-
101
APPLICATION OF ADASYN OVERSAMPLING TECHNIQUE ON K-NEAREST NEIGHBOR ALGORITHM
Published 2024-07-01“…The K-Nearest Neighbor Algorithm is a commonly used data mining algorithm for classification due to its effectiveness with large datasets and noise. …”
Get full text
Article -
102
An algorithm for automatic fitting and formula assignment in atmospheric mass spectra
Published 2025-04-01“…This manual peak fitting and identification may take even experienced analysts anywhere from weeks to months to complete, depending on the desired accuracy and completeness.…”
Get full text
Article -
103
A guideline for understanding and measuring algorithmic governance in everyday life
Published 2019-06-01“…Vague concepts of algorithmic governance and the lack of comprehensive empirical insights into this kind of institutional steering by software from a user perspective may, however, lead to unrealistic risk assessments and premature policy conclusions. …”
Get full text
Article -
104
Method of automated construction of pattern recognition algorithms on phase paths
Published 2009-12-01“…The training of the algorithm could be done on an incompletely defined training set.…”
Get full text
Article -
105
Resource Management in Satellite Communication Systems: Heuristic Schemes and Algorithms
Published 2012-01-01“…The high cost of frequency bandwidth in satellite communication emphasizes the need for good algorithms to cope with the resource allocation problem. …”
Get full text
Article -
106
Negative feedback scheduling algorithm based on historical information in SDN
Published 2018-06-01“…In the current SDN architecture,the controllers suffer from lots of potential attacks.For example,malicious flow rule attacks may introduce fake flow rules to confuse the host.A negative feedback scheduling algorithm based on historical information was proposed,in which hypothesis testing was used to judge the behavior of the attacker and the result will be used as a basis for scheduling.Simulation results and analysis show that,compared with the traditional scheduling methods,the proposed algorithm can increase the attacker’s time cost to a certain extent,so as to effectively defend the attacker’s probe attack.In addition,the more types of controllers,the more difficult it is to break the system.…”
Get full text
Article -
107
Novel algorithm of maintaining packet order in two-stage switch
Published 2005-01-01“…However, in its basic fabric, the load-balanced switch may mis-sequence the packets. A new algorithm called FFS (full frame stuff) was proposed in this paper, which maintains packet order in the two-stage load-balanced switch and has excellent switching performance (in terms of mean delay and throughput).This algorithm is distributed and each port operates independently.…”
Get full text
Article -
108
Symbolic algorithm for solving SLAEs with multi-diagonal coefficient matrices
Published 2025-06-01“…The algorithm is given in a pseudocode. A theorem which gives the condition for correctness of the algorithm is formulated and proven. …”
Get full text
Article -
109
Analysis of algorithms of interference coding and improving the efficiency in the complex systems
Published 2022-09-01Get full text
Article -
110
A survey of sequence-to-graph mapping algorithms in the pangenome era
Published 2025-05-01“…Numerous sequence-to-graph mapping algorithms have been developed over the past few years. …”
Get full text
Article -
111
A Source Aware Scheduling Algorithm for Time-Optimal Convergecast
Published 2014-06-01“…Delaying of process data may degrade the overall control performance and even lead to the malfunction of industrial applications. …”
Get full text
Article -
112
Algorithm for Reducing the Number of Forwarding Rules Created by SDN Applications
Published 2019-03-01“…We introduce a heuristic algorithm that creates a reduced representation for sets of rules installed in the network. …”
Get full text
Article -
113
Performance Analysis of Machine Learning Algorithms in Intrusion Detection Systems
Published 2021-12-01“…Consequently, it has been reached that the KNN algorithm had the best performance with an accuracy rate of 98.1237 %. …”
Get full text
Article -
114
An Algorithm to Develop a Satellite‐Based Atmospheric River Database
Published 2025-03-01“…This algorithm is first validated by atmospheric reanalyses with high correlations of IVT and is then applied to satellite observations for real‐world IVT reconstruction. …”
Get full text
Article -
115
A Prospective Study on Algorithms Adapted to the Spatial Frequency in Tomography
Published 2006-01-01“…Though the use of such an FA algorithm may seem difficult, we specify in which case it is relevant and propose several ways to improve the reconstruction process with FA algorithms.…”
Get full text
Article -
116
Metaheuristic Algorithms to Determine PID Controller Parameters for Mobile Robots
Published 2025-05-01Get full text
Article -
117
An Optimal Algorithm for Renewable Energy Generation Based on Neural Network
Published 2022-01-01“…The results show that the proposed algorithm has technological applications and may greatly improve prediction accuracy.…”
Get full text
Article -
118
Applying Genetic Algorithm for test pattern generation process optimization
Published 2024-04-01“…Validating IC’s compliance to the functional requirements list may take up to 70% of the design process duration. …”
Get full text
Article -
119
Robust Interval-Based Localization Algorithms for Mobile Sensor Networks
Published 2011-11-01“…This paper proposes two algorithms robust to outliers. These algorithms perform a set-membership estimation, where only the maximal number of outliers is required to be known. …”
Get full text
Article -
120
Empowering Musical Creation through Machines, Algorithms, and Artificial Intelligence
Published 2019-07-01“…I then explore the transformation of my own creative process through the introduction of software capable of playing back music in exact accord with the inputs provided to it, while enabling the creation of music that remains intriguing to the human ear even though the performance of it may sometimes be beyond the ability of humans. Subsequently, I describe my forays into music generated by earlier algorithmic systems such as the Musikalisches Würfelspiel and narrow artificial-intelligence programs such as WolframTones and my development of variations upon artificially generated themes in essential collaboration with the systems that created them. …”
Get full text
Article