Showing 221 - 240 results of 746 for search '(stacking OR striking) algorithm', query time: 0.10s Refine Results
  1. 221

    Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies by P. I. Sharikov, A. V. Krasov, A. V. Mayorovv

    Published 2025-04-01
    “…The research used methods of analyzing information in information system logs, static analysis methods, programming for application development, and data processing algorithms.Result. An example of implementing the Elasticsearch stack for processing and storing logs is presented. …”
    Get full text
    Article
  2. 222

    Detecting Malicious URLs Using Classification Algorithms in Machine Learning and Deep Learning by Sira Astour, Ahmad Hasan

    Published 2025-07-01
    “…This study presents an improvement in the accuracy and speed of detecting malicious URLs through ensemble learning techniques, specifically Bagging (Bootstrap) and Stacking. Extensive experiments on a large, balanced dataset containing 491,530 URLs, equally distributed between benign and malicious, showed that ensemble learning models significantly outperform other algorithms. …”
    Get full text
    Article
  3. 223

    Hybrid Crow Search Algorithm–LSTM System for Enhanced Stock Price Forecasting by Chang-Long Jiang, Yi-Kuang Tsai, Zhen-En Shao, Shih-Hsiung Lee, Cheng-Che Hsueh, Ko-Wei Huang

    Published 2024-12-01
    “…This method utilizes a stacking ensemble of long short-term memory (LSTM) networks, with the crow search algorithm (CSA) optimizing the weights assigned to the predictions from multiple LSTM models. …”
    Get full text
    Article
  4. 224

    MAOA: A Swift and Effective Optimization Algorithm for Linear Antenna Array Design by Anoop Raghuvanshi, Abhinav Sharma, Abhishek Kumar Awasthi, Abhishek Sharma, Rahul Singhal, Kim Soon Chong, Sew Sun Tiang, Wei Hong Lim

    Published 2025-05-01
    “…This paper presents the modified arithmetic optimization algorithm (MAOA), a swift and effective optimization algorithm specifically designed for electromagnetic applications. …”
    Get full text
    Article
  5. 225

    A cyclic redundancy check aided encoding construction method for list sphere polar decoder by Wenbin Hu, Haiqiang Chen, Rui Wang, Qinhua Guo, Shuping Dang, Youming Sun, Xiangcheng Li

    Published 2025-08-01
    “…In contrast, the list sphere decoding (LSD) algorithm strikes a balance between performance and complexity. …”
    Get full text
    Article
  6. 226

    Improving Parameter Estimation of Fuel Cell Using Honey Badger Optimization Algorithm by Rolla Almodfer, Mohammed Mudhsh, Samah Alshathri, Laith Abualigah, Laith Abualigah, Mohamed Abd Elaziz, Mohamed Abd Elaziz, Mohamed Abd Elaziz, Khurram Shahzad, Mohamed Issa

    Published 2022-05-01
    “…A set of experimental series has been conducted utilizing three datasets entitled 250-W stack, BCS 500-W, and NedStack PS6 to justify the usage of the HBA to determine the PEMFC’s parameters. …”
    Get full text
    Article
  7. 227

    Evapotranspiration of banana using the SEBAL algorithm in an irrigated perimeter from the Northeastern Brazil by Tainara T. S. Silva, Hugo O. C. Guerra, Bernardo B. da Silva, Cris L. M. Santos, Jean P. Guimarães, Joelma S. dos Santos

    Published 2021-03-01
    “…Landsat-8 OLI/TIRS satellite images of May 22, 2016, August 10, 2016, and October 29, 2016 and data on temperature, relative humidity, wind speed and solar irradiance, obtained from an automatic weather station, installed close to the experimental area were used. The bands were stacked, and the stacked images were cut, then mathematical operations and evapotranspiration estimation were performed, whose actual daily banana values, estimated by the SEBAL algorithm, were 4.70; 5.00 and 6.50 mm, respectively, for May 22, August 10, and October 29, 2016. …”
    Get full text
    Article
  8. 228

    Sentiment Analysis Using LSTM Algorithm Regarding Grab Application Services in Indonesia by Akbar Rikzy Gunawan, Rifda Faticha Alfa Aziza

    Published 2025-03-01
    “…This study aims to analyze the sentiment of user reviews for the Grab Indonesia application using Long Short-Term Memory (LSTM) algorithms. Two variants of LSTM, namely Stacked LSTM and Bi-Directional LSTM, were compared to determine the most effective model in classifying user review sentiments. …”
    Get full text
    Article
  9. 229

    Self-adapted task allocation algorithm with complicated coalition in wireless sensor network by Wen-zhong GUO, Jin-shu SU, Cheng-yu CHEN, Guo-long CHEN

    Published 2014-03-01
    “…Considering the real-time requirement and some specific limitations (e.g.insufficient computing resource,energy constraint,etc) in task scheduling of wireless sensor networks,different priorities were assigned to tasks according to their deadline,and an adaptive task allocation algorithm with complicated coalition was designed through analyzing historical information.Moreover,a discrete particle swarm optimization algorithm was designed via employing binary matrix coding form.The proposed optimization algorithm generates coalitions in parallel and then performs subtask allocation algorithm based on load and energy balance.Finally,the experimental results show that the proposed algorithm strikes a good balance between local solution and global exploration,and achieves a satisfactory result within a short period of time.…”
    Get full text
    Article
  10. 230

