Suggested Topics within your search.
Suggested Topics within your search.
-
1241
Impact of measurement error on predicting population-based inpatient glucose control
Published 2019-06-01Get full text
Article -
1242
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
1243
Improvement teaching-learning-based optimization algorithm for solar cell parameter extraction in photovoltaic systems
Published 2025-05-01“…The work aims to improve the Teaching-Learning-Based Optimization (TLBO) algorithm to enhance the accuracy of parameter extraction in PV models. …”
Get full text
Article -
1244
A Novel Three-Dimensional Algorithm Based on Practical Indoor Visible Light Positioning
Published 2019-01-01“…At the same time, with light-emitting diodes widely adopted, visible light positioning has become a widely researched technology in indoor positioning. However, the existing methods are based on the supposition that the light for positioning is a particle, without considering the shapes of lights, which causes low accuracy to a certain degree. …”
Get full text
Article -
1245
A similarity-based multi-objective test optimization technique using search algorithm
Published 2024-12-01“…Objective:: To solve the regression test optimization problem, the researchers have proposed various approaches including greedy algorithms, search-based algorithms, and clustering algorithms. …”
Get full text
Article -
1246
ALGORITHM FOR ASSESSING TIME AND COST RISKS AT ENTERPRISES OF THE MILITARY-INDUSTRIAL COMPLEX
Published 2025-05-01“…In the course of the research, models were developed for calculating and analyzing the risks of delays in delivery and changes in the cost of the electronic component base of products. …”
Article -
1247
Background Traffic-Based Retransmission Algorithm for Multimedia Streaming Transfer over Concurrent Multipaths
Published 2012-01-01“…However, the current researches on CMT-SCTP mainly focus on the algorithms related to the data delivery performance while they seldom consider the background traffic factors. …”
Get full text
Article -
1248
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
Published 2020-09-01“…In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. …”
Get full text
Article -
1249
A Novel Demodulation Algorithm Based on the Spatial-Domain Carrier Frequency Fringes Method
Published 2024-11-01“…In this paper, a novel demodulation algorithm based on spatial-domain carrier frequency shift is proposed to solve the problem. …”
Get full text
Article -
1250
A novel multi-label classification algorithm based on -nearest neighbor and random walk
Published 2020-03-01“…The integration of the random walk approach in the multi-label classification methods attracts many researchers’ sight. One challenge of using the random walk-based multi-label classification algorithms is to construct a random walk graph for the multi-label classification algorithms, which may lead to poor classification quality and high algorithm complexity. …”
Get full text
Article -
1251
An artificial intelligence technique: experimental analysis of population-based physarum-energy optimization algorithm
Published 2025-06-01“…In this paper, new versions of physarum-energy optimization algorithms (PEOs) which are population-based optimization algorithms were applied to the symmetric traveling salesman problems. …”
Get full text
Article -
1252
Stacking modeling with genetic algorithm-based hyperparameter tuning for uniaxial compressive strength prediction
Published 2025-09-01“…A notable contribution of this study lies in the application of both grid search and genetic algorithm (GA) for hyperparameter optimization, implemented across both individual base learners and the stacking ensemble model. …”
Get full text
Article -
1253
YOLO-SAG: An improved wildlife object detection algorithm based on YOLOv8n
Published 2024-11-01“…This paper proposes a wildlife target detection algorithm based on improved YOLOv8n - YOLO-SAG, which aims to balance accuracy and speed. …”
Get full text
Article -
1254
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article -
1255
-
1256
A Novel Linearly Complex Extended Signed Response-Based Node Authentication Scheme for Internet of Medical Things
Published 2024-01-01“…To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. …”
Get full text
Article -
1257
Appraising the Pile Settlement Rates by Support Vector Regression Optimized Using the Novel Optimization Algorithms
Published 2023-06-01“…Biogeography-Based Optimization (BBO) and Flow Direction Algorithm (FDA) were coupled with SVR to create the SVR-FDA and SVR-BBO frameworks. …”
Get full text
Article -
1258
APPROACH TO BUILDING A GLOBAL MOBILE AGENT WAY BASED ON Q-LEARNING
Published 2020-09-01“…The following methods are used: graph theory, queuing theory, Markov decision-making process theory and mathematical programming methods. The research is based on scientific articles and other materials from foreign conferences and archives in the field of machine learning, deep learning and deep reinforcement learning. …”
Get full text
Article -
1259
PanoSCU: A Simulation-Based Dataset for Panoramic Indoor Scene Understanding
Published 2025-01-01Get full text
Article -
1260
Research on Reverse Search System of Intelligent Parking Lot
Published 2023-08-01Get full text
Article