Showing 5,401 - 5,420 results of 5,881 for search '(differential OR different) (evolution OR evaluation) algorithm', query time: 0.28s Refine Results
  1. 5401

    Impact of Hypoglycemia on Glucose Variability over Time for Individuals with Open-Source Automated Insulin Delivery Systems by Arsalan Shahid, Dana M. Lewis

    Published 2024-10-01
    “…The experimental results are further validated on T1DEXI data (n = 222), originating from commercial AID systems. Different hypoglycemia categorization approaches did not show significant differences in glycemic variability outcomes. …”
    Get full text
    Article
  2. 5402

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  3. 5403

    Debris Flow Susceptibility Prediction Using Transfer Learning: A Case Study in Western Sichuan, China by Tiezhu Li, Qidi Huang, Qigang Chen

    Published 2025-07-01
    “…In this study, debris flow susceptibility models were developed using three machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), and Extreme Gradient Boosting (XGBoost). …”
    Get full text
    Article
  4. 5404

    Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM. by Sadia Nazim, Muhammad Mansoor Alam, Syed Safdar Rizvi, Jawahir Che Mustapha, Syed Shujaa Hussain, Mazliham Mohd Suud

    Published 2025-01-01
    “…Nowadays, AI is significantly employed for evaluations in cybersecurity that find it challenging to justify their proceedings; this absence of accountability is alarming. …”
    Get full text
    Article
  5. 5405

    Inversion model of stress state reconstruction for geological hazard pipelines based on digital twin by Xue Luning, Tian Mingliang, Zhao Juncheng

    Published 2025-07-01
    “…The results indicate that the research model has high prediction accuracy and efficiency and can effectively handle the problem of predicting pipeline stress states under different geological disasters, providing a reliable method for evaluating pipeline stress states in geological disasters.…”
    Get full text
    Article
  6. 5406

    Deep-Learning-Based Solar Flare Prediction Model: The Influence of the Magnetic Field Height by Lei Hu, Zhongqin Chen, Long Xu, Xin Huang

    Published 2025-04-01
    “…This paper investigates how different magnetic field heights affect solar flare prediction performance. …”
    Get full text
    Article
  7. 5407

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
    Get full text
    Article
  8. 5408

    Optimizing Semantic-Aware Video Compression Using Particle Swarm Optimization Technique for Automotive Applications by Vadivel Shanmugam, B. Uma Maheswari

    Published 2025-01-01
    “…This popular and fast-developing technology aims to increase vehicle safety through various sensors and advanced-level Artificial Intelligence (AI)- based algorithms. The camera is one of the vital components of AM systems, which captures real-time videos, processes, encodes, packetizes and transfers them to different processing units for further applications. …”
    Get full text
    Article
  9. 5409

    Human-in-the-loop control strategy for IoT-based smart thermostats with Deep Reinforcement Learning by Payam Fatehi Karjou, Fabian Stupperich, Phillip Stoffel, Drk Müller

    Published 2025-05-01
    “…The study explores the challenges of transferring control behaviors from simulation environments to real-world settings, examining the performance across different thermal zones and evaluating the integration flexibility of the control strategy within building systems. …”
    Get full text
    Article
  10. 5410

    Development of Cyber Security Platform for Experiential Learning by Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

    Published 2024-06-01
    “…The present research proposes a comprehensive web-based platform that can be used to communicate, collaborate and practice various use cases in the domain of network intrusion detection tools using machine learning algorithms and to evaluate user experience. The proposed platform CySecLearn is a collection of various functionalities and features that ensures experiential learning, will help the learner to develop critical thinking and expertise in network security and promote digital literacy in the domain of cyber security.…”
    Get full text
    Article
  11. 5411

    MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion by Bibhudendra Acharya, Javvadi Venkata Sravan, Durga Ram Janaki Potnuru, K. Abhimanyu Kumar Patro

    Published 2025-01-01
    “…Due to the advancement of computing technologies and the Internet of Things, there has been a notable rise in image data in different sectors. Having safety mechanisms in place is crucial to protect image data from unauthorised access. …”
    Get full text
    Article
  12. 5412

