Showing 1,241 - 1,260 results of 15,770 for search 'Based research algorithms', query time: 0.29s Refine Results
  1. 1241
  2. 1242

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article
  3. 1243

    Improvement teaching-learning-based optimization algorithm for solar cell parameter extraction in photovoltaic systems by H. Khaterchi, M. H. Moulahi, A. Jeridi, R. Ben Messaoud, A. Zaafouri

    Published 2025-05-01
    “…The work aims to improve the Teaching-Learning-Based Optimization (TLBO) algorithm to enhance the accuracy of parameter extraction in PV models. …”
    Get full text
    Article
  4. 1244

    A Novel Three-Dimensional Algorithm Based on Practical Indoor Visible Light Positioning by H.-X. Zhao, J.-T. Wang

    Published 2019-01-01
    “…At the same time, with light-emitting diodes widely adopted, visible light positioning has become a widely researched technology in indoor positioning. However, the existing methods are based on the supposition that the light for positioning is a particle, without considering the shapes of lights, which causes low accuracy to a certain degree. …”
    Get full text
    Article
  5. 1245

    A similarity-based multi-objective test optimization technique using search algorithm by Amir Sohail Habib, Saif Ur Rehman Khan, Shahid Hussain, Naseem Ibrahim, Habib un Nisa, Abdullah Yousafzai

    Published 2024-12-01
    “…Objective:: To solve the regression test optimization problem, the researchers have proposed various approaches including greedy algorithms, search-based algorithms, and clustering algorithms. …”
    Get full text
    Article
  6. 1246

    ALGORITHM FOR ASSESSING TIME AND COST RISKS AT ENTERPRISES OF THE MILITARY-INDUSTRIAL COMPLEX by N.D. Pechalin, A.G. Finogeev

    Published 2025-05-01
    “…In the course of the research, models were developed for calculating and analyzing the risks of delays in delivery and changes in the cost of the electronic component base of products. …”
    Article
  7. 1247

    Background Traffic-Based Retransmission Algorithm for Multimedia Streaming Transfer over Concurrent Multipaths by Yuanlong Cao, Changqiao Xu, Jianfeng Guan, Hongke Zhang

    Published 2012-01-01
    “…However, the current researches on CMT-SCTP mainly focus on the algorithms related to the data delivery performance while they seldom consider the background traffic factors. …”
    Get full text
    Article
  8. 1248

    CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm by Mohammed Issam Younis, Abdul Rahman A. Alsewari, Ng Yeong Khang, Kamal Z. Zamli

    Published 2020-09-01
    “…In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. …”
    Get full text
    Article
  9. 1249

    A Novel Demodulation Algorithm Based on the Spatial-Domain Carrier Frequency Fringes Method by Chenhaolei Han, Yuan Ju, Zongxu Zhao, Yuni He, Zhan Tang

    Published 2024-11-01
    “…In this paper, a novel demodulation algorithm based on spatial-domain carrier frequency shift is proposed to solve the problem. …”
    Get full text
    Article
  10. 1250

    A novel multi-label classification algorithm based on -nearest neighbor and random walk by Zhen-Wu Wang, Si-Kai Wang, Ben-Ting Wan, William Wei Song

    Published 2020-03-01
    “…The integration of the random walk approach in the multi-label classification methods attracts many researchers’ sight. One challenge of using the random walk-based multi-label classification algorithms is to construct a random walk graph for the multi-label classification algorithms, which may lead to poor classification quality and high algorithm complexity. …”
    Get full text
    Article
  11. 1251

    An artificial intelligence technique: experimental analysis of population-based physarum-energy optimization algorithm by Mehmet Fatih Demiral

    Published 2025-06-01
    “…In this paper, new versions of physarum-energy optimization algorithms (PEOs) which are population-based optimization algorithms were applied to the symmetric traveling salesman problems. …”
    Get full text
    Article
  12. 1252

    Stacking modeling with genetic algorithm-based hyperparameter tuning for uniaxial compressive strength prediction by Tanveer Alam Munshi, Khanum Popi, Labiba Nusrat Jahan, M. Farhad Howladar, Mahamudul Hashan

    Published 2025-09-01
    “…A notable contribution of this study lies in the application of both grid search and genetic algorithm (GA) for hyperparameter optimization, implemented across both individual base learners and the stacking ensemble model. …”
    Get full text
    Article
  13. 1253

    YOLO-SAG: An improved wildlife object detection algorithm based on YOLOv8n by Lingli Chen, Gang Li, Shunkai Zhang, Wenjie Mao, Mei Zhang

    Published 2024-11-01
    “…This paper proposes a wildlife target detection algorithm based on improved YOLOv8n - YOLO-SAG, which aims to balance accuracy and speed. …”
    Get full text
    Article
  14. 1254

    Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding by Haiyong WANG, Mengning JI

    Published 2023-12-01
    “…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
    Get full text
    Article
  15. 1255
  16. 1256

    A Novel Linearly Complex Extended Signed Response-Based Node Authentication Scheme for Internet of Medical Things by Muhammad Saud Khan, Muhammad Sardaraz, Muhammad Tahir, Abdullah Alourani

    Published 2024-01-01
    “…To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. …”
    Get full text
    Article
  17. 1257

    Appraising the Pile Settlement Rates by Support Vector Regression Optimized Using the Novel Optimization Algorithms by Argyros Maris

    Published 2023-06-01
    “…Biogeography-Based Optimization (BBO) and Flow Direction Algorithm (FDA) were coupled with SVR to create the SVR-FDA and SVR-BBO frameworks. …”
    Get full text
    Article
  18. 1258

    APPROACH TO BUILDING A GLOBAL MOBILE AGENT WAY BASED ON Q-LEARNING by Vitalii Martovytskyi, Oleksandr Ivaniuk

    Published 2020-09-01
    “…The following methods are used: graph theory, queuing theory, Markov decision-making process theory and mathematical programming methods. The research is based on scientific articles and other materials from foreign conferences and archives in the field of machine learning, deep learning and deep reinforcement learning. …”
    Get full text
    Article
  19. 1259
  20. 1260