    Self-adapted task allocation algorithm with complicated coalition in wireless sensor network by Wen-zhong GUO, Jin-shu SU, Cheng-yu CHEN, Guo-long CHEN

    Published 2014-03-01
    “…Considering the real-time requirement and some specific limitations (e.g.insufficient computing resource,energy constraint,etc) in task scheduling of wireless sensor networks,different priorities were assigned to tasks according to their deadline,and an adaptive task allocation algorithm with complicated coalition was designed through analyzing historical information.Moreover,a discrete particle swarm optimization algorithm was designed via employing binary matrix coding form.The proposed optimization algorithm generates coalitions in parallel and then performs subtask allocation algorithm based on load and energy balance.Finally,the experimental results show that the proposed algorithm strikes a good balance between local solution and global exploration,and achieves a satisfactory result within a short period of time.…”
    Get full text
    Article
  11. 231

    Exact Algorithms for Practical Instances of the Railcar Loading Problem at Marine Container Terminals by ManWo Ng, Dung-Ying Lin

    Published 2022-01-01
    “…This study contributes to the literature by presenting tailored exact solution algorithms for a recently proposed optimization model to optimize the loading of double-stack trains. …”
    Get full text
    Article
  12. 232

    Medical decision support systems for diagnosing diseases based on ensemble learning algorithms by Luma Jarallah

    Published 2024-12-01
    “…This paper proposes a stacked learning model derived from multiple ensembles learning algorithms, including Random Forest, Catboost and XGBoost. …”
    Get full text
    Article
  13. 233

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  14. 234

    Intrusion detection algorithm of wireless network based on network traffic anomaly analysis by Xiangqian Nie, Jiao Xing, Qimeng Li, Fan Xiao

    Published 2025-06-01
    “…To promptly identify and mitigate abnormal behaviors while ensuring normal operation and security, this paper proposes an algorithm for detecting compromised nodes in wireless networks based on network traffic anomaly analysis. …”
    Get full text
    Article
  15. 235

    Research on dimension measurement algorithm for parcel boxes in high-speed sorting system by Ning Dai, Jingchao Chen, Xudong Hu, Yanhong Yuan

    Published 2025-07-01
    “…In addition, it is difficult for existing parcel box detection algorithms to strike a balance between identification efficiency, identification accuracy and deployment cost. …”
    Get full text
    Article
  16. 236

    Energy management strategy for hybrid electric vehicle based on improved PPO algorithm by Chao MA, Tong SUN, Lei CAO, Kun YANG, Wenjing HU

    Published 2025-06-01
    “…In order to improve the economy of power-split hybrid electric vehicle (HEV),a longitudinal dynamics model of the entire HEV vehicle was established,and an energy management strategy (EMS) based on strategy entropy optimization with an improved proximal policy optimization (PPO) algorithm was proposed. The algorithmic framework was simplified by employing an experience pooling mechanism based on traditional PPO algorithm,and only one deep neural network was used for interactive training and updating to reduce the complexity of parameter synchronization in the policy network. …”
    Get full text
    Article
  17. 237

    Spatial Distribution of Poverty Clusters and Its Prediction Algorithms: A Visual Analytics Approach to Understanding the Disparities of Poverty Across Zones by Ngong'ho Bujiku Sende, Snehanshu Saha, Leon Fidele Ruganzu Uwimbabazi

    Published 2025-01-01
    “…The results reveal that the Ensemble Stacking method outperforms other predictive algorithms in accurately classifying poverty groups derived from K-Means clustering. …”
    Get full text
    Article
  18. 238

    Simulation Analysis of Temperature Field of Optical Fiber Composite Overhead Ground Wire by Lifeng ZHANG, Xiaohua LI, Wenbin ZHAO

    Published 2019-10-01
    “…Finally, an analysis is made on the temperature field distribution of OPGW under lightning strike and the high temperature hazard of lightning strike.…”
    Get full text
    Article
  19. 239

    Optimization Research on Magnetic Interference Parameter Identification and Compensation for AUV Platforms by Haodong Wen, Guohua Zhou, Kena Wu, Xinkai Hu, Liezheng Tang, Shuai Xia

    Published 2025-01-01
    “…To further improve training performance, a stacking ensemble learning (STACKING) model is introduced, with L-SHADE and BPNN as base learners and Convolutional Neural Network (CNN) as the meta-learner, integrating the advantages of both algorithms for optimization. …”
    Get full text
    Article
  20. 240

    Key Technology of Communication Equipment Fingerprint Recognition Based on Intelligent Feature Extraction Algorithm by Meizhen Gao, Yunquan Li, Yetong Gao

    Published 2022-01-01
    “…Aiming at the transient signal of communication equipment, an algorithm using the short-term periodicity of signal is presented. …”
    Get full text
    Article