Showing 301 - 320 results of 2,101 for search '(pattern OR patterns) research algorithms', query time: 0.16s Refine Results
  1. 301
  2. 302

    Vessel Trajectory Data Mining: A Review by Alexandros Troupiotis-Kapeliaris, Christos Kastrisios, Dimitris Zissis

    Published 2025-01-01
    “…As a result, there is an increasing demand to analyze these datasets to derive insights into vessel movement patterns and to investigate activities occurring within specific spatial and temporal contexts. …”
    Get full text
    Article
  3. 303

    Fusion of motion smoothing algorithm and motion segmentation algorithm for human animation generation. by Shinan Ding

    Published 2025-01-01
    “…Then, combining the discriminant analysis algorithm based on sparse reconstruction and the multi-scale temporal association segmentation algorithm, the key motion segments of the behavior pattern change are identified adaptively. …”
    Get full text
    Article
  4. 304

    Improvement and Optimization of Feature Selection Algorithm in Swarm Intelligence Algorithm Based on Complexity by Bingsheng Chen, Huijie Chen, Mengshan Li

    Published 2021-01-01
    “…Feature selection, as an effective data processing method, has become a hot research topic in the fields of machine learning, pattern recognition, and data mining and has received extensive attention and attention. …”
    Get full text
    Article
  5. 305

    Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks by Seungun Park, Aria Seo, Muyoung Cheong, Hyunsu Kim, JaeCheol Kim, Yunsik Son

    Published 2025-06-01
    “…Despite the added complexity, DL models effectively distinguished real and dummy traces, highlighting limitations in existing hiding techniques. (4) Conclusions: These findings highlight the need for adaptive countermeasures against DL-SCAs. Future research should explore dynamic obfuscation techniques, adversarial training, and comprehensive evaluations of broader cryptographic algorithms. …”
    Get full text
    Article
  6. 306

    A comparative study of convolutional neural networks and traditional feature extraction techniques for adulteration detection in ground beef by Leila Bahmani, Saied Minaei, Alireza Mahdavian, Ahmad Banakar, Mahmoud Soltani Firouz

    Published 2025-06-01
    “…In order to identify the most appropriate feature extraction algorithm and classify samples having various levels of adulteration, Local Binary Pattern (LBP), Gray Level Co-occurrence Matrixes (GLCM) and Gabor filter were compared. …”
    Get full text
    Article
  7. 307
  8. 308
  9. 309

    A computational enhancement of Base64 algorithm using Residue Number System algorithms by Kolawole Bariu LOGUNLEKO, Abolore Muhamin LOGUNLEKO, Ayisat Wuraola ASAJU-GBOLAGADE, Akinbowale Nathaniel BABATUNDE, Kazeem Alagbe GBOLAGADE

    Published 2025-03-01
    “…Therefore, the research bridges the security gap in the Base64 cryptographic algorithm by factoring the key mechanism of the RNS based algorithm into the newly developed algorithm. …”
    Get full text
    Article
  10. 310

    A Monte Carlo Tree Search approach to QAOA: finding a needle in the haystack by Andoni Agirre, Evert van Nieuwenburg, Matteo M Wauters

    Published 2025-01-01
    “…The search for quantum algorithms to tackle classical combinatorial optimization problems has long been one of the most attractive yet challenging research topics in quantum computing. …”
    Get full text
    Article
  11. 311

    Opportunities of machine learning algorithms for education by Olga Ovtšarenko

    Published 2024-11-01
    “…Abstract Machine learning (ML) methods are among the most promising technologies with wide-ranging research opportunities, particularly in the field of education, where they can be used to enhance student learning outcomes. …”
    Get full text
    Article
  12. 312

    Robust Classification of Intramuscular EMG Signals to Aid the Diagnosis of Neuromuscular Disorders by Shobha Jose, S. Thomas George, M. S. P. Subathra, Vikram Shenoy Handiru, Poornaselvan Kittu Jeevanandam, Umberto Amato, Easter Selvan Suviseshamuthu

    Published 2020-01-01
    “…The FDs of LWT subband coefficients are fused with one-dimensional local binary pattern derived from each downsampled signal. Next, a multilayer perceptron neural network (MLPNN) determines the class labels of downsampled signals. …”
    Get full text
    Article
  13. 313

    Review of Multivariate Time Series Clustering Algorithms by ZHENG Desheng, SUN Hanming, WANG Liyuan, DUAN Yaoxin, LI Xiaoyu

    Published 2025-03-01
    “…Clustering technique, as a core tool in data mining, can partition data into different clusters based on structural similarity, thereby uncovering the structure and internal relationships within data to discover systemic development patterns and variable correlations. Faced with the challenges such as the complexity of multivariate time series data structures, the interconnectivity between variables, and data high-dimensionality, a substantial amount of research has been conducted internationally. …”
    Get full text
    Article
  14. 314

    Neuromorphic devices assisted by machine learning algorithms by Ziwei Huo, Qijun Sun, Jinran Yu, Yichen Wei, Yifei Wang, Jeong Ho Cho, Zhong Lin Wang

    Published 2025-01-01
    “…Neuromorphic computing extends beyond sequential processing modalities and outperforms traditional von Neumann architectures in implementing more complicated tasks, e.g., pattern processing, image recognition, and decision making. …”
    Get full text
    Article
  15. 315

    CubicPat: Investigations on the Mental Performance and Stress Detection Using EEG Signals by Ugur Ince, Yunus Talu, Aleyna Duz, Suat Tas, Dahiru Tanko, Irem Tasci, Sengul Dogan, Abdul Hafeez Baig, Emrah Aydemir, Turker Tuncer

    Published 2025-02-01
    “…To achieve classification and explainable results, a new XFE model was developed, incorporating a novel feature extraction function called Cubic Pattern (CubicPat), which generates a three-dimensional feature vector by coding channels. …”
    Get full text
    Article
  16. 316
  17. 317

    Application of Collective Intelligence of Artificial Bee Colony Algorithm in Optimization of Estimation and Zoning of Wind Erosion Intensity Using Geomorphological data (Case Study... by Mehdi Saghafi, Moohamadali Moodaresi

    Published 2016-08-01
    “…Finally using multivariable statistical methods, the centers and spatial pattern of zones which were obtained by both models were compered. 3- Results and Discussion About 47% of the area of wind erosion classes in IRIFR model moved to higher erosion classes in bee colony algorithm. …”
    Get full text
    Article
  18. 318

    Machine Learning Algorithms Performance Evaluation for Intrusion Detection by Shyla ., Kapil Kumar, Vishal Bhatnagar

    Published 2021-01-01
    “…The detection of Intrusion is the major research problem faced in the area of information security, the objective is to scrutinize threats or intrusions to secure information in the network Intrusion detection system (IDS) is one of the key to conquer against unfamiliar intrusions where intruders continuously modify their pattern and methodologies. …”
    Get full text
    Article
  19. 319

    Automatic detection of sleep spindles by neural networks algorithms by Jan Rychlík, Roman Mouček

    Published 2024-12-01
    “…Consequently, comprehending and accurately analyzing sleep patterns is of paramount importance. This research aims to introduce, formulate, execute, and assess diverse machine/deep learning methodologies tailored for the processing of EEG signals geared explicitly towards identifying sleep spindles. …”
    Get full text
    Article
  20. 320

    Student Performance Prediction Using Machine Learning Algorithms by Esmael Ahmed

    Published 2024-01-01
    “…Some areas of applications of ML algorithms include cluster analysis, pattern recognition, image processing, natural language processing, and medical diagnostics. …”
    Get full text
    Article