Showing 13,501 - 13,520 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 13501

    Novel continuous identity authentication method based on mouse behavior by Cong YI, Jun HU

    Published 2022-10-01
    “…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
    Get full text
    Article
  2. 13502

    Optimization Model and Method of Variable Speed Limit for Urban Expressway by Shubin Li, Tao Wang, Hualing Ren, Baiying Shi, Xiangke Kong

    Published 2021-01-01
    “…The SPSA-based solution algorithm was proposed by taking into account the needs of real-time online applications. …”
    Get full text
    Article
  3. 13503

    PPCM: Combing Multiple Classifiers to Improve Protein-Protein Interaction Prediction by Jianzhuang Yao, Hong Guo, Xiaohan Yang

    Published 2015-01-01
    “…This study established a robust pipeline for PPI prediction by integrating multiple classifiers using Random Forests algorithm. This pipeline will be useful for predicting PPI in nonmodel species.…”
    Get full text
    Article
  4. 13504

    A Large-Scale Network Data Analysis via Sparse and Low Rank Reconstruction by Liang Fu Lu, Zheng-Hai Huang, Mohammed A. Ambusaidi, Kui-Xiang Gou

    Published 2014-01-01
    “…In addition, we present the iterative scheme of the algorithm for network anomaly detection problem, which is termed as NAD-APG. …”
    Get full text
    Article
  5. 13505

    Modern Methods of Urban Energy System Planning by Т. M. Bugaeva, O. V. Novikova

    Published 2019-08-01
    “…The article presents a possible algorithm of formation of the space-time profile of energy resources consumption. …”
    Get full text
    Article
  6. 13506

    Design of a water heating system for automatic coffee maker using OMRON CP1E-NA20DR-A PLC and PID control by Rosyady Phisca Aditya, Aditya Wahyu, Habibah Nurina Umy

    Published 2024-01-01
    “…The results of this study show that controlling water temperature using the PID algorithm with the Omron CP1E-NA20DR-A PLC can work well. …”
    Get full text
    Article
  7. 13507

    Impact of moving target on underwater positioning by using state measurement by Tippireddy Srinivasa Reddy, Rajeev Arya

    Published 2024-01-01
    “…A moving target state estimation (MTSE) algorithm is proposed to eliminate the false measurements from the moving targets and to measure the localization of moving targets with the help of the propagation speed of targets. …”
    Get full text
    Article
  8. 13508
  9. 13509

    Telefacturing Based Distributed Manufacturing Environment for Optimal Manufacturing Service by Enhancing the Interoperability in the Hubs by V. K. Manupati, M. Gokula Krishnan, M. L. R. Varela, José Machado

    Published 2017-01-01
    “…With an evolutionary algorithm and developed heuristic algorithm, the performance of the proposed manufacturing system has been improved. …”
    Get full text
    Article
  10. 13510

    Leveraging the Turnpike Effect for Mean Field Games Numerics by Rene A. Carmona, Claire Zeng

    Published 2024-01-01
    “…Recently, a deep-learning algorithm referred to as Deep Galerkin Method (DGM), has gained a lot of attention among those trying to solve numerically Mean Field Games with finite horizon, even if the performance seems to be decreasing significantly with increasing horizon. …”
    Get full text
    Article
  11. 13511

    Novel Heronian mean based $ m $-polar fuzzy power geometric aggregation operators and their application to urban transportation management by Ghous Ali, Kholood Alsager

    Published 2024-12-01
    “…Next, to validate the efficiency of the established algorithm, it was implemented in a daily-life MCDM problem involving urban transportation management. …”
    Get full text
    Article
  12. 13512

    Research on database watermarking based on Independent Component Analysis and multiple rolling by Zaihui Cao, Ge Shi, Qingtao Wu

    Published 2019-04-01
    “…The matrix is separated by the ratio Independent Component Analysis algorithm, and the watermark is used to separate the matrix. …”
    Get full text
    Article
  13. 13513

    Designing Landscape of Urban Gardening Based on Optimized Artificial Intelligence Model by Long Liu

    Published 2022-01-01
    “…The results show that the PSO-based landscape pattern spatial optimization model and algorithm can use particle position to simulate landscape distribution for spatial pattern optimization. …”
    Get full text
    Article
  14. 13514

    Empirical Data-Driven Linear Model of a Swimming Robot Using the Complex Delay-Embedding DMD Technique by Mostafa Sayahkarajy, Hartmut Witte

    Published 2025-01-01
    “…While the experimental results exhibited exotic curves in phase plane and time series, the analysis results showed that the proposed algorithm extracts linear and chaotic modes contributing to the data. …”
    Get full text
    Article
  15. 13515

    Meta's Challenge with Olives and Watermelon: The Case of Blocking Posts About Gaza by Nuran Kızmaz Öztürk

    Published 2024-12-01
    “…As a result, we will present examples of the efforts of social media users who are algorithmically censored, which we call symbolic subversion, to overcome this situation with symbols.…”
    Get full text
    Article
  16. 13516

    Anomaly detection in virtual machine logs against irrelevant attribute interference. by Hao Zhang, Yun Zhou, Huahu Xu, Jiangang Shi, Xinhua Lin, Yiqin Gao

    Published 2025-01-01
    “…Firstly, the log parsing algorithm is used to parse the logs. Then, the feature extraction algorithm, which combines Long Short-Term Memory and Autoencoder-Decoder, is applied to extract features. …”
    Get full text
    Article
  17. 13517

    Augmenting Energy Sustainability of Static Nodes Using Hybrid KGNN-AHP Driven Approach for IoT-Based Heterogeneous WSN by R. Blessina Preethi, M. Saranya Nair

    Published 2025-01-01
    “…The simulation results exhibit the enhancement of network lifetime and data transmission by following the proposed algorithm for static network.…”
    Get full text
    Article
  18. 13518

    External barycentric coordinates for arbitrary polygons and an approximate method for calculating them by Ivan S. Polyansky

    Published 2024-12-01
    “…The author of the article hopes that the detailed results of the algorithmic implementation of the calculation of external barycentric coordinates will arouse interest and make the publication material more accessible to a wide range of readers, which will lead to the development of the barycentric method in solving boundary and initial boundary value problems of mathematical physics.…”
    Get full text
    Article
  19. 13519

    Deep Learning-Enabled Variational Optimization Method for Image Dehazing in Maritime Intelligent Transportation Systems by Xianjun Hu, Jing Wang, Chunlei Zhang, Yishuo Tong

    Published 2021-01-01
    “…The resulting constrained minimization model is solved using a two-step optimization algorithm. To further enhance dehazing performance, the solutions of subproblems obtained in this optimization algorithm are equivalent to deep learning-based image denoising. …”
    Get full text
    Article
  20. 13520

    Rough-Set-Based Real-Time Interest Label Extraction over Large-Scale Social Networks by Xiaoling Huang, Lei Li, Hao Wang, Chengxiang Hu, Xiaohan Xu, Changlin Wu

    Published 2022-01-01
    “…Specifically, we first propose the subgraph division algorithm to construct a subgraph stream by incorporating a rough set. …”
    Get full text
    Article