Showing 6,001 - 6,020 results of 12,475 for search '"algorithm"', query time: 0.08s Refine Results
  1. 6001

    Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment by Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan

    Published 2025-01-01
    “…Secondly, through a trust model based on a consensus algorithm of node reputation values and a registration-based inner-product encryption algorithm supporting fine-grained access control, zero-trust self-sovereign enhanced identity management in the 6G environment of the Internet of Things is achieved. …”
    Get full text
    Article
  2. 6002

    Cerebellar Volume Measures Differentiate Multiple Sclerosis Fallers from Non-Fallers by Taylor N. Takla, Jennie Feldpausch, Erin M. Edwards, Shuo Han, Peter A. Calabresi, Jerry Prince, Kathleen M. Zackowski, Nora E. Fritz

    Published 2025-01-01
    “…In this study, a recent parcellation algorithm was applied to a sample of PwMS and healthy controls to examine the relationships among specific cerebellar regions, fall status, and common clinical measures of motor and cognitive functions. …”
    Get full text
    Article
  3. 6003

    Accelerating AI-Based Battery Management System’s SOC and SOH on FPGA by Satyashil D. Nagarale, B. P. Patil

    Published 2023-01-01
    “…We utilized various gradient descent optimization algorithms with adaptive and constant learning rates with other default parameters. …”
    Get full text
    Article
  4. 6004

    Parametric study and optimization of thermal performance and pressure drop in heat sinks with double-layer porous microchannels by Fahimeh Aliyari, Keivan Fallah, Hossein Zolfaghary Azizi, Farhad Hosseinnejad

    Published 2025-03-01
    “…In the continuation of the research, the extracted parameters were used as inputs for optimization with a multi-objective genetic algorithm aimed at enhancing thermal performance and reducing pressure drop. …”
    Get full text
    Article
  5. 6005

    Automated skin melanoma diagnostics based on mathematical model of artificial convolutional neural network by D. A. Gavrilov, E. I. Zakirov, E. V. Gameeva, V. Yu. Semenov, O. Yu. Aleksandrova

    Published 2018-09-01
    “…In the last 10 years there has been a revolu on in the fi eld of computer image analysis and pa ern recogni on. Modern algorithms of computer vision equaled and even in some problems surpassed human capabili es. …”
    Get full text
    Article
  6. 6006

    Homeland security video surveillance system utilising the internet of video things for smart cities by Yasser Ismail, Mohamed Hammad, Mahmoud Darwich, Wael Elmedany

    Published 2021-07-01
    “…The performance of the proposed architecture has been calculated using subjective and quantitative measures techniques and compared to the full search block‐based motion estimation (FSBB‐ME) algorithm. Moreover, the proposed architecture achieves a very high video resolution accuracy that is similar to the accuracy of the FSBB‐ME algorithm. …”
    Get full text
    Article
  7. 6007

    Solar Irradiance Ramp Classification Using the IBEDI (Irradiance-Based Extreme Day Identification) Method by Llinet Benavides Cesar, Oscar Perpiñán-Lamigueiro

    Published 2025-01-01
    “…Our proposal includes an agglomerative algorithm to find new ramp class boundaries. The strength of the proposed method relies on that it allows its generalization to any dataset. …”
    Get full text
    Article
  8. 6008

    Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish by Nuniek Fahriani, Harunur Rosyid

    Published 2019-12-01
    “…The technique used to support encryption and decryption of video files is to apply the blowfish algorithm in its implementation. This algorithm has a variable security system. …”
    Get full text
    Article
  9. 6009
  10. 6010

    Applying YOLOv6 as an ensemble federated learning framework to classify breast cancer pathology images by Chhaya Gupta, Nasib Singh Gill, Preeti Gulia, Noha Alduaiji, J. Shreyas, Piyush Kumar Shukla

    Published 2025-01-01
    “…A new homomorphic encryption and decryption algorithm is also proposed to retain data privacy. …”
    Get full text
    Article
  11. 6011

