Showing 421 - 440 results of 11,272 for search 'both’s algorithm', query time: 0.17s Refine Results
  1. 421

    Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms by Chun-Wei Lin, Binbin Zhang, Kuo-Tung Yang, Tzung-Pei Hong

    Published 2014-01-01
    “…Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects.…”
    Get full text
    Article
  2. 422

    A Highly Discriminative Hybrid Feature Selection Algorithm for Cancer Diagnosis by Tarneem Elemam, Mohamed Elshrkawey

    Published 2022-01-01
    “…The algorithm comprises a two-stage hybrid feature selection. …”
    Get full text
    Article
  3. 423

    Conflict-based strategy combined integrated optimal conflict avoidance algorithm by Kejin Jia, Cheng Peng, Yun Du, Hongwei Wen, Yufei Gao, Zhe Zhang

    Published 2025-02-01
    “…Experimental results demonstrate that, compared to the traditional CBS algorithm, the CBS-CIOCA algorithm achieves maximum reductions of 97.37% and 94.99% in time and node expansion, respectively, in both traditional warehouse and fishbone-shaped warehouse environments, as well as 88.37% and 88.41% in a dynamic large-obstacle environment.…”
    Get full text
    Article
  4. 424

    A Heuristic Algorithm for Locating Line-to-Line Faults in Photovoltaic Systems by Jia-Zhang Jhan, Bo-Hong Li, Hsun-Tsung Chiu, Hong-Chan Chang, Cheng-Chien Kuo

    Published 2025-06-01
    “…The algorithm employs a two-phase approach: fault candidate marking and fault location determination, capable of handling both intra-string and cross-string faults. …”
    Get full text
    Article
  5. 425

    Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework by Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong

    Published 2025-03-01
    “…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
    Get full text
    Article
  6. 426
  7. 427
  8. 428

    An Energy Efficient Simultaneous-Node Repositioning Algorithm for Mobile Sensor Networks by Muhammad Amir Khan, Halabi Hasbullah, Babar Nazir, Imran Ali Khan

    Published 2014-01-01
    “…A novel algorithm for simultaneous-node repositioning is introduced. …”
    Get full text
    Article
  9. 429
  10. 430

    Intelligent trajectory tracking algorithm for autonomous robots under membrane computing by YAO Jiangyun, WU Fangyuan

    Published 2024-08-01
    “…To effectively assist autonomous robots in better planning and controlling their motion trajectories, enabling them to efficiently navigate to target positions and avoid obstacles and collisions, a new tracking algorithm was proposed using membrane computing method. …”
    Get full text
    Article
  11. 431

    Optimization of Transformer Windings Based on FEA-XGBoost and NSGA-III Algorithm by Shi Bai-di, Jiang Yong-feng, Shang Jing-yu, Bao Ye-feng, Chen Bing-yan, Yang Ke

    Published 2024-01-01
    “…Subsequently, the presented multiobjective model is optimized using multiobjective algorithms and the NSGA-III shows the best performance among the NSGA-II, MOPSO, and MODE. …”
    Get full text
    Article
  12. 432

    Algorithm and ninhydrin method allow for measurement of the postprandial appearance of peptides in blood by Stefan G. Pierzynowski, Piotr Wychowański, Wiesław Szczesny, Robert Galloto, Kamil Zaworski, Dominika Szkopek, Jarosław Woliński, Janine Donaldson, Kateryna Pierzynowska

    Published 2025-06-01
    “…Abstract The recognition of amine groups by ninhydrin, along with a simple mathematical algorithm, showed that di- and tripeptides derived from dietary protein are the major end products of protein digestion entering the blood postprandially. …”
    Get full text
    Article
  13. 433

    Machine learning algorithms to predict the tensile strength of novel composite materials by S. Sathees Kumar, P. Shyamala, Pravat Ranjan Pati

    Published 2025-10-01
    “…Unlike prior works, this approach systematically removes weakly correlated features to enhance both accuracy and interpretability. Random forest delivered the highest performance (R² = 0.92, mean absolute error (MAE) = 1.64), outperforming conventional and ensemble models. …”
    Get full text
    Article
  14. 434

    An Energy-Efficient CKN Algorithm for Duty-Cycled Wireless Sensor Networks by Lei Wang, Zhuxiu Yuan, Lei Shu, Liang Shi, Zhenquan Qin

    Published 2012-05-01
    “…., duty cycles) using sleep scheduling algorithms. The connected K -neighborhood (CKN) algorithm is an efficient decentralized sleep scheduling algorithm for reducing the number of awake nodes while maintaining both network connectivity and an on-demand routing latency. …”
    Get full text
    Article
  15. 435

    Algorithm Optimization for Rockfalls Alarm System Based on Fiber Polarization Sensing by Saverio Pellegrini, Giuseppe Rizzelli, Marco Barla, Roberto Gaudino

    Published 2023-01-01
    “…The novelty of our paper is the development of an algorithm that is able to detect dangerous events, which we experimentally emulated on a reduced scale physical model of a mountain slope, in which fibers have been buried in different configurations. …”
    Get full text
    Article
  16. 436

    Sigmoid-Function-Based Adaptive Pelican Optimization Algorithm for Global Optimization by A. F. S. Yussif, S. Adjei, B. E. Wilson

    Published 2025-03-01
    “… This paper introduces the Sigmoid-function-based Adaptive Pelican Optimization Algorithm (MPOA), an enhanced version of the traditional Pelican Optimization Algorithm (POA) aimed at improving the POA's performance. …”
    Get full text
    Article
  17. 437
  18. 438

    An algorithm to generate correlated input-parameters to be used in probabilistic sensitivity analyses by Mohamed Neine, Desmond Curran

    Published 2021-01-01
    “…Results: Correlation coefficients between parameters sampled from the distribution generated by the algorithm matched the desired correlations for both distribution functions. …”
    Get full text
    Article
  19. 439

    Bank Customer Segmentation and Marketing Strategies Based on Improved DBSCAN Algorithm by Xiaohua Yan, Yufeng Li, Fuquan Nie, Rui Li

    Published 2025-03-01
    “…The proposed KM-DBSCAN algorithm, which combines K-means and DBSCAN, is used for customer segmentation. …”
    Get full text
    Article
  20. 440