Showing 601 - 620 results of 7,801 for search 'current algorithm', query time: 0.17s Refine Results
  1. 601

    Micromedia News Dissemination Impact Assessment Integrated with Personalized Recommendation Algorithm by Shaofang Guo

    Published 2021-01-01
    “…Currently, popular personalized recommendation algorithms include content-based recommendation algorithms, collaborative filtering recommendation algorithms, knowledge-based recommendation algorithms, and associated recommendation algorithms. …”
    Get full text
    Article
  2. 602

    Computer Multimedia Art Pattern Creation Based on P-Filling Algorithm by Wenli Lian

    Published 2021-01-01
    “…The computer multimedia art patterns are currently created mainly relying on manual drawing. …”
    Get full text
    Article
  3. 603

    Psycho-Pass: The Portrait of a Control Society Under an Algorithmic System by Eirens Josua Mata Hine

    Published 2024-06-01
    “…The author uses this anime as a space to reflect critically on discourses and social realities that currently are or will be formed, in an era where everything is connected to algorithmic systems. …”
    Get full text
    Article
  4. 604

    Stability Conditions for the Leaky LMS Algorithm Based on Control Theory Analysis by Dariusz BISMOR, Marek PAWELCZYK

    Published 2016-09-01
    “…The Least Mean Squares (LMS) algorithm and its variants are currently the most frequently used adaptation algorithms; therefore, it is desirable to understand them thoroughly from both theoretical and practical points of view. …”
    Get full text
    Article
  5. 605

    Research on fusion algorithm for service life prediction based on kernel functions by TANG Huan, LI Yizhu, LYU Peng

    Published 2024-09-01
    “…Real-time service life prediction offers an effective means of assessing the remaining service life of operational control devices in rail transit systems. Currently, the primary methods employed for this purpose are based on physics-of-failure analysis and degradation data, respectively. …”
    Get full text
    Article
  6. 606

    Study of Assisted Control Algorithm for Wind Turbines Based on LiDAR by TANG Shuai, CHANG Sheng, ZHOU Jian, JIANG Tao

    Published 2025-02-01
    “…Amid the intensifying price competition in wind power generation, cost reduction has become the top priority currently in the industry, on the premise of ensuring turbine safety. …”
    Get full text
    Article
  7. 607
  8. 608
  9. 609

    Vessel Trajectory Data Compression Algorithm considering Critical Region Identification by Xinliang Zhang, Shibo Zhou

    Published 2023-01-01
    “…Vessel trajectory data are currently the most important data source for vessel trajectory data mining research. …”
    Get full text
    Article
  10. 610

    Novel distinguisher for SM4 cipher algorithm based on deep learning by Huijiao WANG, Xin ZHANG, Yongzhuang WEI, Lingchen LI

    Published 2023-07-01
    “…A method was proposed to construct a deep learning distinguisher model for large state block ciphers with large-block and long-key in view of the problem of high data complexity, time complexity and storage complexity of large state block cipher distinguishers, and the neural distinguishers were constructed for SM4 algorithm.Drawing inspiration from the idea that ciphertext difference could improve the performance of distinguishers, a new input data format for neural distinguisher was designed by using partial difference information between ciphertext pairs as part of the training data.The residual neural network model was used to construct the neural distinguisher.The training dataset for large blocks was preprocessed.Additionally, an improved strategy for model relearning was proposed to address the high specificity and low sensitivity of the constructed distinguisher.Experimental results show that the proposed deep learning model for SM4 can achieve 9 rounds neural distinguisher.The accuracy of 4~9 rounds distinguishers can reach up to 100%, 76.14%, 65.20%, 59.28%, 55.89% and 53.73% respectively.The complexity and accuracy of the constructed differential neural distinguisher are significantly better than those of traditional differential distinguishers, and it is currently the best neural distinguisher for the block cipher SM4 to our knowledge.It also proves that the deep learning method is effective and feasible in the security analysis of block cipher of large block.…”
    Get full text
    Article
  11. 611

