-
61
Exploring the impact of deubiquitination on melanoma prognosis through single-cell RNA sequencing
Published 2024-12-01“…Cell types were annotated based on known marker genes, and the AUCell algorithm assessed the enrichment of deubiquitination-related genes. …”
Get full text
Article -
62
Using permutation function and the Bank of LFSR's in pseudo random generator keys
Published 2023-02-01“…The external unit consists of three Linear Feedback Shift Registers use for filling the main system to generate the stream cipher of bits (0&1) as a Pseudo Random generator, in which we use the permutation system and this sequence of bits passed the statistical tests. …”
Get full text
Article -
63
Sequence characterization and evolutionary analysis of S-RNase gene among five genera Pomoideae
Published 2025-03-01“…The Find Best DNA/Protein Models program of MEGA11 software was used to find out the optimal model suitable for the sequence of 5 genera of Pyridae S-RNase gene, and the corresponding model and algorithm were used to calculate the differentiation between the sequences. …”
Get full text
Article -
64
Physical cryptography and security of digital devices
Published 2019-06-01“…The paper also presents the results obtained in the field of random number sequences generation. In addition, the results on the methods of hardware watermarks injection and functional obfuscation of digital devices are given.…”
Get full text
Article -
65
Using the Genetic Algorithm in Developing a Method for Steganography
Published 2013-12-01“…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR) for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
Get full text
Article -
66
Out of randomness: How evolution benefits from modularity
Published 2025-02-01“…Brute force random search, effective in exploring solution spaces, often becomes inefficient or infeasible in real-world scenarios with vast solution spaces. …”
Get full text
Article -
67
Massive unsourced multiple access scheme based on block sequence codebook and compressed sensing
Published 2023-12-01“…A massive unsourced multiple access scheme based on block sequence codebook and compressed sensing was proposed for sporadic burst scenario in massive machine type communication (mMTC).Firstly, a large-capacity spreading codebook generation scheme was designed according to a specific shift pattern, thus the codebook space was expanded.Secondly, the sparse structure of uplink signal was combined with multi-carrier technology to support overlapping transmission of multi-user data on some subcarriers, thus the spectral efficiency was improved.Finally, a multi-carrier CS-MUD model was established, and a group orthogonal matching pursuit algorithm based on codebook sequence blocks was designed to achieve the joint detection of active users and their uplink data.Simulation results show that the proposed scheme can effectively reduce the bit error rate of massive random access.…”
Get full text
Article -
68
Combining machine learning and single-cell sequencing to identify key immune genes in sepsis
Published 2025-01-01“…Next, a Biological association network was constructed, and five key hub genes (CD4, HLA-DOB, HLA-DRB1, HLA-DRA, AHNAK) were identified using a combination of three topological analysis algorithms (MCC, Closeness, and MNC) and four machine learning algorithms (Random Forest, LASSO regression, SVM, and XGBoost). immune cell distribution showed that the key genes correlated with multiple immune cell infiltrations. …”
Get full text
Article -
69
End-to-End Vector Simplification for Building Contours via a Sequence Generation Model
Published 2025-03-01“…Additionally, a self-supervised reconstruction mechanism is introduced, where random perturbations are applied to input sequences, and the model learns to reconstruct the original contours. …”
Get full text
Article -
70
HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS
Published 2017-08-01“…The statistical characteristics of the sequence formed of hash-values are identical to those of the sequence with the randomly obtained values of the elements, pointing to the adequate performance of this algorithm. …”
Get full text
Article -
71
A recursive filter for a class of two-dimensional nonlinear stochastic systems
Published 2025-01-01“…A recursive filtering problem on minimum variance is investigated for a type of two-dimensional systems incorporating noise and a random parameter matrix in the measurement equation, along with random nonlinearity. …”
Get full text
Article -
72
Random walk based snapshot clustering for detecting community dynamics in temporal networks
Published 2025-07-01“…Abstract The evolution of many dynamical systems that describe relationships or interactions between objects can be effectively modeled by temporal networks, which are typically represented as a sequence of static network snapshots. In this paper, we introduce a novel random walk-based approach that can identify clusters of time-snapshots in which network community structures are stable. …”
