Showing 2,301 - 2,320 results of 2,680 for search 'reaching algorithms', query time: 0.11s Refine Results
  1. 2301

    A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data by Zana Thalage Omar, Fadhil Salman Abed, Shaimaa Khamees Ahmed

    Published 2021-01-01
    “…The security of the new system depends on the issue of analyzing huge integers, which reach 2048 bits, to their prime factors, which are considered almost impossible or unsolvable. …”
    Get full text
    Article
  2. 2302

    Object-to-Manipulation Graph for Affordance Navigation by Xinhang Song, Bohan Wang, Liye Dong, Gongwei Chen, Xinyun Hu, Shuqiang Jiang

    Published 2024-05-01
    “…Object navigation, whose goal is to let the agent to reach some places (or objects), has been a popular topic in embodied Artificial Intelligence (AI) researches. …”
    Get full text
    Article
  3. 2303

    Influence of soil parameters on dynamic compaction: numerical analysis and predictive modeling using GA-optimized BP neural networks by Yu Zhang, Xueshui Chen, Huakang Ge, Zhigang Guo, Xu Li

    Published 2025-07-01
    “…In order to improve the prediction accuracy, this paper introduces genetic algorithm (GA) to optimize the BP neural network model, constructs a multi-factor dynamic compaction prediction model, and compares it with the traditional BP model. …”
    Get full text
    Article
  4. 2304

    A high-precision 1 × 15 infrared temperature measurement linear array based on thermopile sensors by Jindong Bai, Wenhang Yang, Shouzheng Zhu, Haijun Jin, Yuchen Zhang, Ke Jin, Xiaoshuai Liu, Chunlai Li, Jianyu Wang, Hongxing Qi, Shijie Liu

    Published 2025-07-01
    “…On the FPGA control board, a multiparameter temperature compensation algorithm is used to address intrinsic temperature differences and consistency errors among the sensors. …”
    Get full text
    Article
  5. 2305

    A Fault Diagnosis Model of an Electric Submersible Pump Based on Mechanism Knowledge by Faming Gong, Siyuan Tong, Chengze Du, Zhenghao Wan, Shiyu Qiu

    Published 2025-04-01
    “…The research presented in this paper has reached a high level in the field of ESP well fault diagnosis.…”
    Get full text
    Article
  6. 2306

    Trajectory-Based Optimal Area Forwarding for Infrastructure-to-Vehicle Data Delivery with Partial Deployment of Stationary Nodes by Liang-Yin Chen, Song-Tao Fu, Jing-Yu Zhang, Xun Zou, Yan Liu, Feng Yin

    Published 2013-04-01
    “…The addition of a new node continues until the packet reaches the optimal area and infrastructure-to-vehicle communication is achieved. …”
    Get full text
    Article
  7. 2307

    Smart Water Level Indicator with Dry Protection Based on Ultrasonic Sensor Water indicator, Dry protection, Ultrasonic by Sarah Altufaily, Mohammed Kareem Mohammed, Samah Kareem Mohammed, Hussein Ahmed

    Published 2024-12-01
    “…The relay switch attached to this system will automatically turn on and off when the water level exceeds the preset algorithmic value, which is then displayed on the LCD screen. …”
    Get full text
    Article
  8. 2308

    Navel Orange Maturity Classification by Multispectral Indexes Based on Hyperspectral Diffuse Transmittance Imaging by Xuan Wei, Jin-Cheng He, Da-Peng Ye, Deng-Fei Jie

    Published 2017-01-01
    “…Different indexes were used as the input of linear discriminate analysis (LDA) and of k-nearest neighbor (k-NN) algorithm to identify the maturity, and it was found that k-NN with (T670+T760-T640)/(T670+T760+T640) could reach the highest correct classification rate of 96.0%. …”
    Get full text
    Article
  9. 2309

    POS Tagging Bahasa Madura dengan Menggunakan Algoritma Brill Tagger by Nindian Puspa Dewi, Ubaidi Ubaidi

    Published 2020-12-01
    “…The experimental results with Brill Tagger show that the average accuracy without OOV (Out Of Vocabulary) obtained is 86.6% with the highest accuracy of 86.94% and the average accuracy for OOV words reached 67.22%. So it can be concluded that the Brill Tagger Algorithm can also be used for Bahasa Madura with a good degree of accuracy. …”
    Get full text
    Article
  10. 2310

    Penerapan Metode Association Rule Mining untuk Asosiasi Ulasan Terhadap Aspek Tempat Wisata Jawa Timur Park 3 by Aisyatul Maulidah, Fitra A. Bachtiar

    Published 2021-10-01
    “…This technique is most popular for finding hidden relationships between variables. The algorithm used in this study is apriori algorithm because it is the most efficient. …”
    Get full text
    Article
  11. 2311

    Optimizing miRNA-module diagnostic biomarkers of gastric carcinoma via integrated network analysis. by Fengbin Zhang, Wenjuan Xu, Jun Liu, Xiaoyan Liu, Bingjie Huo, Bing Li, Zhong Wang

