Showing 601 - 620 results of 11,272 for search 'both’s algorithm', query time: 0.17s Refine Results
  1. 601

    Machine learning for Parkinson’s disease: a comprehensive review of datasets, algorithms, and challenges by Sahar Shokrpour, AmirMehdi MoghadamFarid, Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Mostafa Sarvizadeh

    Published 2025-07-01
    “…Abstract Parkinson’s disease (PD) is a devastating neurological ailment affecting both mobility and cognitive function, posing considerable problems to the health of the elderly across the world. …”
    Get full text
    Article
  2. 602

    Hybrid genetic algorithm and deep learning techniques for advanced side-channel attacks by Faisal Hameed, Hoda Alkhzaimi

    Published 2025-07-01
    “…These findings validate genetic algorithms as a robust alternative for optimizing side-channel attack models, offering both scalability and consistent performance across diverse attack scenarios while advancing the state of cryptographic security assessment.…”
    Get full text
    Article
  3. 603

    A Novel Fuzzy Kernel Extreme Learning Machine Algorithm in Classification Problems by Asli Kaya Karakutuk, Ozer Ozdemir

    Published 2025-04-01
    “…On the JAFFE dataset, the algorithm achieved an average classification accuracy of 94.55% when supported with local binary patterns and 94.27% with a histogram of oriented gradients. …”
    Get full text
    Article
  4. 604

    Cloud computing virtualization technology based on bandwidth resource-aware migration algorithm by Jin Zhiwei

    Published 2025-07-01
    “…The algorithm monitors bandwidth usage in real-time, identifying potential bottlenecks and considering both resource utilization and bandwidth availability when determining whether to migrate virtual machines. …”
    Get full text
    Article
  5. 605

    Active collision avoidance method for automated vehicles based on fuzzy PID algorithm by Lu Chen

    Published 2025-07-01
    “…Compared to conventional PID controllers, the fuzzy PID algorithm enhances responsiveness and accuracy across various scenarios. …”
    Get full text
    Article
  6. 606

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  7. 607

    Constraint Consensus Based Artificial Bee Colony Algorithm for Constrained Optimization Problems by Liling Sun, Yuhan Wu, Xiaodan Liang, Maowei He, Hanning Chen

    Published 2019-01-01
    “…Experimental results demonstrate the promising performance of the proposed algorithm, in terms of both optimization quality and convergence speed.…”
    Get full text
    Article
  8. 608

    A Review on Path Planning and Obstacle Avoidance Algorithms for Autonomous Mobile Robots by Anis Naema Atiyah Rafai, Noraziah Adzhar, Nor Izzati Jaini

    Published 2022-01-01
    “…A mobile robot could autonomously navigate in any environment, both static and dynamic. As a result, researchers in the robotics field have offered a variety of techniques. …”
    Get full text
    Article
  9. 609

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  10. 610

    Community detection algorithm of hybrid node analysis and edge analysis in complex networks by Kun DENG, Qingfeng JIANG, Xingyan LIU

    Published 2023-04-01
    “…The community detection of hybrid node analysis and edge analysis in complex networks (CDHNE), a novel community detection algorithm, was proposed aiming at the problem that both edge community detection and node-based community detection algorithms had corresponding shortcomings in the process of detecting communities, which affected the quality of complex network community detection.The relatively stable characteristics of the edge in the networks were firstly used by the algorithm to construct a more accurate community structure through edge community detection at the early stage of algorithm execution.Then, after the formation of the edge communities, the flexible characteristics of the node were used to accurately detect the boundary of edge communities, so as to more accurately detect the community structure in the complex networks.In the computer-generated network experiments, when the community structure of the network gradually became fuzzy, the number of overlapping nodes and the number of communities to which the overlapping nodes belonged kept increasing.Compared to traditional algorithms, the accuracy of community detection and overlapping nodes detection were improved by an average of 10% and 15%, respectively, by the CDHNE algorithm.In the real network experiments, the tightness of the community structure detected by the CDHNE algorithm was better.Especially when facing large-scale networks with more than 100 000 nodes, the detection task was completed by the CDHNE algorithm with high quality, and the EQ value reached 0.412 1.The experimental results show that the CDHNE algorithm has advantages in operational stability and handling large-scale networks.…”
    Get full text
    Article
  11. 611
  12. 612

    Research on Adaptive Optics Image Restoration Algorithm by Improved Expectation Maximization Method by Lijuan Zhang, Dongming Li, Wei Su, Jinhua Yang, Yutong Jiang

    Published 2014-01-01
    “…Lastly, the image-restoration experiments on both analog images and the real AO are performed to verify the recovery effect of our algorithm. …”
    Get full text
    Article
  13. 613
  14. 614

    A novel pedestrian detection algorithm based on data fusion of face images by Jianhu Zheng, Jinshuan Peng

    Published 2019-05-01
    “…The experimental result proves that our algorithm achieves better performance when compared with other state-of-the-art methodologies, both numerically and visually.…”
    Get full text
    Article
  15. 615

    Optimization of social security patrol strategy based on graph theory and GGC algorithm by Jian Wang

    Published 2025-07-01
    “…The policy set and payoff function are defined, and a generalized geometric coverage algorithm is designed to solve the policy set of both parties in the model, thereby obtaining the optimal patrol strategy for intelligent patrol agents. …”
    Get full text
    Article
  16. 616

    Accelerating Bayesian hierarchical clustering of time series data with a randomised algorithm. by Robert Darkins, Emma J Cooke, Zoubin Ghahramani, Paul D W Kirk, David L Wild, Richard S Savage

    Published 2013-01-01
    “…We define and analyse the randomised algorithm, before presenting results on both synthetic and real biological data sets. …”
    Get full text
    Article
  17. 617

    Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification by Jiakai Hao, Ming Jin, Yuting Li, Yuxin Yang

    Published 2025-04-01
    “…Special emphasis is placed on the performance of algorithms within both symmetric and asymmetric frameworks. …”
    Get full text
    Article
  18. 618

    Path Planning for Wall-Climbing Robots Using an Improved Sparrow Search Algorithm by Wenyuan Xu, Chao Hou, Guodong Li, Chuang Cui

    Published 2024-09-01
    “…Second, improvements are made to the position updating formulas of both discoverers and followers. Finally, the differential evolution algorithm is introduced to enhance the global search capability of the algorithm, thereby reducing the robot’s energy consumption. …”
    Get full text
    Article
  19. 619

    A Node Influence Based Label Propagation Algorithm for Community Detection in Networks by Yan Xing, Fanrong Meng, Yong Zhou, Mu Zhu, Mengyu Shi, Guibin Sun

    Published 2014-01-01
    “…The experimental results on both synthetic and real networks demonstrate that NIBLPA maintains the efficiency of the traditional LPA algorithm, and, at the same time, it has a superior performance to some representative methods.…”
    Get full text
    Article
  20. 620

    Integrating evolutionary algorithms and enhanced-YOLOv8 + for comprehensive apple ripeness prediction by Yuchi Li, Zhigao Wang, Aiwei Yang, Xiaoqi Yu

    Published 2025-03-01
    “…This paper proposes an approach for assessing apple ripeness from both structured and unstructured observation data, i.e., text and images. …”
    Get full text
    Article