-
261
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01“…We employ fourth-order non-linear encoding to reduce the loss of efficiency while utilizing a random sequence to shuffle lookup table access, thereby severing the potential link between memory data and the intermediate values of SM4. …”
Get full text
Article -
262
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01“…In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. …”
Get full text
Article -
263
A review on amino acid based protein classification using supervised artificial intelligence (AI) models
Published 2025-06-01“…Numerous sequences connect each protein to one of the numerous predetermined groups. …”
Get full text
Article -
264
Unsupervised learning analysis on the proteomes of Zika virus
Published 2024-11-01“…Methods In this work, unsupervised Random Forest (URF), followed by the application of dimensional reduction algorithms such as principal component analysis (PCA), Uniform Manifold Approximation and Projection (UMAP), t-distributed stochastic neighbor embedding (t-SNE), and autoencoders were used to uncover hidden patterns from polymorphic amino acid sites extracted on the proteome ZIKV multi-alignments, without the need of an underlying evolutionary model. …”
Get full text
Article -
265
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
Published 2009-01-01“…The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated in aspects of Shannon entropy.The"one-group-one-cipher"algorithm was de-signed and implemented based on hyper-chaos generalized Hénon mapping and IDEA algorithms, and its security was analyzed theoretically.Analysis shows that the algorithm is so secure that it can withstand brute force attack, and it was perfect secrecy.The disadvantages of key’s reuse of block ciphers are avoided, and the practicality and feasibility of chaos ciphers and one-time pad are improved.…”
Get full text
Article -
266
An LDPC Encoder Architecture With Up to 47.5 Gbps Throughput for DVB-S2/S2X Standards
Published 2022-01-01“…In this paper, by extracting the periodicity of the parity-check matrix, we introduce a fast encoding algorithm that can efficiently process the multiplication of the information sequence and a large-dimensional sparse matrix, and propose an encoder architecture with low encoding delay and high throughput. …”
Get full text
Article -
267
Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design
Published 2021-01-01“…The plaintext image is decomposed in odd-even sequence using the boosting algorithm to get the sequence with an even index and the sequence with an odd index; then, the diffusion algorithm is applied to the two sequences by the prediction and update algorithm, and this process is repeated many times to get the two ciphertext sequences after scrambling, merging these two sequences, and matrixing them to get the ciphertext image. …”
Get full text
Article -
268
Binding Affinity Prediction for Pancreatic Ductal Adenocarcinoma Using Drug-Target Descriptors and Artificial Intelligence
Published 2025-01-01“…We used AI algorithms like random forest regressor (RFR), extreme gradient boost regressor (XGBR), and one-dimensional convolutional neural network (1D-CNN) to predict the binding affinity. …”
Get full text
Article -
269
Evaluation of drug-drug interaction between Suraxavir Marboxil (GP681) and itraconazole, and assessment of the impact of gene polymorphism
Published 2025-04-01“…No significant increase in adverse events was observed during co-administration. Using random forest algorithm, we estimated effects of cytochrome P450 enzymes followed the order of CYP 3A4 > CYP 1A2 > CYP 2C19. …”
Get full text
Article -
270
-
271
Gene selection based on adaptive neighborhood-preserving multi-objective particle swarm optimization
Published 2025-05-01“…The analysis of high-dimensional microarray gene expression data presents critical challenges, including excessive dimensionality, increased computational burden, and sensitivity to random initialization. Traditional optimization algorithms often produce inconsistent and suboptimal results, while failing to preserve local data structures limiting both predictive accuracy and biological interpretability. …”
Get full text
Article -
272
Utilizing Artificial Intelligence for Microbiome Decision-Making: Autism Spectrum Disorder in Children from Bosnia and Herzegovina
Published 2024-11-01“…Four machine learning algorithms (Random Forest, Support Vector Classification, Gradient Boosting, and Extremely Randomized Tree Classifier) were applied to create eight classification models based on bacterial abundance at the genus level and KEGG pathways. …”
Get full text
Article -
273
Playing hide and seek with primates: A comparative study of Theory of Mind
Published 2015-03-01“…Critically, we varied the sophistication of these algorithms, yielding three conditions, ranging from a control (a simple random biased sequence) to a mildly sophisticated ToM agent (1-ToM). …”
Get full text
Article -
274
Continuous Speech-Based Fatigue Detection and Transition State Prediction for Air Traffic Controllers
Published 2025-01-01“…The evaluation was carried out using various learning algorithms such as XGBoost, Adaboost, Random Forest, HistogramGB, and 1D-CNN. …”
Get full text
Article -
275
Evaluating Medical Entity Recognition in Health Care: Entity Model Quantitative Study
Published 2024-10-01“…MethodsThis study comprehensively evaluated 7 NER models—hidden Markov models, conditional random fields, BERT for Biomedical Text Mining, Big Transformer Models for Efficient Long-Sequence Attention, Decoding-enhanced BERT with Disentangled Attention, Robustly Optimized BERT Pretraining Approach, and Gemma—across 3 medical datasets: Revised Joint Workshop on Natural Language Processing in Biomedicine and its Applications (JNLPBA), BioCreative V CDR, and Anatomical Entity Mention (AnatEM). …”
Get full text
Article -
276
Identification of Key Genes Related to Intramuscular Fat Content of Psoas Major Muscle in Saba Pigs by Integrating Bioinformatics and Machine Learning Based on Transcriptome Data
Published 2025-04-01“…Four potential fat-deposition-related genes (<i>DGAT2</i>, <i>PCK1</i>, <i>MELK</i>, and <i>FASN</i>) were further screened via the intersection of the candidate genes identified by the Least Absolute Shrinkage and Selection Operator (LASSO) algorithm and the top five genes ranked by the Random Forest (RF) method based on the 20 hub genes and were validated in the test gene set (GSE207279). …”
Get full text
Article -
277
Encryption Of Speech Signal With Multiple Secret Keys
Published 2016-05-01“…The original key is generated, randomly, using a pseudo noise sequence generator, and the two other keys are obtained by using the main key. …”
Get full text
Article -
278
Research on Anomaly Detection Model for Power Consumption Data Based on Time-Series Reconstruction
Published 2024-09-01“…The detection module employs a random forest algorithm optimized by grid search to detect residuals and ultimately identify outliers. …”
Get full text
Article -
279
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.
Published 2025-01-01“…The crux of this framework is the incorporation of a novel TDHCS, distinguished by its intricate nonlinear dynamics and robust randomness. The AES encryption process is simplified based on the high-level random chaotic sequences generated by TDHCS. …”
Get full text
Article -
280
A novel 2D MTMHM based key generation for enhanced security in medical image communication
Published 2025-07-01“…The generated random key sequences trigger the proposed medical image encryption algorithm, which integrates a shuffling-diffusion process. …”
Get full text
Article