Showing 2,901 - 2,920 results of 6,037 for search 'main algorithm', query time: 0.14s Refine Results
  1. 2901

    CP-ABE based users collaborative privacy protection scheme for continuous query by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-09-01
    “…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
    Get full text
    Article
  2. 2902

    Multiobjective Strategy for Optimized Load Breaker Switch Placement to Improve Distribution Network Performance and Reliability by Mohammad Ebrahim Hajiabadi, Hossein Parsadust, Hossein Lotfi, Sajjad Borhani Yazdi, Hossein Ramezani

    Published 2025-01-01
    “…To solve this problem, an iterative graph-based search algorithm is employed, which dynamically identifies the optimal locations for switch installation. …”
    Get full text
    Article
  3. 2903

    Improving construction site efficiency through automated progress monitoring of underground pipe installation sites using image color analysis of iPhone LiDAR camera data by Tsukasa Mizutani, Shunsuke Iwai

    Published 2024-12-01
    “…We further demonstrated the robustness of the proposed algorithm by applying it to two types of data acquired at actual construction sites. …”
    Get full text
    Article
  4. 2904

    Inventory Optimization of Fresh Agricultural Products Supply Chain Based on Agricultural Superdocking by Lixin Shen, Fucheng Li, Congcong Li, Yumin Wang, Xueqi Qian, Tao Feng, Cong Wang

    Published 2020-01-01
    “…The “agricultural superdocking” mode which has been strong supported by the government has become the main way for fresh agricultural products to enter the market in China. …”
    Get full text
    Article
  5. 2905

    ML-based Plant Stress Detection from IoT-sensed Reduced Electromes by Marcos De Oliveira Jr, Gregory Sedrez, Gerson Geraldo H. Cavalheiro

    Published 2023-05-01
    “…The main challenges in these tasks and future research directions are also discussed.…”
    Get full text
    Article
  6. 2906

    A Bi-Level Demand Response Framework Based on Customer Directrix Load for Power Systems with High Renewable Integration by Weimin Xi, Qian Chen, Haihua Xu, Qingshan Xu

    Published 2025-07-01
    “…A bilevel optimization framework is established, with air conditioning (AC) systems and electric vehicles (EVs) serving as the main DR participants. The problem is addressed using a genetic algorithm. …”
    Get full text
    Article
  7. 2907

    The efficiency of Color Models layers at Color Images as Cover in text hiding by Qasim Mohammed Hussein, Ahmed Saadi Abdullah, Nada Qasim Mohammed

    Published 2023-02-01
    “…The nature of the color mode of the cover plays a main role in determining the robustness and security of hiding algorithm. …”
    Get full text
    Article
  8. 2908

    Thromboembolism in Patients with Cancer: A Practical Guide to Recurrent Events by Sergey Kozhukhov, Nataliia Dovganych

    Published 2024-11-01
    “…This review paper summarizes the management of cancer-associated VTE, risk factors for rVTE and the treatment algorithm of rVTE.…”
    Get full text
    Article
  9. 2909

    Preventing Stillbirth: A Review of Screening and Prevention Strategies by Laure Noël, Conrado Milani Coutinho, Basky Thilaganathan, Yiyuan Jiang, Dandan Shi

    Published 2022-07-01
    “…More recently, the first-trimester combined screening algorithm developed by the Fetal Medicine Foundation has emerged as a better tool to predict and prevent early-onset placental dysfunction and its main outcomes of preterm preeclampsia, fetal growth restriction and stillbirth by the appropriate use of Aspirin therapy, serial growth scans and induction of labour from 40 weeks for women identified at high-risk by such screening. …”
    Get full text
    Article
  10. 2910
  11. 2911

    The hermeneutic circle as a means of illustration of the understanding problem when teaching didactic communications by E. E. Neupokoeva, N. K. Chapaev

    Published 2021-09-01
    “…The theoretical and methodological component of the research is based on hermeneutic, system-activity and integrative approaches. The main research findings are drawn upon the cognitive theory (theory of cognitive processes). …”
    Get full text
    Article
  12. 2912

