Showing 22,081 - 22,100 results of 25,328 for search 'research algorithm', query time: 0.22s Refine Results
  1. 22081
  2. 22082
  3. 22083
  4. 22084

    A comparison of several intrusion detection methods using the NSL-KDD dataset by hazem salim abdullah

    Published 2024-06-01
    “… The increasing significance of cybersecurity underscores the critical necessity of addressing evolving methods of hackers. This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. …”
    Get full text
    Article
  5. 22085

    Artificial Intelligence in Social Media by Azwar M.Q. Agha

    Published 2025-04-01
    “…In addition, the review discusses ethical concerns, including data privacy, algorithmic bias, and the potential for misinformation dissemination. …”
    Get full text
    Article
  6. 22086

    Assessing Similarity Between Datasets Using Vector Representations by А. А. Usatoff, A. M. Nedzved, Guo Jiran

    Published 2025-07-01
    “…The article considers an approach to determining the similarity of datasets for training algorithms using datasets with human faces as an example. …”
    Get full text
    Article
  7. 22087
  8. 22088

    APPLICATION OF REAL-TIME DICTIONARY INSTEAD OF FULL-TEXT INDEX FOR SEARCHING IN WEB PUBLICATIONS by P. Milev

    Published 2019-10-01
    “…In these cases, full-text indexes are mostly used for the implementation of algorithms for searching in the content of web publications. …”
    Get full text
    Article
  9. 22089
  10. 22090
  11. 22091

    A Novel Homogenous Hybridization Scheme for Performance Improvement of Support Vector Machines Regression in Reservoir Characterization by Kabiru O. Akande, Taoreed O. Owolabi, Sunday O. Olatunji, AbdulAzeez Abdulraheem

    Published 2016-01-01
    “…Hybrid computational intelligence is defined as a combination of multiple intelligent algorithms such that the resulting model has superior performance to the individual algorithms. …”
    Get full text
    Article
  12. 22092

    Enhancing stock index prediction: A hybrid LSTM-PSO model for improved forecasting accuracy. by Xiaohua Zeng, Changzhou Liang, Qian Yang, Fei Wang, Jieping Cai

    Published 2025-01-01
    “…Comparative analysis with seven other machine learning algorithms confirms the superior performance of PSO-LSTM. …”
    Get full text
    Article
  13. 22093

    Dependable identity recognition and authorization based on visual information by Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI

    Published 2020-11-01
    “…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
    Get full text
    Article
  14. 22094

    A Method of Kill Chains Fusion Based on Granulated Rules and Matrix Computation by Haijun Ye, Wei Gao

    Published 2024-01-01
    “…Then, the matrix computing formed the algorithmic foundation matrix of kill chains through granulation rules involving intermediate and target transformations. …”
    Get full text
    Article
  15. 22095
  16. 22096

    Overbounding of Near Real-Time Estimated Ionospheric Gradient Slope in Low-Latitude Regions by Maria Caamano, Jose Miguel Juan, Jaume Sanz, Sam Pullen

    Published 2025-03-01
    “…To solve these issues, previous research has introduced a methodology for real-time detection and estimation of ionospheric gradients using a network of dual-frequency, multi-constellation global navigation satellite system monitoring stations. …”
    Get full text
    Article
  17. 22097

    Interpretability Study on the Fault Diagnosis Model of the Heat pipe/ Vapor Compression Composite Air Conditioning System by ZHANG Yiqi, HUANG Shuoquan, LI Xiuming, DI Yanqiang, SONG Mengjie, HAN Zongwei

    Published 2025-01-01
    “…This study develops a composite fault diagnosis model based on typical machine learning algorithms, compares the diagnostic performance of different models, and finally conducts interpretability research on the diagnostic models using the SHAP method. …”
    Get full text
    Article
  18. 22098

    Clustering Methods Application for Customer Segmentation to Manage Advertisement Campaign by Maciej Kutera, Mirosława Lasek

    Published 2010-10-01
    “…Clustering methods are recently so advanced elaborated algorithms for large collection data analysis that they have been already included today to data mining methods. …”
    Get full text
    Article
  19. 22099

    A review of dynamic scene reconstruction based on neural representation by LU Ping, SUN Junjie, LI Wan, LIN Jiaxin, LIU Hong, LIU Hong, FENG Daquan

    Published 2025-06-01
    “…Dynamic scene reconstruction holds significant research value in the fields of computer vision and virtual reality. …”
    Get full text
    Article
  20. 22100

    An Efficient Biobjective Heuristic for Scheduling Workflows on Heterogeneous DVS-Enabled Processors by Pengji Zhou, Wei Zheng

    Published 2014-01-01
    “…In the context of scheduling, there have been increasing research interests on algorithms using dynamic voltage scaling (DVS), which allows processors to operate at lower voltage supply levels at the expense of sacrificing processing speed, to acquire a satisfactory trade-off between quality of schedule and energy consumption. …”
    Get full text
    Article