-
521
Analysis of Brand Visual Design Based on Collaborative Filtering Algorithm
Published 2022-01-01“…Finally, the collaborative filtering algorithm is optimized to improve the consumer similarity based on the original algorithm. …”
Get full text
Article -
522
Bioresource collections: algorithms for development and functioning; basic and applied significance
Published 2023-12-01Get full text
Article -
523
Translation Mechanism of Neural Machine Algorithm for Online English Resources
Published 2021-01-01“…Specifically, this article uses the word alignment structure of statistical machine translation as the external vocabulary alignment information and introduces it into the decoding step of neural machine translation. The model is mainly based on neural machine translation, and the statistical machine translation vocabulary alignment structure is integrated on the basis of neural networks and continuous expression of words. …”
Get full text
Article -
524
Posture detection of athletes in sports based on posture solving algorithms
Published 2024-12-01“…However, the current attitude solving algorithm has the limitation of low precision and low efficiency. …”
Get full text
Article -
525
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
526
Self-Supervised Social Recommendation Algorithm Fusing Residual Networks
Published 2024-12-01“…However, the existing algorithms mainly utilize the static social graph structure, which is unable to mine the potential linking relationship between users, and at the same time do not solve the noise problem in the user-item interaction behavior. …”
Get full text
Article -
527
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01Get full text
Article -
528
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Published 2024-10-01“…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
Get full text
Article -
529
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Published 2024-10-01“…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
Get full text
Article -
530
Enjeux définitionnels et scientifiques de la littératie algorithmique : entre mécanologie et rétro-ingénierie documentaire
Published 2022-07-01“…We then analyse the possible bridges that can be built with the many fields of social sciences that study algorithms and their effects. …”
Get full text
Article -
531
A Novel Scheme for Improving Accuracy of KNN Classification Algorithm Based on the New Weighting Technique and Stepwise Feature Selection
Published 2020-12-01“…Though the KNN algorithm is highly effective in many cases, it has some essential deficiencies, which affects the classification accuracy of the algorithm. …”
Get full text
Article -
532
Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments
Published 2025-06-01“…First, this paper proposes a new multi-cloud approach to preserve privacy, which includes two main components, named the Transaction Hewer and Allocator module and the Facile Hash Algorithm (FHA), in extracting the frequent itemset. …”
Get full text
Article -
533
Spectroscopic Ages for 4 Million Main-sequence Dwarf Stars from LAMOST DR10 Estimated with a Data-driven Approach
Published 2025-01-01“…While precise stellar ages for evolved stars have been derived from large ground- and space-based stellar surveys, reliable age determination for cool main-sequence dwarf stars remains a challenge. In this work, we set out to estimate the age of dwarf stars from the LAMOST spectra with a data-driven approach. …”
Get full text
Article -
534
An Improved Global and Local Fusion Path-Planning Algorithm for Mobile Robots
Published 2024-12-01“…However, existing state-of-the-art methods suffer from issues such as excessive path redundancy, too many turning points, and poor environmental adaptability. …”
Get full text
Article -
535
Wireless sensor indoor positioning based on an improved particle filter algorithm
Published 2020-02-01“…Positioning by wireless sensor network is one of its main functions and has been widely used in many fields. …”
Get full text
Article -
536
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01“…An effective DDoS attack detection method on target-end network was proposed.The main goal was to detect attack in early stages with few expenditure,and record the suspicious packets in the same time.For DDoS attacks which based on TCP,many unacknowledged segments will be observed in victim end.In every time period ? …”
Get full text
Article -
537
Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing
Published 2025-08-01Get full text
Article -
538
Analysing Threshold Value in Fire Detection Algorithm Using MODIS Data
Published 2012-08-01“…This paper describe the principle of fire investigation applied on MODIS data. The main used algorithm in this research is contextual algorithm which has been developed by NASA scientist team. …”
Get full text
Article -
539
A Decomposition-Based Multiobjective Evolutionary Algorithm with Adaptive Weight Adjustment
Published 2018-01-01“…Recently, decomposition-based multiobjective evolutionary algorithms have good performances in the field of multiobjective optimization problems (MOPs) and have been paid attention by many scholars. …”
Get full text
Article -
540
Developing an efficient algorithm for robust school bus routing with heterogeneous fleet
Published 2023-09-01“…Purpose: In many real-world optimization problems, we are facing uncertainties in parameters describing the problem. …”
Get full text
Article