-
401
Quasiparticle Cooling Algorithms for Quantum Many-Body State Preparation
Published 2025-03-01“…In this work, we develop a kinetic-theory framework to describe quasiparticle cooling dynamics, and employ it to compare the efficiency of different cooling algorithms. In particular, we introduce a protocol where coupling to auxiliaries is modulated in time to minimize heating processes, and demonstrate that it allows a high-fidelity preparation of ground states in different quantum phases. …”
Get full text
Article -
402
Overcoming Data Scarcity in Calibrating SUMO Scenarios With Evolutionary Algorithms
Published 2025-07-01Get full text
Article -
403
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…Experimental results demonstrate that the generated benchmarks more closely resemble the complexity of real software, effectively exposing biases and deficiencies in vulnerability detection tools across different code paths. This study validates the algorithm’s effectiveness and practical utility, confirming that it provides a more comprehensive and realistic benchmark for evaluating vulnerability detection tools.…”
Get full text
Article -
404
Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification
Published 2025-08-01“…According to this evaluation, the best-performing equation from each algorithm was selected as the optimum and further evaluated using both graphical and statistical analyses, including comparisons with conventional empirical relationships. …”
Get full text
Article -
405
Realization and discussion of selected artificial intelligence algorithms in computer games
Published 2025-03-01“…The aim is to evaluate the efficiency and learning ability across different scenarios, such as Blackjack and Poker Limit Hold'em. …”
Get full text
Article -
406
Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement
Published 2022-06-01“…Therefore, it is difficult to perceive, extract, and analyze important visual information from these images, unless they were properly processed. Different algorithms exist to process nighttime images, yet most of these algorithms are highly complex, generate processing artifacts, over-smooth the images, or do not improve the illumination adequately. …”
Get full text
Article -
407
A Reliable Application of MPC for Securing the Tri-Training Algorithm
Published 2023-01-01“…The simulation results show that tri-training in secure MPC has almost same accuracy compared to original tri-training algorithm. We also compare execution time in addition to performance evaluation of tri-training in secure and the original tri-training algorithms.…”
Get full text
Article -
408
Identification of maize kernel varieties based on interpretable ensemble algorithms
Published 2025-02-01“…The base learner of the Stacking integration model was selected using diversity and performance indices, with parameters optimized through a differential evolution algorithm incorporating multiple mutation strategies and dynamic adjustment of mutation factors and recombination rates. …”
Get full text
Article -
409
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…This algorithm has been successfully applied in different combinatorial problems. …”
Get full text
Article -
410
Enhancing breast cancer diagnosis through machine learning algorithms
Published 2025-07-01“…In this research has done extensive algorithm evaluation like SVM, DT, RF, Logistic regression, KNN and ANN using datasets CDP Breast Cancer. …”
Get full text
Article -
411
Human activity recognition algorithms for manual material handling activities
Published 2025-03-01“…HAR using IMUs can aid both the ergonomic evaluation of the performed activities and, more recently, with the development of exoskeleton technologies, can assist with the selection of precisely tailored assisting strategies. …”
Get full text
Article -
412
Fault Diagnosis of Power Equipment Based on Improved SVM Algorithm
Published 2025-07-01“…Therefore, this study proposes an improved support vector machine model, combined with grey wolf optimization algorithm, aimed at improving the accuracy and efficiency of power equipment fault diagnosis. …”
Get full text
Article -
413
A lightweight 256 hexadecimal character substitution Cipher algorithm
Published 2025-07-01“…The aim of this study was achieved by the following objectives; a design of the HCSC algorithm, an implementation of the proposed HCSC algorithm using python programming language and the evaluation of its performance in comparison with existing study. …”
Get full text
Article -
414
A Review of Smart Grid Evolution and Reinforcement Learning: Applications, Challenges and Future Directions
Published 2025-04-01Get full text
Article -
415
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. …”
Get full text
Article -
416
SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm
Published 2012-02-01“…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
Get full text
Article -
417
RLS-Based Control Algorithms for 3D Zones of Quiet
Published 2008-12-01“…Finally, the efficiency of ANC systems using different control structures and RLS-based control algorithms is compared.…”
Get full text
Article -
418
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
419
Improved Image Compression Scheme Using Hybrid Encoding Algorithm
Published 2019-10-01“…The performance of the proposed scheme is evaluated by using different metrics such as (PSNR, compression ratio and encoding time). …”
Get full text
Article -
420
Topology of Complex Networks and Performance Limitations of Community Detection Algorithms
Published 2017-01-01“…In this paper, we attempt to highlight this problem by studying networks with different topologies and evaluate the performance of community detection algorithms in the light of these topological changes. …”
Get full text
Article