    Identification of reference genes for RT-qPCR in the Antarctic moss Sanionia uncinata under abiotic stress conditions. by Mira Park, Soon Gyu Hong, Hyun Park, Byeong-Ha Lee, Hyoungseok Lee

    Published 2018-01-01
    “…In this report, 11 traditionally used and 6 novel candidate reference genes were selected from transcriptome data of S. uncinata and the expression stability of these genes was evaluated under various abiotic stress conditions using three statistical algorithms; geNorm, NormFinder, and BestKeeper. …”
    Get full text
    Article
  13. 5413

    State of Charge Estimation in Li-Ion Batteries Using a Parallel LSTM-Based Approach: The Impact of Modeling Based on Operating States by Osman Ozer, Hayri Arabaci

    Published 2025-01-01
    “…To address this, deep learning algorithms such as long short-term memory (LSTM) have been focused on for SOC prediction. …”
    Get full text
    Article
  14. 5414

    Research on recycling value grading and real-time perception of rock debris from TBM tunneling by Weiqi Yue, Weilin Su, Zhanfei Gu, Xiao Qu

    Published 2025-04-01
    “…Leveraging a comprehensive database that encompasses both tunnel rock debris performance indicators and TBM tunneling parameters, perception models are constructed using different machine learning algorithms. After Bayesian hyperparameter optimization, the perception models based on CART, SVM, KNN, and ANN demonstrate accuracies of 67.5%, 80.0%, 82.5%, and 83.8% respectively. …”
    Get full text
    Article
  15. 5415

    Challenges of Water Resources Governance under the Impact of Climate Change and Water Transfer by Atabak Jaffari, Ahmad Sharafati, Amin reza Neshat, Seyed abbas Hosseini

    Published 2025-06-01
    “…Research Topic: The water resources management approach should be based on a water governance framework in different dimensions for optimal allocation in terms of time and space with a view to future conditions. …”
    Get full text
    Article
  16. 5416

    Joint User Association and Resource Allocation for Hierarchical Federated Learning Based on Games in Satisfaction Form by Panagiotis Charatsaris, Maria Diamanti, Symeon Papavassiliou

    Published 2024-01-01
    “…Algorithms based on Reinforcement Learning (RL) and Best Response Dynamics (BRD) are, then, devised to conclude the SE and MESE points. …”
    Get full text
    Article
  17. 5417

    A Federated Learning-Based Framework for Accurately Identifying Human Activity in the Environment by Nwadher Suliman Al-Blihed, Dina M. Ibrahim

    Published 2025-01-01
    “…Analysis of the data generated by HAR devices may involve deep learning models and algorithms of different kinds. These data are personal and may include some sensitive data. …”
    Get full text
    Article
  18. 5418

    A comprehensive approach to Queue Waiting Time Prediction using Tree-Based Ensembles with Data Balancing and Explainable AI by Tapodhir Karmakar Taton, Bipin Saha, Md. Johirul Islam, Shaikh Khaled Mostaque

    Published 2025-07-01
    “…Principal Component Analysis (PCA), t-distributed Stochastic Neighbor Embedding (t-SNE), and Autoencoders have been evaluated to compare the effectiveness of different dimensionality reduction techniques. …”
    Get full text
    Article
  19. 5419

    Rethinking Technological Investment and Cost-Benefit: A Software Requirements Dependency Extraction Case Study by Gouri Ginde, Guenther Ruhe, Chad Saunders

    Published 2025-01-01
    “…Machine Learning (ML) is widely used for different purposes within Software Engineering. It can substantially improve the efficiency and effectiveness of organizations. …”
    Get full text
    Article
  20. 5420

    AI-Driven Optimization of Breakwater Design: Predicting Wave Reflection and Structural Dimensions by Mohammed Loukili, Soufiane El Moumni, Kamila Kotrasova

    Published 2025-01-01
    “…Two datasets of 32,000 data points were generated for underwater and free-surface breakwaters, with an additional 10,000 data points for validation, totaling 42,000 data points per case. Five ML algorithms—Random Forest, Support Vector Regression, Artificial Neural Network, Decision Tree, and Gaussian Process—were applied and evaluated. …”
    Get full text
    Article