    Implementation of Dijkstra's Algorithm for Nearest Location Search on Fire Extinguishing Robot by Mohammad Narji, Dedi Setiadi

    Published 2025-03-01
    “…The theory used in this study uses Graph theory, Dijkstra's Algorithm. The purpose of this study is to find out how fire extinguishing robots find the shortest route and how the Dijkstra algorithm method can be used to find the location of the fire source with the shortest route.…”
    Get full text
    Article
  12. 612

    ALGORITHM FOR ASSESSING TIME AND COST RISKS AT ENTERPRISES OF THE MILITARY-INDUSTRIAL COMPLEX by N.D. Pechalin, A.G. Finogeev

    Published 2025-05-01
    “…Implementation of the model and method for predictive risk assessment based on the analysis of available statistics at the enterprise allows using the obtained results to analyze other parameters of the project task, for example, product reliability parameters and quality indicators. The models and algorithm for risk analysis are intended for the management personnel of the enterprise and are currently used in drawing up a calendar schedule of cooperation processes during the implementation of production tasks for the release of products of the defense industry complex. …”
    Article
  13. 613

    SOLUTION OF FULLY FUZZY NONLINEAR EQUATION SYSTEMS USING GENETIC ALGORITHM by Fatimatuzzahra Fatimatuzzahra, Aang Nuryaman, La Zakaria, Agus Sutrisno

    Published 2025-04-01
    “…A system of nonlinear equations is a collection of several interrelated non-linear equations. Currently, systems of nonlinear equations are used not only on crisp but also on fuzzy numbers. …”
    Get full text
    Article
  14. 614

    Novel three‐dimensional ECG algorithm for reliable screening for cardiac amyloidosis by Amir A. Mahabadi, Jan Knobeloch, Viktoria Backmann, Lars Michel, Markus S. Anker, Reza Wakili, Christian Fach, Stefan D. Anker, Tienush Rassaf

    Published 2025-08-01
    “…Abstract Aims Currently, there is no established screening tool for cardiac amyloidosis, leading to a delay in diagnosis in the majority of patients. …”
    Get full text
    Article
  15. 615

    Effectiveness of AdaBoost and XGBoost Algorithms in Sentiment Analysis of Movie Reviews by I Gusti Ayu Nandia Lestari, Ni Made Rai Masita Dewi, Komang Gita Meiliana, I Komang Agus Ady Aryanto

    Published 2025-03-01
    “…Currently there are many entertainment platforms that provide various movies, TV shows, games, and other content. …”
    Get full text
    Article
  16. 616
  17. 617

    Endpoint Distribution Modeling-Based Capture Algorithm for Interfering Multi-Target by Xiangliang Zhang, Junlin Li, Pengjie Li, Fang Si, Xiangzhi Liu, Yu Gu, Shuguang Meng, Jibin Yin, Tao Liu

    Published 2024-12-01
    “…Based on these models, we have developed a basic region partitioning algorithm (BRPA) and an enhanced region partitioning algorithm (ERPA). …”
    Get full text
    Article
  18. 618

    Research of the small Qubit quantum computing attack to the RSA public key cryptography by Bao-nan WANG, Yu-hang CHEN, Bao YIN, Feng HU, Huan-guo ZHANG, Chao WANG

    Published 2017-10-01
    “…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
    Get full text
    Article
  19. 619

    Improved Hypernymy Detection Algorithm Based on Heterogeneous Graph Neural Network by Li Ren, Jing Huang, Hai-Tao Jia, Shu-Bao Sun, Kai-Shi Wang, Yi-Le Wu

    Published 2025-05-01
    “…These tasks often require understanding the semantic relations between concepts or entities in text for more accurate analysis and reasoning. Currently, algorithms for identifying and detecting hyponymy–hypernymy semantic relations face two main challenges: first, candidate hyponymy–hypernymy relation tuples do not exist in the same contextual sentence, failing to meet the co-occurrence requirement; second, distributed algorithms have issues with lexical memory. …”
    Get full text
    Article
  20. 620