Showing 5,661 - 5,680 results of 13,928 for search '(whole OR while) algorithm', query time: 0.19s Refine Results
  1. 5661

    Cryptanalysis and improvement of a block cryptographic scheme based on logistic map by YANG Ji-yun, LIAO Xiao-feng, XIAO Di, DENG Shao-jiang

    Published 2008-01-01
    “…By means of chosen plaintext attack, the keystream used can easily be recovered with little computing. The algorithm a chosen plaintext attack was proposed and validated by experiment. …”
    Get full text
    Article
  2. 5662

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  3. 5663

    Common Secret Key Derivation Based on Synchronized Artificial Neuronal Networks Using Multispeed Weighted Coefficients Correction by V. F. Golikov, N. V. Brych

    Published 2019-06-01
    “…Proposed correction rule helps to solve the problem of statistical weights binding while synchronizing artificial neuronal networks.…”
    Get full text
    Article
  4. 5664

    Data analytics approach for short- and long-term mortality prediction following acute non-ST-elevation myocardial infarction (NSTEMI) and Unstable Angina (UA) in Asians. by Sazzli Kasim, Putri Nur Fatin Amir Rudin, Sorayya Malek, Firdaus Aziz, Wan Azman Wan Ahmad, Khairul Shafiq Ibrahim, Muhammad Hanis Muhmad Hamidi, Raja Ezman Raja Shariff, Alan Yean Yip Fong, Cheen Song

    Published 2024-01-01
    “…The top-performing ML algorithm consistently surpassed the TIMI risk score for in-hospital, 30-day, and 1-year predictions (with AUC values of 0.88, 0.88, and 0.81, respectively, all p < 0.001), while the TIMI scores registered significantly lower at 0.55, 0.54, and 0.61. …”
    Get full text
    Article
  5. 5665

    Enhancing burned area monitoring with VIIRS dataset: A case study in Sub-Saharan Africa by Boris Ouattara, Michael Thiel, Barbara Sponholz, Heiko Paeth, Marta Yebra, Florent Mouillot, Patrick Kacic, Kwame Hackman

    Published 2024-12-01
    “…The commission error (CE) ranges from 7.8% to 23.4%, while the omission error (OE) falls between 29.4% and 58.8%. …”
    Get full text
    Article
  6. 5666

    A clinical-radiomics nomogram based on automated segmentation of chest CT to discriminate PRISm and COPD patients by TaoHu Zhou, Yu Guan, XiaoQing Lin, XiuXiu Zhou, Liang Mao, YanQing Ma, Bing Fan, Jie Li, WenTing Tu, ShiYuan Liu, Li Fan

    Published 2024-12-01
    “…The chest computed tomography (CT) images were segmented by the fully automated deep learning segmentation algorithm (Unet231) for radiomics feature extraction. …”
    Get full text
    Article
  7. 5667

    On the practical, ethical, and legal necessity of clinical Artificial Intelligence explainability: an examination of key arguments by Justin Blackman, Richard Veerapen

    Published 2025-03-01
    “…Both sides of the debate within the literature are quoted to synthesize discourse on common recurring themes and subsequently critically analyze and respond to it. While the use of autonomous black box algorithms is compellingly discouraged, the same cannot be said for the whole of medical artificial intelligence technologies that lack explainability. …”
    Get full text
    Article
  8. 5668

    Delineating the Spatial Boundaries of Megaregions in China: A City Network Perspective by Wei Chen

    Published 2021-01-01
    “…Central and eastern China have numerous, large, and a high density of megaregions, while the western region has relatively few megaregions. …”
    Get full text
    Article
  9. 5669

    Age-Related Choroidal Involution Is Associated with the Senescence of Endothelial Progenitor Cells in the Choroid by Ali Riza Nazari, Loraine Gresseau, Tiffany Habelrih, Aliabbas Zia, Isabelle Lahaie, Yosra Er-Reguyeg, France Coté, Borhane Annabi, Alain Rivard, Sylvain Chemtob, Michel Desjarlais

