-
221
Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies
Published 2025-04-01“…The research used methods of analyzing information in information system logs, static analysis methods, programming for application development, and data processing algorithms.Result. An example of implementing the Elasticsearch stack for processing and storing logs is presented. …”
Get full text
Article -
222
Detecting Malicious URLs Using Classification Algorithms in Machine Learning and Deep Learning
Published 2025-07-01“…This study presents an improvement in the accuracy and speed of detecting malicious URLs through ensemble learning techniques, specifically Bagging (Bootstrap) and Stacking. Extensive experiments on a large, balanced dataset containing 491,530 URLs, equally distributed between benign and malicious, showed that ensemble learning models significantly outperform other algorithms. …”
Get full text
Article -
223
Hybrid Crow Search Algorithm–LSTM System for Enhanced Stock Price Forecasting
Published 2024-12-01“…This method utilizes a stacking ensemble of long short-term memory (LSTM) networks, with the crow search algorithm (CSA) optimizing the weights assigned to the predictions from multiple LSTM models. …”
Get full text
Article -
224
MAOA: A Swift and Effective Optimization Algorithm for Linear Antenna Array Design
Published 2025-05-01“…This paper presents the modified arithmetic optimization algorithm (MAOA), a swift and effective optimization algorithm specifically designed for electromagnetic applications. …”
Get full text
Article -
225
A cyclic redundancy check aided encoding construction method for list sphere polar decoder
Published 2025-08-01“…In contrast, the list sphere decoding (LSD) algorithm strikes a balance between performance and complexity. …”
Get full text
Article -
226
Improving Parameter Estimation of Fuel Cell Using Honey Badger Optimization Algorithm
Published 2022-05-01“…A set of experimental series has been conducted utilizing three datasets entitled 250-W stack, BCS 500-W, and NedStack PS6 to justify the usage of the HBA to determine the PEMFC’s parameters. …”
Get full text
Article -
227
Evapotranspiration of banana using the SEBAL algorithm in an irrigated perimeter from the Northeastern Brazil
Published 2021-03-01“…Landsat-8 OLI/TIRS satellite images of May 22, 2016, August 10, 2016, and October 29, 2016 and data on temperature, relative humidity, wind speed and solar irradiance, obtained from an automatic weather station, installed close to the experimental area were used. The bands were stacked, and the stacked images were cut, then mathematical operations and evapotranspiration estimation were performed, whose actual daily banana values, estimated by the SEBAL algorithm, were 4.70; 5.00 and 6.50 mm, respectively, for May 22, August 10, and October 29, 2016. …”
Get full text
Article -
228
Sentiment Analysis Using LSTM Algorithm Regarding Grab Application Services in Indonesia
Published 2025-03-01“…This study aims to analyze the sentiment of user reviews for the Grab Indonesia application using Long Short-Term Memory (LSTM) algorithms. Two variants of LSTM, namely Stacked LSTM and Bi-Directional LSTM, were compared to determine the most effective model in classifying user review sentiments. …”
Get full text
Article -
229
Self-adapted task allocation algorithm with complicated coalition in wireless sensor network
Published 2014-03-01“…Considering the real-time requirement and some specific limitations (e.g.insufficient computing resource,energy constraint,etc) in task scheduling of wireless sensor networks,different priorities were assigned to tasks according to their deadline,and an adaptive task allocation algorithm with complicated coalition was designed through analyzing historical information.Moreover,a discrete particle swarm optimization algorithm was designed via employing binary matrix coding form.The proposed optimization algorithm generates coalitions in parallel and then performs subtask allocation algorithm based on load and energy balance.Finally,the experimental results show that the proposed algorithm strikes a good balance between local solution and global exploration,and achieves a satisfactory result within a short period of time.…”
Get full text
Article -
230
Self-adapted task allocation algorithm with complicated coalition in wireless sensor network
Published 2014-03-01“…Considering the real-time requirement and some specific limitations (e.g.insufficient computing resource,energy constraint,etc) in task scheduling of wireless sensor networks,different priorities were assigned to tasks according to their deadline,and an adaptive task allocation algorithm with complicated coalition was designed through analyzing historical information.Moreover,a discrete particle swarm optimization algorithm was designed via employing binary matrix coding form.The proposed optimization algorithm generates coalitions in parallel and then performs subtask allocation algorithm based on load and energy balance.Finally,the experimental results show that the proposed algorithm strikes a good balance between local solution and global exploration,and achieves a satisfactory result within a short period of time.…”
Get full text
Article -
231
Exact Algorithms for Practical Instances of the Railcar Loading Problem at Marine Container Terminals
Published 2022-01-01“…This study contributes to the literature by presenting tailored exact solution algorithms for a recently proposed optimization model to optimize the loading of double-stack trains. …”
Get full text
Article -
232
Medical decision support systems for diagnosing diseases based on ensemble learning algorithms
Published 2024-12-01“…This paper proposes a stacked learning model derived from multiple ensembles learning algorithms, including Random Forest, Catboost and XGBoost. …”
Get full text
Article -
233
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
234
Intrusion detection algorithm of wireless network based on network traffic anomaly analysis
Published 2025-06-01“…To promptly identify and mitigate abnormal behaviors while ensuring normal operation and security, this paper proposes an algorithm for detecting compromised nodes in wireless networks based on network traffic anomaly analysis. …”
Get full text
Article -
235
Research on dimension measurement algorithm for parcel boxes in high-speed sorting system
Published 2025-07-01“…In addition, it is difficult for existing parcel box detection algorithms to strike a balance between identification efficiency, identification accuracy and deployment cost. …”
Get full text
Article -
236
Energy management strategy for hybrid electric vehicle based on improved PPO algorithm
Published 2025-06-01“…In order to improve the economy of power-split hybrid electric vehicle (HEV),a longitudinal dynamics model of the entire HEV vehicle was established,and an energy management strategy (EMS) based on strategy entropy optimization with an improved proximal policy optimization (PPO) algorithm was proposed. The algorithmic framework was simplified by employing an experience pooling mechanism based on traditional PPO algorithm,and only one deep neural network was used for interactive training and updating to reduce the complexity of parameter synchronization in the policy network. …”
Get full text
Article -
237
Spatial Distribution of Poverty Clusters and Its Prediction Algorithms: A Visual Analytics Approach to Understanding the Disparities of Poverty Across Zones
Published 2025-01-01“…The results reveal that the Ensemble Stacking method outperforms other predictive algorithms in accurately classifying poverty groups derived from K-Means clustering. …”
Get full text
Article -
238
Simulation Analysis of Temperature Field of Optical Fiber Composite Overhead Ground Wire
Published 2019-10-01“…Finally, an analysis is made on the temperature field distribution of OPGW under lightning strike and the high temperature hazard of lightning strike.…”
Get full text
Article -
239
Optimization Research on Magnetic Interference Parameter Identification and Compensation for AUV Platforms
Published 2025-01-01“…To further improve training performance, a stacking ensemble learning (STACKING) model is introduced, with L-SHADE and BPNN as base learners and Convolutional Neural Network (CNN) as the meta-learner, integrating the advantages of both algorithms for optimization. …”
Get full text
Article -
240
Key Technology of Communication Equipment Fingerprint Recognition Based on Intelligent Feature Extraction Algorithm
Published 2022-01-01“…Aiming at the transient signal of communication equipment, an algorithm using the short-term periodicity of signal is presented. …”
Get full text
Article