-
121
Hybrid IoT-CAD system: optimized feature selection based gated recurrent residual deep learning for cyber attack detection in IoT networks
Published 2025-08-01“…Next, to solve the data imbalance problem, Conditional Generative Adversarial Networks (CGAN) are employed. After that, the Binary Genetic Dung Beetle Optimization (B-GDBO) method is utilized for optimal feature selection and also reduces the risk of overfitting. …”
Get full text
Article -
122
Validation of the Distress Thermometer for detecting psychological distress in patients with stable chronic obstructive pulmonary disease: optimal cut-off score and influencing fac...
Published 2025-08-01“…The Distress Thermometer (DT), originally developed for cancer patients, is a brief screening tool for detecting psychological distress. However, the optimal cut-off in COPD patients remains unclear. …”
Get full text
Article -
123
Highly Versatile FPGA-Implemented Cyber Coherent Ising Machine
Published 2024-01-01Get full text
Article -
124
Theoretical investigation of photonic spin Hall effect based on layered metastructure with graphene regulation by WOA for encoding and encryption
Published 2025-07-01“…To further optimize coding performance, the Beluga optimization algorithm is employed to optimize the PSHE displacement. …”
Get full text
Article -
125
PARAMETRIC SYNTHESIS OF MODELS FOR MULTICRITERIAL ESTIMATION OF TECHNOLOGICAL SYSTEMS
Published 2017-11-01“…The methods used are: system analysis, decision theory, identification theory, multicriteria optimization methods. The following results are obtained: to increase the adequacy of the models of TS multifactor estimation, it is suggested to use the utility function of partial criteria that makes it possible to realize not only linear, convex or concave, but also S (Z)-like dependencies on their values. …”
Get full text
Article -
126
Multi-user joint task offloading and resource allocation based on mobile edge computing in mining scenarios
Published 2025-05-01“…To evaluate the effectiveness of the proposed method, we compare it with five baseline algorithms: the improved grey wolf optimizer metaheuristic algorithm, the traditional genetic algorithm, the binary offloading decision mechanism, the partial non-cooperative mechanism, and the fully local execution mechanism. …”
Get full text
Article -
127
Application of decision diagrams of incompletely specified of k-valued logic functions in the synthesis of logical circuits
Published 2023-06-01“…Encoding of multi-valued values of arguments and values of functions of k-valued logic by binary codes leads to systems of partial Boolean functions, which are also further defined in order to minimize their multi-level BDD representations.Conclusion. …”
Get full text
Article -
128
Cross-Modal Hashing Retrieval Based on Density Clustering
Published 2025-01-01“…However, most of the existing hashing methods have the problem of how to precisely learn potential correlations between different modalities from binary codes with minimal loss. In addition, solving binary codes in different modalities is an NP-hard problem. …”
Get full text
Article -
129
Information-extremе machine learning for object identification on the terrain
Published 2016-06-01“…The offered algorithm of information-extreme machine learning implements the adaptive coding of values of primary features using multilevel system of control permits, and creation of hyperspherical containers of classes in binary space of secondary features with sequential optimization procedures. …”
Get full text
Article -
130
Exploration of Machine Learning Models for Prediction of Gene Electrotransfer Treatment Outcomes
Published 2024-12-01“…Tissue heterogeneity complicates the delivery process, requiring the extensive optimization of pulsing protocols currently empirically optimized. …”
Get full text
Article -
131
Outage Performance and Novel Loss Function for an ML-Assisted Resource Allocation: An Exact Analytical Framework
Published 2024-01-01“…They also reveal that focusing on standard metrics, like precision, false-positive rate, or recall, may not produce optimal predictors. …”
Get full text
Article -
132
Solving the Control Synthesis Problem Through Supervised Machine Learning of Symbolic Regression
Published 2024-11-01“…The optimization criterion for solving the synthesis problem is the accuracy of the object’s movement along the optimal trajectory. …”
Get full text
Article -
133
Evolutionary Synthesis of High-Capacity Reconfigurable Multilayer Road Networks Using a Multiagent Hybrid Clustering-Assisted Genetic Algorithm
Published 2025-01-01“…The proposed algorithm combines the use of binary-coded crossovers and mutations as genetic operators, and biobjective discrete particle swarm optimization (BODPSO) techniques to improve the evolutionary search process. …”
Get full text
Article -
134
D-BADGE: Decision-Based Adversarial Batch Attack With Directional Gradient Estimation
Published 2024-01-01“…Image-agnostic universal adversarial perturbations (UAPs) are much more threatening, but many limitations exist to implementing UAPs in real-world scenarios where only binary decisions are returned. In this research, we propose D-BADGE, a novel method to craft universal adversarial perturbations for executing decision- To primarily optimize perturbation by focusing on decisions, we consider the direction of these updates as the primary factor and the magnitude of updates as the secondary factor. …”
Get full text
Article -
135
Applying a logistic regression-clustering joint model to analyze the causes of prolonged pre-analytic turnaround time for urine culture testing in hospital wards
Published 2025-06-01“…Post-intervention data (May 2024–July 2024, *n* = 1,456) was also analyzed to assess the impact.ResultsAnalysis of the critical risk factors revealed that specimens collected between 04:00–05:59/10:00–11:59 had 142.92-fold higher delay odds (95% CI: 58.81–347.37). …”
Get full text
Article -
136
Prediction of Thyroid Classes Using Feature Selection of AEHOA Based CNN Model for Healthy Lifestyle
Published 2024-05-01“…Although diagnostic techniques exist, they frequently seek binary categorization, use insufficiently big datasets, and lack confirmation of their conclusions. …”
Get full text
Article -
137
XAIEnsembleTL-IoV: A new eXplainable Artificial Intelligence ensemble transfer learning for zero-day botnet attack detection in the Internet of Vehicles
Published 2024-12-01“…Additionally, the model employs hybrid bidirectional long-short-term memory with autoencoders (BiLAE) to reduce the dimensionality of IoV network traffic, improving computational efficiency. It also uses Barnacle Mating Optimizer (BMO) to optimize the hyper-parameters of deep learning models such as ResNet, Inception, Inception ResNet, and MobileNet Convolution neural network-transfer learning architecture (CNN-TL), enhancing detection capabilities without needing vast amounts of labeled data. …”
Get full text
Article -
138
Securing the economic management and service infrastructure of banks via the use of artificial intelligence (MO-ILSTM)
Published 2025-12-01“…This study explores the use of Mothfly Optimized Improved Long Short-Term Memory (MO-ILSTM) as a data classification technique to improve data sharing and processing effectiveness. …”
Get full text
Article -
139
NLP for computational insights into nutritional impacts on colorectal cancer care
Published 2025-06-01“…Relevant terms are then extracted and visualized in a word cloud. The dataset also contained an imbalanced binary CRC outcome, which is rebalanced utilizing the random oversampling. …”
Get full text
Article -
140
Quantum global minimum finder based on variational quantum search
Published 2025-04-01“…Designed with a O(n)-depth circuit architecture, QGMF also utilize the logarithmic benefits of binary search to enhance scalability and efficiency. …”
Get full text
Article