Get full text
Article -
73
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
74
Application of FMICW technology based on stagger algorithm in automotive radar
Published 2018-10-01“…The problem of spurious spectral peaks produced by the traditional method of using a single switching frequency in automotive FMICW radar was focused by the proposed scheme.The system accuracy depended on the previously estimated range if a bandpass filter was utilized to eliminate the spurious spectral peaks,and the noise floor could be too high to achieve the required dynamic detection range if the random interrupted sequence method was utilized.A stagger algorithm based on multiple switching frequencies was used,in which the spurious peaks from the frequency domain could be removed by minimizing each frequency position on multiple spectrums.Simulation results show that the proposed method is close to the equivalent FMCW radar detection performance,and is good in multiple targets scenario.…”
Get full text
Article -
75
A comprehensive machine learning for high throughput Tuberculosis sequence analysis, functional annotation, and visualization
Published 2025-07-01“…We trained ML-supervised algorithms like XG Boost, Logistic Regression, Random Forest Classifier, Ad- aBoost, and Support Vector Machine to help classify TB patients from large RNA-sequence count data. …”
Get full text
Article -
76
Improved Snake Optimization Algorithm for Global Optimization and Engineering Applications
Published 2025-05-01“…Levy flight facilitates large random steps, balancing exploration and refinement. …”
Get full text
Article -
77
Test case minimizing based on combination chaos genetic algorithm
Published 2016-06-01“…Test case minimizing is one of the most important research fields in software testing.Uniformly distributed Chebyshev and Logistic chaos sequence were introduced in the selection,crossover and mutation of genetic algorithm.Chaos disturbance was also added in genetic testing suite to address the common problems of weak ability in local search and premature convergence,thus to optimize the test result.Experiments were conducted in randomly generated test suites and Siemens test suites.Comparisons were also made with classical methods regard to the scale of production of test suite and the execution time of the algorithms.The results of the experiment indicate that based on the same execution time of the algorithms,a smaller scale test suite can be produced by introducing chaotic sequence in genetic testing suite selection.…”
Get full text
Article -
78
An Image Encryption Algorithm Based on Multichaotic System and DNA Coding
Published 2020-01-01“…In the scrambling stage, DNA encoding is carried out for pixels after scrambling by two chaotic sequences generated by N2D-LSCM; in the stage of diffusion, DNA random coding acts on random matrix obtained by two chaotic sequences generated by NHenon, and DNA XOR operation is carried out with the image obtained in the scrambling stage to diffuse. …”
Get full text
Article -
79
A novel chaotic interleaving algorithm for mobile wireless channels
Published 2016-07-01“…Interleaving technique is an efficient technique to resist serious burst errors over mobile wireless fading channels.To resist 2 dimensionality burst errors effectively,a novel chaotic interleaving algorithm based on Baker map was proposed.In the proposed scheme,the binary source sequence was converted to the data matrix,and then the data matrix was dispersed randomly by using the chaotic Baker map approach,in order to realize the function of transforming 2 dimensionality long bust error into the short 1 dimensionality short bust error after de-interleaving.In additional,the proposed algorithm was combined with the convolution code based on Viterbi decoding,and was applied into the scenario of convolutional codes (2,1,3) and the scenario of (2,1,7) separately for a performance comparison.The simulation results show that the performance of the proposed algorithm outperforms better than the traditional algorithms under image transmission over mobile wireless channel.Moreover,the anti-fading capability of the proposed algorithm grows as the packet length increases,while reducing the complexity significantly.Finally,the chaotic interleaver can also enhance every transmitted packet's security with different secret keys.…”
Get full text
Article -
80
Influence maximization algorithm of social networks based on Transformer model
Published 2024-12-01“…Seconcly, the topology structure information and connection framework information of the candidate nodes were discovered by use of the random walk strategy. Finally, the Transformer model was improved, in order to support scalable node feature sequences, and the improved Transformer model was taken advantage to predict the seed nodes of the social network. …”
Get full text
Article