Suggested Topics within your search.
Suggested Topics within your search.
-
601
Micromedia News Dissemination Impact Assessment Integrated with Personalized Recommendation Algorithm
Published 2021-01-01“…Currently, popular personalized recommendation algorithms include content-based recommendation algorithms, collaborative filtering recommendation algorithms, knowledge-based recommendation algorithms, and associated recommendation algorithms. …”
Get full text
Article -
602
Computer Multimedia Art Pattern Creation Based on P-Filling Algorithm
Published 2021-01-01“…The computer multimedia art patterns are currently created mainly relying on manual drawing. …”
Get full text
Article -
603
Psycho-Pass: The Portrait of a Control Society Under an Algorithmic System
Published 2024-06-01“…The author uses this anime as a space to reflect critically on discourses and social realities that currently are or will be formed, in an era where everything is connected to algorithmic systems. …”
Get full text
Article -
604
Stability Conditions for the Leaky LMS Algorithm Based on Control Theory Analysis
Published 2016-09-01“…The Least Mean Squares (LMS) algorithm and its variants are currently the most frequently used adaptation algorithms; therefore, it is desirable to understand them thoroughly from both theoretical and practical points of view. …”
Get full text
Article -
605
Research on fusion algorithm for service life prediction based on kernel functions
Published 2024-09-01“…Real-time service life prediction offers an effective means of assessing the remaining service life of operational control devices in rail transit systems. Currently, the primary methods employed for this purpose are based on physics-of-failure analysis and degradation data, respectively. …”
Get full text
Article -
606
Study of Assisted Control Algorithm for Wind Turbines Based on LiDAR
Published 2025-02-01“…Amid the intensifying price competition in wind power generation, cost reduction has become the top priority currently in the industry, on the premise of ensuring turbine safety. …”
Get full text
Article -
607
Algorithms of optimization and standardization of surgical care in destructive forms of Charcott foot
Published 2025-06-01Get full text
Article -
608
A New AB Initio Repeats Finding Algorithm for Reference Genome
Published 2017-11-01Get full text
Article -
609
Vessel Trajectory Data Compression Algorithm considering Critical Region Identification
Published 2023-01-01“…Vessel trajectory data are currently the most important data source for vessel trajectory data mining research. …”
Get full text
Article -
610
Novel distinguisher for SM4 cipher algorithm based on deep learning
Published 2023-07-01“…A method was proposed to construct a deep learning distinguisher model for large state block ciphers with large-block and long-key in view of the problem of high data complexity, time complexity and storage complexity of large state block cipher distinguishers, and the neural distinguishers were constructed for SM4 algorithm.Drawing inspiration from the idea that ciphertext difference could improve the performance of distinguishers, a new input data format for neural distinguisher was designed by using partial difference information between ciphertext pairs as part of the training data.The residual neural network model was used to construct the neural distinguisher.The training dataset for large blocks was preprocessed.Additionally, an improved strategy for model relearning was proposed to address the high specificity and low sensitivity of the constructed distinguisher.Experimental results show that the proposed deep learning model for SM4 can achieve 9 rounds neural distinguisher.The accuracy of 4~9 rounds distinguishers can reach up to 100%, 76.14%, 65.20%, 59.28%, 55.89% and 53.73% respectively.The complexity and accuracy of the constructed differential neural distinguisher are significantly better than those of traditional differential distinguishers, and it is currently the best neural distinguisher for the block cipher SM4 to our knowledge.It also proves that the deep learning method is effective and feasible in the security analysis of block cipher of large block.…”
Get full text
Article -
611
Implementation of Dijkstra's Algorithm for Nearest Location Search on Fire Extinguishing Robot
Published 2025-03-01“…The theory used in this study uses Graph theory, Dijkstra's Algorithm. The purpose of this study is to find out how fire extinguishing robots find the shortest route and how the Dijkstra algorithm method can be used to find the location of the fire source with the shortest route.…”
Get full text
Article -
612
ALGORITHM FOR ASSESSING TIME AND COST RISKS AT ENTERPRISES OF THE MILITARY-INDUSTRIAL COMPLEX
Published 2025-05-01“…Implementation of the model and method for predictive risk assessment based on the analysis of available statistics at the enterprise allows using the obtained results to analyze other parameters of the project task, for example, product reliability parameters and quality indicators. The models and algorithm for risk analysis are intended for the management personnel of the enterprise and are currently used in drawing up a calendar schedule of cooperation processes during the implementation of production tasks for the release of products of the defense industry complex. …”
Article -
613
SOLUTION OF FULLY FUZZY NONLINEAR EQUATION SYSTEMS USING GENETIC ALGORITHM
Published 2025-04-01“…A system of nonlinear equations is a collection of several interrelated non-linear equations. Currently, systems of nonlinear equations are used not only on crisp but also on fuzzy numbers. …”
Get full text
Article -
614
Novel three‐dimensional ECG algorithm for reliable screening for cardiac amyloidosis
Published 2025-08-01“…Abstract Aims Currently, there is no established screening tool for cardiac amyloidosis, leading to a delay in diagnosis in the majority of patients. …”
Get full text
Article -
615
Effectiveness of AdaBoost and XGBoost Algorithms in Sentiment Analysis of Movie Reviews
Published 2025-03-01“…Currently there are many entertainment platforms that provide various movies, TV shows, games, and other content. …”
Get full text
Article -
616
Analysing the ML-Based Algorithms for GNSS Data Bit Synchronization and Decoding
Published 2025-01-01Get full text
Article -
617
Endpoint Distribution Modeling-Based Capture Algorithm for Interfering Multi-Target
Published 2024-12-01“…Based on these models, we have developed a basic region partitioning algorithm (BRPA) and an enhanced region partitioning algorithm (ERPA). …”
Get full text
Article -
618
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
Get full text
Article -
619
Improved Hypernymy Detection Algorithm Based on Heterogeneous Graph Neural Network
Published 2025-05-01“…These tasks often require understanding the semantic relations between concepts or entities in text for more accurate analysis and reasoning. Currently, algorithms for identifying and detecting hyponymy–hypernymy semantic relations face two main challenges: first, candidate hyponymy–hypernymy relation tuples do not exist in the same contextual sentence, failing to meet the co-occurrence requirement; second, distributed algorithms have issues with lexical memory. …”
Get full text
Article -
620