-
661
Flavivirus and Filovirus EvoPrinters: New alignment tools for the comparative analysis of viral evolution.
Published 2017-06-01Get full text
Article -
662
A Reliable Application of MPC for Securing the Tri-Training Algorithm
Published 2023-01-01“…The simulation results show that tri-training in secure MPC has almost same accuracy compared to original tri-training algorithm. We also compare execution time in addition to performance evaluation of tri-training in secure and the original tri-training algorithms.…”
Get full text
Article -
663
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…This algorithm has been successfully applied in different combinatorial problems. …”
Get full text
Article -
664
Enhancing breast cancer diagnosis through machine learning algorithms
Published 2025-07-01“…In this research has done extensive algorithm evaluation like SVM, DT, RF, Logistic regression, KNN and ANN using datasets CDP Breast Cancer. …”
Get full text
Article -
665
Human activity recognition algorithms for manual material handling activities
Published 2025-03-01“…HAR using IMUs can aid both the ergonomic evaluation of the performed activities and, more recently, with the development of exoskeleton technologies, can assist with the selection of precisely tailored assisting strategies. …”
Get full text
Article -
666
Fault Diagnosis of Power Equipment Based on Improved SVM Algorithm
Published 2025-07-01“…Therefore, this study proposes an improved support vector machine model, combined with grey wolf optimization algorithm, aimed at improving the accuracy and efficiency of power equipment fault diagnosis. …”
Get full text
Article -
667
A lightweight 256 hexadecimal character substitution Cipher algorithm
Published 2025-07-01“…The aim of this study was achieved by the following objectives; a design of the HCSC algorithm, an implementation of the proposed HCSC algorithm using python programming language and the evaluation of its performance in comparison with existing study. …”
Get full text
Article -
668
RPEM: Randomized Monte Carlo parametric expectation maximization algorithm
Published 2024-05-01Get full text
Article -
669
Adaptive dynamic ϵ-simulated annealing algorithm for tumor immunotherapy
Published 2025-06-01“…The algorithm is applied to an improved tumor immunotherapy model (ITIT), formulated using ordinary differential equations (ODEs) based on established experimental and clinical studies. …”
Get full text
Article -
670
Differentiation of Soybean Genotypes Concerning Seed Physiological Quality Using Hyperspectral Bands
Published 2024-12-01“…The objective was then to evaluate the possibility of differentiating soybean genotypes regarding the physiological quality of seeds using spectral data. …”
Get full text
Article -
671
A Review of Smart Grid Evolution and Reinforcement Learning: Applications, Challenges and Future Directions
Published 2025-04-01Get full text
Article -
672
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. …”
Get full text
Article -
673
SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm
Published 2012-02-01“…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
Get full text
Article -
674
New Photoplethysmographic Signal Analysis Algorithm for Arterial Stiffness Estimation
Published 2013-01-01“…The “ageing index” (AGI), which is calculated from the second derivative photoplethysmographic (SDPPG) waveform, has been used as one method for arterial stiffness estimation and the evaluation of cardiovascular ageing. In this study, the new SDPPG analysis algorithm is proposed with optimal filtering and signal normalization in time. …”
Get full text
Article -
675
RLS-Based Control Algorithms for 3D Zones of Quiet
Published 2008-12-01“…Finally, the efficiency of ANC systems using different control structures and RLS-based control algorithms is compared.…”
Get full text
Article -
676
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
677
Improved Image Compression Scheme Using Hybrid Encoding Algorithm
Published 2019-10-01“…The performance of the proposed scheme is evaluated by using different metrics such as (PSNR, compression ratio and encoding time). …”
Get full text
Article -
678
Topology of Complex Networks and Performance Limitations of Community Detection Algorithms
Published 2017-01-01“…In this paper, we attempt to highlight this problem by studying networks with different topologies and evaluate the performance of community detection algorithms in the light of these topological changes. …”
Get full text
Article -
679
APPLICATION OF THE WORD2VEC ALGORITHM FOR CLINICAL DIAGNOSIS DETERMINATION
Published 2025-02-01“…It also focuses on evaluating the quality of diagnostic and treatment processes through applıcation of different methods and practical application. …”
Get full text
Article -
680
Applying of Kutter-Jordan-Bossen steganography algorithm to video sequences
Published 2015-08-01“…The influence of different types of noise on the algorithm stability is evaluated. …”
Get full text
Article