    Published 2024-11-01
    “…In this study, we compared the senescent phenotype of EPCs in the choroid and performed whole-genome profiling of EPCs derived from young versus old rats. …”
    Get full text
    Article
  10. 5670

    Generic Method for Social–Environmental System Boundary Delineation—An Amalgamation of Spatial Data Integration, Optimization, and User Control for Resource Management by Mohammad Shahriyar Parvez, Xin Feng

    Published 2024-12-01
    “…The framework also leverages the SKATER algorithm for precise regionalization, ensuring spatial continuity and compactness while allowing user control over region selection and data dimensions. …”
    Get full text
    Article
  11. 5671

    Discussion issues in regulatory consequences of surgical help delivery in accordance to principles of a new medical reform by P. F. Muzychenko, А. М. Bilyakov, N. М. Ergard

    Published 2018-04-01
    “…Regarding possible loyal consequences of the surgical help delivery for population of Ukraine and juridical exposure of physicians–surgeons, there is evidence, that they would serve in future as a background to discuss the problem and to accept a regulatory–loyal base, in which the actions algorithm for medical personnel while medical help delivery would be established.…”
    Get full text
    Article
  12. 5672

    Quasi-Bézier Curves with Shape Parameters by Jun Chen

    Published 2013-01-01
    “…The numerical examples indicated that the algorithm was valid and can easily be applied.…”
    Get full text
    Article
  13. 5673

    Continuous location privacy protection mechanism based on differential privacy by Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA

    Published 2021-08-01
    “…Aiming at the problem of users’ location privacy leakage caused by continuously using LBS, a road privacy level (RPL) algorithm was proposed based on road topological network, which divided the privacy level of the road sections around the sensitive locations.Then, a differential privacy location protection mechanism (DPLPM) was proposed.Privacy budget was allocated for sensitive road sections and Laplace noise was added to realize the privacy protection of location data.The experimental results show that the mechanism has high data availability while protecting the privacy of location information.…”
    Get full text
    Article
  14. 5674

    Analytical Designing of Optimum Controller for Linear-Quadratic Functional with the Given Limiting Restrictions by V. I. Timoshpolskii, V. B. Kovalevskii, G. Romadan, P. V. Ilyusenko

    Published 2003-08-01
    “…The paper considers the development of an algorithm with the purpose to solve the problem of analytical designing of optimum controller for linear-quadratic functional with the given limiting restrictions. …”
    Get full text
    Article
  15. 5675

    Simulation analysis of path planning for workpiece clamping robots based on digital twin technology by Xin PAN, Min LIANG, Yanchao YIN, Zhong CHEN

    Published 2025-06-01
    “…Comparative experiments with two baseline algorithms, RRT*-Connect and an improved RRT*-FN algorithm, highlight the superior performance of the proposed method. …”
    Get full text
    Article
  16. 5676
  17. 5677
  18. 5678

    Spatial Information of Somatosensory Stimuli in the Brain: Multivariate Pattern Analysis of Functional Magnetic Resonance Imaging Data by In-Seon Lee, Won-mo Jung, Hi-Joon Park, Younbyoung Chae

    Published 2020-01-01
    “…Participants received the stimuli at four different locations on the upper and lower limbs (two sites each) for 5 min while blood-oxygen-level-dependent activity (BOLD) was measured using 3-Tesla MRI. …”
    Get full text
    Article
  19. 5679
  20. 5680

    A comprehensive techno-economic analysis for a PHEV-integrated microgrid system involving wind uncertainty and diverse demand side management policies by Bishwajit Dey, Laishram Khumanleima Chanu, Gulshan Sharma, Pitshou N. Bokoro

    Published 2025-06-01
    “…Consequently, a smart charging strategy based on the electricity market price imposed by utilities is recommended for PHEV charging integration to lower the daily charging cost as a whole. Grid-to-Vehicle (G2V) and Vehicle-to-Grid (V2G) methods are integrated in this approach. …”
    Get full text
    Article