Suggested Topics within your search.
Suggested Topics within your search.
-
2961
A novel multi-label classification algorithm based on -nearest neighbor and random walk
Published 2020-03-01“…The integration of the random walk approach in the multi-label classification methods attracts many researchers’ sight. One challenge of using the random walk-based multi-label classification algorithms is to construct a random walk graph for the multi-label classification algorithms, which may lead to poor classification quality and high algorithm complexity. …”
Get full text
Article -
2962
A Mathematical Survey of Image Deep Edge Detection Algorithms: From Convolution to Attention
Published 2025-07-01Get full text
Article -
2963
Design and Implementation of Mobile Experiment Algorithm Designer Interface for Network Control System Laboratory
Published 2025-01-01“…Thus, it may serve as an excellent educational tool for students and researchers providing on-the-go accessibility, flexibility and customization of experiment algorithm design for NCSLab resources. …”
Get full text
Article -
2964
An enhanced control solutions for efficient urban waste management using deep learning algorithms
Published 2024-09-01“… This study focuses on developing an efficient urban waste management system using deep learning algorithms and Internet of Things (IoT) technology. …”
Get full text
Article -
2965
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks. …”
Get full text
Article -
2966
An artificial intelligence technique: experimental analysis of population-based physarum-energy optimization algorithm
Published 2025-06-01“…Abstract The traveling salesman problem (TSP) is an NP-hard problem being studied by many researchers. Metaheuristic algorithms generally depend on nature-inspired phenomena successfully applied to combinatorial optimization, such as routing, scheduling, assignment problems, engineering, optimization, genetics, robotics, nanotechnology, and various fields. …”
Get full text
Article -
2967
Stacking modeling with genetic algorithm-based hyperparameter tuning for uniaxial compressive strength prediction
Published 2025-09-01“…Additionally, a hybrid stacking model that combines these algorithms was developed. Hyperparameter optimization was conducted using grid search and genetic algorithm. …”
Get full text
Article -
2968
YOLO-SAG: An improved wildlife object detection algorithm based on YOLOv8n
Published 2024-11-01“…This paper proposes a wildlife target detection algorithm based on improved YOLOv8n - YOLO-SAG, which aims to balance accuracy and speed. …”
Get full text
Article -
2969
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article -
2970
Investigation of technoeconomic optimization for sizing renewable energy systems using metaheuristic and hybrid algorithms
Published 2025-06-01“…This study focuses on optimizing grid-connected Hybrid Renewable Energy Systems (HRES) in Morocco using technoeconomic approaches, including metaheuristic algorithms such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Grey Wolf Optimization (GWO) and Artificial Bee Colony (ABC) and hybrid methods combining these latter with Modified Marquardt Gradient Descent (MGD). …”
Get full text
Article -
2971
Development of the algorithm for selecting a rational regular urban route for electric bus operation
Published 2021-09-01“…The article presents an analysis of researches on the operation of public transport vehicles with an electric drive. …”
Get full text
Article -
2972
PSLDV-Hop: a robust localization algorithm for WSN using PSO and refinement process
Published 2025-07-01“…By utilizing an improved iterative evolution algorithm, the PSLDV-Hop algorithm reduces localization errors by achieving a higher degree of accuracy in node localization. …”
Get full text
Article -
2973
Cutting-Edge Stochastic Approach: Efficient Monte Carlo Algorithms with Applications to Sensitivity Analysis
Published 2025-04-01“…By performing SA, we can better manage risks associated with uncertain inputs and make more informed decisions based on the model’s outputs. In recent years, researchers have developed advanced algorithms based on the analysis of variance (ANOVA) technique for computing numerical sensitivity indicators. …”
Get full text
Article -
2974
Secondary use of routinely collected administrative health data for epidemiologic research: Answering research questions using data collected for a different purpose
Published 2024-11-01“…The use of routinely collected administrative health data for research can provide unique insights to inform decision-making and, ultimately, support better public health outcomes. …”
Get full text
Article -
2975
Techno-Economic Analysis and Optimization of the Hybrid System for a Research Campus—Case Study Center for Research, Innovation, and Technology Transfer in Cuenca-Ecuador
Published 2025-05-01“…This study conducts a techno-economic analysis of a hybrid energy system that combines photovoltaic systems, wind turbines, hydrokinetic turbines, batteries, and fuel generators for the Center for Research, Innovation, and Technology Transfer of the Universidad Católica de Cuenca (UCACUE) in southern Ecuador. …”
Get full text
Article -
2976
An easy iris center detection method for eye gaze tracking system
Published 2015-10-01Get full text
Article -
2977
Optimizing energy forecasts at Boma for 2023 to 2053 Using machine learning techniques of the PSO algorithm
Published 2025-05-01“…This research was conducted to optimize energy consumption forecasting in the commune of Boma, in the Democratic Republic of Congo, in the face of persistent imbalances between energy production and demand. …”
Get full text
Article -
2978
-
2979
Solving the Traveling Salesman Problem Using a Modified Teaching-Learning Based Optimization Algorithm
Published 2025-06-01Get full text
Article -
2980
Increase Security of Li-Fi Technology by Using RSA Algorithm to Encryption and Decryption Important Data
Published 2024-12-01Get full text
Article