-
4381
k-Means Clustering Algorithm and Its Simulation Based on Distributed Computing Platform
Published 2021-01-01“…After the parallel processing of the MapReduce, we use many nodes to calculate distance, which speeds up the efficiency of the algorithm. Finally, the clustering of data objects is parallelized. …”
Get full text
Article -
4382
NEURAL NETWORK ALGORITHM SAFE OVERFLIGHT AERIAL OBSTACLES AND PROHIBITED LAND AREAS
Published 2017-09-01“…The article presents the algorithm of safe flying around obstacles when making en route flight of manned and unmanned aircraft. …”
Get full text
Article -
4383
A fault detection and location algorithm for the LVDC interconnection network in rural area
Published 2024-12-01“…To solve this problem, this article proposes a fault detection and location algorithm without requiring extra sensors and DCCBs in lines. …”
Get full text
Article -
4384
Improved whale optimization algorithm and its application in heterogeneous wireless sensor networks
Published 2021-05-01“…Aiming at the problems of node redundancy and network cost increase in heterogeneous wireless sensor networks, this article proposes an improved whale optimization algorithm coverage optimization method. …”
Get full text
Article -
4385
The Construction of an Universal Linearized Control Flow Graph for Static Code Analysis of Algorithms
Published 2013-04-01“…That fact was demonstrated by the example code of the Peterson mutual execution algorithm for 2 threads.…”
Get full text
Article -
4386
Artificial intelligence in the service of entrepreneurial finance: knowledge structure and the foundational algorithmic paradigm
Published 2025-02-01“…Specifically, we present the foundational paradigm and a bespoke demonstration of the Monte Carlo randomized algorithm.…”
Get full text
Article -
4387
-
4388
Robust Hybrid Control Algorithm for Tuning the Altitude and Attitude of Unmanned Aerial Vehicle
Published 2020-01-01“…In this article, a new and novel robust hybrid control algorithm is designed for tuning the parameters of unmanned aerial vehicle (UAV). …”
Get full text
Article -
4389
Simulation of automatic intrusion detection in university networks by using neural network algorithms
Published 2025-09-01“…With the rapid development of computers and the Internet, university networks are facing more and more network intrusion threats, and it is necessary to develop an automatic detection method based on neural network algorithms. This article collects a large amount of network intrusion data from universities and obtains data on normal network traffic for comparison. …”
Get full text
Article -
4390
Simulation of Tennis Spinning Ball Flight Path Based on Fuzzy Reasoning Algorithm
Published 2022-01-01Get full text
Article -
4391
Critical Algorithmic Mediation: Rethinking Cultural Transmission and Education in the Age of Artificial Intelligence
Published 2025-07-01“…The article examines the historical role of media in cultural transmission, the epistemic effects of algorithmic infrastructures, and the emergence of algorithmic hegemony as a regime of symbolic power. …”
Get full text
Article -
4392
Evolution of Cleft Lip and Palate Surgery and the Pursuit for Consensus on Standardized Algorithms of Care
Published 2025-03-01“…Unlike many other surgical conditions, there is no gold-standard algorithm of care for CLP. Several international consortiums, including Eurocleft, Americleft, and Scandcleft, aimed to investigate the ideal cleft care protocol. …”
Get full text
Article -
4393
Research of neural network algorithms for recognizing railway infrastructure objects in video images
Published 2025-06-01“…The article describes the development of two neural network algorithms for recognizing objects of the railway infrastructure in video images. …”
Get full text
Article -
4394
Defining Algorithmic Ideology: Using Ideology Critique to Scrutinize Corporate Search Engines
Published 2014-02-01“…This article conceptualizes “algorithmic ideology” as a valuable tool to understand and critique corporate search engines in the context of wider socio-political developments. …”
Get full text
Article -
4395
Real-World Applications of Metaheuristic Algorithms: A Comprehensive Review of the State-of-the-Art
Published 2025-06-01“…The major goal is to evaluate forty-eight metaheuristic algorithms from 2020 to 2024 based on the results presented in their original research articles, emphasizing their effectiveness in tackling six prevalent real-world applications. …”
Get full text
Article -
4396
Energy and channel transmission management algorithm for resource harvesting body area networks
Published 2018-02-01“…Simulation results demonstrate the effectiveness of the proposed algorithm.…”
Get full text
Article -
4397
A multi-greedy spectrum auction algorithm for cognitive small cell networks
Published 2017-06-01“…Compared with the Vickrey–Clarke–Groves algorithm, simulation results show the higher utility and spectrum allocation efficiency of the proposed algorithm.…”
Get full text
Article -
4398
Multi scenario chaotic transient search optimization algorithm for global optimization technique
Published 2025-02-01“…In this article, a metaheuristic, physics-based algorithm called chaotic transient search optimization (CTSO) algorithm is developed to solve 23 benchmark functions, including uni- and multi-modal optimization functions. …”
Get full text
Article -
4399
A novel Smishing defense approach based on meta-heuristic optimization algorithms
Published 2025-05-01“…This paper introduces an approach for detecting SMS phishing based on machine learning algorithms. The suggested system incorporates feature extraction, oversampling, and selection and classification optimization algorithms. …”
Get full text
Article -
4400
An Intelligent Audio Encryption and Compression Algorithm Inspired by the Encoding of Various Biological Sequences
Published 2025-01-01“…Biological sequences retain huge amount of information which present new horizon over legacy encryption algorithms in terms of encoding capacity. This article introduces an intelligent audio encryption and compression framework, namely Audio-to-Peptide (A2P), that mimics the successive generation of biological sequences to successively encrypt and compress sequences of frames in raw WAV audio files. …”
Get full text
Article