    Preamble Arbitration Rule and Interference Suppression-Based Polling Medium Access Control for In-Vehicle Ultra-Wideband Networks by Makoto Okuhara, Nobuyuki Kurioka, Shigeki Mitoh, Patrick Finnerty, Chikara Ohta

    Published 2024-01-01
    “…To mitigate this problem, we developed an PARIS communication algorithm that is robust against interference. As identified in this study, PARIS leverages two key characteristics of UWB. …”
    Get full text
    Article
  12. 6012

    Fuzzy Logic Recommender Model for Housing by Emanuel G. Munoz, Jaime Meza, Sebastian Ventura

    Published 2025-01-01
    “…This algorithm selects the properties displayed to the user on the basis of natural features extracted from real estate platforms by means of web scraping techniques. …”
    Get full text
    Article
  13. 6013
  14. 6014

    Deteksi Gulma Berdasarkan Warna HSV dan Fitur Bentuk Menggunakan Jaringan Syaraf Tiruan by Hurriyatul Fitriyah, Rizal Maulana

    Published 2021-10-01
    “…Here in this research, we develop an algorithm that detects weeds among the plants based on the shape of their leaves. …”
    Get full text
    Article
  15. 6015

    Selective Ensemble Learning Method for Belief-Rule-Base Classification System Based on PAES by Wanling Liu, Weikun Wu, Yingming Wang, Yanggeng Fu, Yanqing Lin

    Published 2019-12-01
    “…Finally, the elite retention strategy and the adaptive mesh algorithm are adopted to produce the PAES optimal solution set. …”
    Get full text
    Article
  16. 6016

    Open Data Release and Privacy Concerns: Complexity in Mitigating Vulnerability with Controlled Perturbation by Shah Imran Alam, Ihtiram Raza Khan, Syed Imtiyaz Hassan, Farheen Siddiqui, M. Afshar Alam, Anil Kumar Mahto

    Published 2021-01-01
    “…K-anonymity algorithm was the foundation of many of its successor algorithms of all privacy-preserving algorithms. l-diversity claims to add another dimension of privacy protection. …”
    Get full text
    Article
  17. 6017

    An Optimization Coverage Strategy for Wireless Sensor Network Nodes Based on Path Loss and False Alarm Probability by Jianing Guo, Yunshan Sun, Ting Liu, Yanqin Li, Teng Fei

    Published 2025-01-01
    “…Based on this perception model, the optimization objective function of the WSN node optimization coverage problem is established, and then the intelligent optimization algorithm is used to solve the objective function and finally achieve the optimization coverage of sensor nodes. …”
    Get full text
    Article
  18. 6018

    Application of Video Processing Technology Based on Diffusion Equation Model in Basketball Analysis by Yafeng Feng, Xianguo Liu

    Published 2021-01-01
    “…In the study of basketball segmentation of close-up shots, we propose an improved Hough transform method based on a variable direction filter, which can effectively extract the center and radius of the basketball. The algorithm has good robustness to basketball partial occlusion and motion blur. …”
    Get full text
    Article
  19. 6019

    Optimizing ternary hybrid nanofluids using neural networks, gene expression programming, and multi-objective particle swarm optimization: a computational intelligence strategy by Tao Hai, Ali Basem, As’ad Alizadeh, Pradeep Kumar Singh, Husam Rajab, Chemseddine Maatki, Nidhal Becheikh, Lioua Kolsi, Narinderjit Singh Sawaran Singh, H. Maleki

    Published 2025-01-01
    “…Three machine learning techniques—GMDH-type neural network, gene expression programming, and combinatorial algorithm—are applied to model dynamic viscosity and thermal conductivity as functions of the input variables. …”
    Get full text
    Article
  20. 6020

    Modified Three-Dimensional Multicarrier Optical Prime Codes by Rajesh Yadav, Gurjit Kaur

    Published 2016-01-01
    “…We propose a mathematical model for novel three-dimensional multicarrier optical codes in terms of wavelength/time/space based on the prime sequence algorithm. The proposed model has been extensively simulated on MATLAB for prime numbers (P) to analyze the performance of code in terms of autocorrelation and cross-correlation. …”
    Get full text
    Article