-
4701
Pemeringkatan Pencarian pada Buku Pedoman Akademik Filkom UB Menuju Merdeka Belajar dan Free E-Book Pembelajaran Sebagai Prototype Local Smart Micro Search Engine Menggunakan Algor...
Published 2021-10-01“…Users must master the whole to find out which documents are most suitable, which is where the process will take a lot of time. …”
Get full text
Article -
4702
Neural Networks Method in modeling of the financial company’s performance
Published 2017-11-01“…The copyright factor selection algorithm complements the developed model. Because of the functioning of the neural network, a management report on the financial performance of the company is formed. …”
Get full text
Article -
4703
Integration of bulk RNA-seq and scRNA-seq reveals transcriptomic signatures associated with deep vein thrombosis
Published 2025-04-01“…This study aimed to identify and examine the most distinctive genes linked to DVT.MethodsIn this study, the bulk RNA sequencing (bulk RNA-seq) analysis was conducted on whole blood samples from 11 DVT patients and six control groups. …”
Get full text
Article -
4704
Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput
Published 2011-01-01“…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
Get full text
Article -
4705
A Quantum Implementation Model for Artificial Neural Networks
Published 2018-02-01“…In quantum computing, the phase estimation algorithm is known to provide speedups over the conventional algorithms for the eigenvalue-related problems. …”
Get full text
Article -
4706
URALP: Unreachable Region Aware Location Privacy against Maximum Movement Boundary Attack
Published 2015-08-01“…In this paper, we present an anonymization algorithm that effectively counters such attacks while achieving k -anonymity requirements as well as minimum acceptable cloaked region size. …”
Get full text
Article -
4707
Crowd abnormal behavior detection based on motion similar entropy
Published 2017-05-01“…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
Get full text
Article -
4708
DiffPRFs:random forest under differential privacy
Published 2016-09-01“…A differential privacy algorithm DiffPRFs based on random forests was proposed.Exponential mechanism was used to select split point and split attribute in each decision tree building process,and noise was added according to Laplace mechanism.Differential privacy protection requirement was satisfied through overall process.Compared to existed algorithms,the proposed method does not require pre-discretization of continuous attributes which significantly reduces the performance cost of preprocessing in large multi-dimensional dataset.Classification is achieved conveniently and efficiently while maintains the high accuracy.Experimental results demonstrate the effectiveness and superiority of the algorithm compared to other classification algorithms.…”
Get full text
Article -
4709
Call Admission Control Based on Resource Sharing in LTE-Advanced Relay System
Published 2014-02-01“…A call admission control based on resource sharing in LTE-Advanced relay system was proposed.If the shared resources of the target site for new users and handover users are used up,handover users can use the reserved r esources of the target site for handover users to access system,while new users can access system by resource sharing between the sites in the cell which the target site inside.Simulation results show that compared the proposed algorithm with LTE-Advanced system on fixed bandwidth reservation scheme and LTE-Advanced relay system on fixed bandwidth reservation scheme,the proposed algorithm can effectively reduce the blocking probability of new users and dropping probability of handover users in the cell,and can improve the system resource utilization.…”
Get full text
Article -
4710
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01“…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
Get full text
Article -
4711
Simulations of the sterile neutrino oscillations with a crossing-width term
Published 2025-05-01“…We prove the validity of our algorithm, and adopt some tricks for practical calculations. …”
Get full text
Article -
4712
GENERATING OF OPTIMAL QUANTIZATION LEVELS OF CONTROL CURRENTS FOR LINEAR STEPPING DRIVES OF PRECISION MOTION SYSTEMS
Published 2014-06-01“…The paper proposes a method of taking into account accumulated and temperature errors while forming coordinate discrete grid of a linear stepping drive. …”
Get full text
Article -
4713
HITS: Hyperplanes intersection tabu search for maximum score estimation
Published 2025-05-01“…This is a deterministic algorithm rather than a stochastic one. The tabu search is much faster than the Simulated Annealing, while providing solutions of about the same quality. …”
Get full text
Article -
4714
Tau identification in CMS during LHC run 2
Published 2025-07-01“…Low transverse momentum topologies were addressed separately with a dedicated identification algorithm, while machine learning techniques were implemented to improve the identification of the tau hadronic decay channels. …”
Get full text
Article -
4715
A method for estimating the certified value uncertainty of a multicomponent reference material
Published 2019-07-01“…The results calculated according to the preparation procedure using the proposed algorithm were confirmed by the Monte Carlo method, while the elemental content in the mixture was confirmed via inductively coupled plasma optical emission spectroscopy. …”
Get full text
Article -
4716
Coordinated beamforming for cognitive multi-cell networks with wiretap channels
Published 2014-11-01“…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
Get full text
Article -
4717
Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations
Published 2023-01-01“…In this paper, two efficient two-grid algorithms for the convection-diffusion problem with a modified characteristic finite element method are studied. …”
Get full text
Article -
4718
Leveraging mixed-effects regression trees for the analysis of high-dimensional longitudinal data to identify the low and high-risk subgroups: simulation study with application to g...
Published 2025-03-01“…While CART is a well-known tree algorithm, it suffers from greediness. …”
Get full text
Article -
4719
Electromagnetic Transient Parallel Simulation of Large-Scale New Energy Grid Connection Based on PSCAD/EMTDC
Published 2020-11-01“…Therefore, new requirements of the power grid simulation have been put forward from both the algorithm and the calculation scale. The electromagnetic transient model of Inner Mongolia power grid with new energy access is built based on PSCAD software to realize the accurate simulation of the electromagnetic transient of the whole network. …”
Get full text
Article -
4720
Alternatives for Connecting Photovoltaic Generators to Power Systems with Three-Port and Partial Power Converters
Published 2024-12-01“…In general, PV panels are connected to DC-DC converters and/or DC-AC inverters to implement the maximum power point tracking algorithm and to fulfill the load requirements. Thus, power conversion efficiency and power density need to be taken into consideration when designing PV systems. …”
Get full text
Article