    CatSkill: Artificial Intelligence-Based Metrics for the Assessment of Surgical Skill Level from Intraoperative Cataract Surgery Video Recordings by Binh Duong Giap, PhD, Dena Ballouz, MD, Karthik Srinivasan, MD, MS, Jefferson Lustre, BS, Keely Likosky, BS, Ossama Mahmoud, MD, Shahzad I. Mian, MD, Bradford L. Tannen, MD, JD, Nambi Nallasamy, MD

    Published 2025-07-01
    “…Three CSAMs were computed to analyze 430 cataract surgeries (254 attendings and 176 residents). An ML algorithm was developed to predict surgeon training level using only CSAMs. …”
    Get full text
    Article
  13. 2913

    Modelagem hidrológica em microbacia hidrográfica parte I: aprimoramento do modelo HidroBacia Hydrologic modeling in a small watershed part I: improvement of the HidroBacia model by Sidney S. Zanetti, José M. A. da Silva, Elias F. Sousa, Vicente de P. S. de Oliveira, Frederico T. de Almeida

    Published 2009-08-01
    “…This problem was corrected by the substitution of the linear algorithm used (Bras, 1990), by the non-linear algorithm proposed by Li et al. (1975). …”
    Get full text
    Article
  14. 2914

    THE ROLE OF DISPOSITION OF CONNECTING TISSUE IN THE RISE OF NONTRAUMATIC SUBARACHNOIDAL HEMORRHAGE IN YOUNG AGE by E. V. Petrova, T. F. Popova, I. A. Gribacheva, G. K. Taitubayeva

    Published 2018-06-01
    “…The obtained data can become a basis for developing an algorithm for screening physical examination of patients with an increased risk of aneurysmal hemorrhage.…”
    Get full text
    Article
  15. 2915

    PATH PLANNING AND OBSTACLE AVOIDANCE METHODS FOR AUTONOMOUS MOBILE ROBOTS by Ihor Berizka

    Published 2024-12-01
    “…This time varies depending on the chosen algorithm, the nature of the task, and the initial conditions. …”
    Get full text
    Article
  16. 2916

    Belief in building a full-fledged distance learning course in athletic training by Andrii Yefremenko, Illia Shutieiev

    Published 2025-06-01
    “…They are presented as three main blocks: theoretical, practical and controlling. …”
    Get full text
    Article
  17. 2917

    Genotypic clustering of 51 soybean cultivars and wild forms using SSR-markers by Alena A. Ivaniy, Andrey A. Penzin, Olga N. Bondarenko, Anastasia A. Blinova, Alina E. Gretchenko, Lyubov E. Ivachenko, Pavel D. Timkin

    Published 2025-12-01
    “…The molecular genetic formulae of the studied samples were obtained, which can be further used to compile genetic passports. Based on the UPGMA algorithm, 51 soybean genotypes were grouped into 13 main clusters. …”
    Get full text
    Article
  18. 2918

    A review of approaches to assessment of potential radon hazard of land plots by A. S. Vasilyev, D. V. Kononenko, T. A. Kormanovskaya, K. A. Saprykin

    Published 2024-10-01
    “…The current regulatory requirements to radiation safety indicators of land plots for construction of residential, public and industrial buildings and facilities in the Russian Federation are analyzed. The main drawbacks of the algorithm for determining the potential radon hazard of land plots, used in the current guidelines MU 2.6.1.2398-08 approved at the federal level more than 15 years ago, are described. …”
    Get full text
    Article
  19. 2919

    A Study on Path Planning for Curved Surface UV Printing Robots Based on Reinforcement Learning by Jie Liu, Xianxin Lin, Chengqiang Huang, Zelong Cai, Zhenyong Liu, Minsheng Chen, Zhicong Li

    Published 2025-02-01
    “…Experimental results show that the proposed method outperforms traditional path planning methods, as well as Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). …”
    Get full text
    Article
  20. 2920

    Optimization of surgical treatment of abdominal hernias in patients with obesity by V. I. Belokonev, V. P. Zakharov, D. B. Grachev, S. Y. Pushkin, Z. V. Kovaleva, D. S. Pushkina

    Published 2021-06-01
    “…Indications for panniculus removal were based on the proposed mathematical algorithm, which took into account the size, clinical manifestations, associated complications, and possible consequences after surgeries while preserving it.Results. …”
    Get full text
    Article