, which affects the classification accuracy of the algorithm. …”
    Get full text
    Article
  12. 532

    Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments by D. Dhinakaran, S. Gopalakrishnan, D. Selvaraj, M.S. Girija, G. Prabaharan

    Published 2025-06-01
    “…First, this paper proposes a new multi-cloud approach to preserve privacy, which includes two main components, named the Transaction Hewer and Allocator module and the Facile Hash Algorithm (FHA), in extracting the frequent itemset. …”
    Get full text
    Article
  13. 533

    Spectroscopic Ages for 4 Million Main-sequence Dwarf Stars from LAMOST DR10 Estimated with a Data-driven Approach by Jia-Hui Wang, Maosheng Xiang, Meng Zhang, Ji-Wei Xie, Jian Ge, Jinghua Zhang, Lanya Mou, Ji-Feng Liu

    Published 2025-01-01
    “…While precise stellar ages for evolved stars have been derived from large ground- and space-based stellar surveys, reliable age determination for cool main-sequence dwarf stars remains a challenge. In this work, we set out to estimate the age of dwarf stars from the LAMOST spectra with a data-driven approach. …”
    Get full text
    Article
  14. 534

    An Improved Global and Local Fusion Path-Planning Algorithm for Mobile Robots by Yongliang Shi, Shucheng Huang, Mingxing Li

    Published 2024-12-01
    “…However, existing state-of-the-art methods suffer from issues such as excessive path redundancy, too many turning points, and poor environmental adaptability. …”
    Get full text
    Article
  15. 535

    Wireless sensor indoor positioning based on an improved particle filter algorithm by Pan Feng, Danyang Qin, Guangchao Xu, Ruolin Guo, Min Zhao

    Published 2020-02-01
    “…Positioning by wireless sensor network is one of its main functions and has been widely used in many fields. …”
    Get full text
    Article
  16. 536

    Detecting DDoS attack based on compensation non-parameter CUSUM algorithm by YAN Fen1~3, CHEN Yi-qun3, HUANG Hao1, YIN Xin-chun3

    Published 2008-01-01
    “…An effective DDoS attack detection method on target-end network was proposed.The main goal was to detect attack in early stages with few expenditure,and record the suspicious packets in the same time.For DDoS attacks which based on TCP,many unacknowledged segments will be observed in victim end.In every time period ? …”
    Get full text
    Article
  17. 537
  18. 538

    Analysing Threshold Value in Fire Detection Algorithm Using MODIS Data by Bowo E. Cahyono, Peter Fearns, Brendon McAtee

    Published 2012-08-01
    “…This paper describe the principle of fire investigation applied on MODIS data. The main used algorithm in this research is contextual algorithm which has been developed by NASA scientist team. …”
    Get full text
    Article
  19. 539

    A Decomposition-Based Multiobjective Evolutionary Algorithm with Adaptive Weight Adjustment by Cai Dai, Xiujuan Lei

    Published 2018-01-01
    “…Recently, decomposition-based multiobjective evolutionary algorithms have good performances in the field of multiobjective optimization problems (MOPs) and have been paid attention by many scholars. …”
    Get full text
    Article
  20. 540

    Developing an efficient algorithm for robust school bus routing with heterogeneous fleet by Mohamad Ali Movafaghpour

    Published 2023-09-01
    “…Purpose: In many real-world optimization problems, we are facing uncertainties in parameters describing the problem. …”
    Get full text
    Article