    Published 2018-01-01
    “…The NetSVM-based sub-network consisting of the top 20 hub miRNAs reached a high sensitivity and specificity of 0.94 and 0.82. …”
    Get full text
    Article
  12. 2312

    Automatic mosaic method of remote sensing images based on machine vision by S.P. Gao, M. Xia, S.J. Zhang

    Published 2024-10-01
    “…The experimental verification results of the final SIFT-NCC-LSD show that the matching accuracy for remote sensing images with different characteristics can reach over 95 %. Therefore, SIFT-NCC-LSD has good applicability.…”
    Get full text
    Article
  13. 2313

    Innovations in European Smart Transportation using Geospatial Information System by P. J. Gandam, U. Kose, M. R. Delavar, M. Iyyanki, J. Blachowski

    Published 2025-07-01
    “…The Dijkstra’s algorithm is best suited for this routing model. This study revolves around multimodal transport planning within smart cities for smart traffic flow for smart living. …”
    Get full text
    Article
  14. 2314

    Bytecode-based approach for Ethereum smart contract classification by Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG

    Published 2022-10-01
    “…In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, various security issues occur frequently.On the one hand, the code security problems of contract developers when writing contracts, on the other hand, there are many high-risk smart contracts in Ethereum, and ordinary users are easily attracted by the high returns provided by high-risk contracts, but they have no way to know the risks of the contracts.However, the research on smart contract security mainly focuses on code security, and there is relatively little research on the identification of contract functions.If the smart contract function can be accurately classified, it will help people better understand the behavior of smart contracts, while ensuring the ecological security of smart contracts and reducing or recovering user losses.Existing smart contract classification methods often rely on the analysis of the source code of smart contracts, but contracts released on Ethereum only mandate the deployment of bytecode, and only a very small number of contracts publish their source code.Therefore, an Ethereum smart contract classification method based on bytecode was proposed.Collect the Ethereum smart contract bytecode and the corresponding category label, and then extract the opcode frequency characteristics and control flow graph characteristics.The characteristic importance is analyzed experimentally to obtain the appropriate graph vector dimension and optimal classification model, and finally the multi-classification task of smart contract in five categories of exchange, finance, gambling, game and high risk is experimentally verified, and the F1 score of the XGBoost classifier reaches 0.913 8.Experimental results show that the algorithm can better complete the classification task of Ethereum smart contracts, and can be applied to the prediction of smart contract categories in reality.…”
    Get full text
    Article
  15. 2315

    Enhanced Artificial Rabbit Optimization with attention-based deep learning for leukemia cancer classification by Sabita Rani Behera, Bibudhendu Pati, Devee Sivaprasad Dulam

    Published 2025-08-01
    “…In the presented EAROADL-LCC technique, the attention-based EfficientNet model is used to extract the relevant features from the input images. Then the EARO algorithm is designed by using the Levy flight (LF) model for hyperparameter tuning. …”
    Get full text
    Article
  16. 2316

    Learning behavior analysis and personalized recommendation system of online education platform based on machine learning by Feng Ma

    Published 2025-06-01
    “…For example, the accuracy rate reached more than 70 % in predicting learners' preference for specific course types. …”
    Get full text
    Article
  17. 2317

    Big Data Analysis Using Apache Spark MLlib and Hadoop HDFS with Scala and Java by Hoger Khayrolla Omar, Alaa Khalil Jumaa

    Published 2019-05-01
    “…However, loading the datasets from Hadoop HDFS as well as to the local disk to identify the pros and cons of each manner and discovering perfect reading or loading dataset situation to reach best execution style. The results showed that the performance of Scala about 10% to 20% is better than Java depending on the algorithm type. …”
    Get full text
    Article
  18. 2318

    A Memory Hierarchy Model Based on Data Reuse for Full-Search Motion Estimation on High-Definition Digital Videos by Alba Sandyra Bezerra Lopes, Ivan Saraiva Silva, Luciano Volcan Agostini

    Published 2012-01-01
    “…The results show that it is possible to reach 38 frames per second when processing full HD frames (1920×1080 pixels) using nearly 299 Mbytes per second of external memory bandwidth.…”
    Get full text
    Article
  19. 2319

    Classification of Review Text using Hybrid Convolutional Neural Network and Gated Recurrent Unit Methods by Fiqih Fathor Rachim, Auli Damayanti, Edi Winarko

    Published 2022-10-01
    “…The optimal weight is obtained when the error value in the training is less than the expected minimum error or the training iteration has reached the specified maximum iteration. Optimal weight is used for validation test on test data. …”
    Get full text
    Article
  20. 2320

    A speed optimization model for connected and autonomous vehicles at expressway tunnel entrance under mixed traffic environment. by Jianrong Cai, Yang Liu, Zhixue Li

    Published 2024-01-01
    “…Firstly, a CAV speed optimization model is established based on a shooting heuristic algorithm. The model targets the minimization of the weighted sum of the speed difference between adjacent vehicles and the time taken to reach the tunnel entrance. …”
    Get full text
    Article