Showing 61 - 80 results of 404 for search 'algorithmically random sequence', query time: 0.09s Refine Results
  1. 61

    Exploring the impact of deubiquitination on melanoma prognosis through single-cell RNA sequencing by Su Peng, Jiaheng Xie, Xiaohu He

    Published 2024-12-01
    “…Cell types were annotated based on known marker genes, and the AUCell algorithm assessed the enrichment of deubiquitination-related genes. …”
    Get full text
    Article
  2. 62

    Using permutation function and the Bank of LFSR's in pseudo random generator keys by Ali Khalil Salih

    Published 2023-02-01
    “…The external unit consists of three Linear Feedback Shift Registers use for filling the main system to generate the stream cipher of bits (0&1) as a Pseudo Random generator, in which we use the permutation system and this sequence of bits passed the statistical tests. …”
    Get full text
    Article
  3. 63

    Sequence characterization and evolutionary analysis of S-RNase gene among five genera Pomoideae by LIANG Wenjie, XIE Zhiliang, Wuyun Tana

    Published 2025-03-01
    “…The Find Best DNA/Protein Models program of MEGA11 software was used to find out the optimal model suitable for the sequence of 5 genera of Pyridae S-RNase gene, and the corresponding model and algorithm were used to calculate the differentiation between the sequences. …”
    Get full text
    Article
  4. 64

    Physical cryptography and security of digital devices by A. A. Ivaniuk, S. S. Zalivaka

    Published 2019-06-01
    “…The paper also presents the results obtained in the field of random number sequences generation. In addition, the results on the methods of hardware watermarks injection and functional obfuscation of digital devices are given.…”
    Get full text
    Article
  5. 65

    Using the Genetic Algorithm in Developing a Method for Steganography by Nadia Mohammed

    Published 2013-12-01
    “…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR)  for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
    Get full text
    Article
  6. 66

    Out of randomness: How evolution benefits from modularity by Chunxiuzi Liu, Shaohua Tang, Jingxi Liu, Jiashuo Ye, Lanxin Ma, Bingning Liu, Lu Peng, Jiaxin Dong, Linjie Que, Binbin Hong, Yu Liu

    Published 2025-02-01
    “…Brute force random search, effective in exploring solution spaces, often becomes inefficient or infeasible in real-world scenarios with vast solution spaces. …”
    Get full text
    Article
  7. 67

    Massive unsourced multiple access scheme based on block sequence codebook and compressed sensing by Jing ZHANG, Lin MA, Chulong LIANG, Hongxu GAO

    Published 2023-12-01
    “…A massive unsourced multiple access scheme based on block sequence codebook and compressed sensing was proposed for sporadic burst scenario in massive machine type communication (mMTC).Firstly, a large-capacity spreading codebook generation scheme was designed according to a specific shift pattern, thus the codebook space was expanded.Secondly, the sparse structure of uplink signal was combined with multi-carrier technology to support overlapping transmission of multi-user data on some subcarriers, thus the spectral efficiency was improved.Finally, a multi-carrier CS-MUD model was established, and a group orthogonal matching pursuit algorithm based on codebook sequence blocks was designed to achieve the joint detection of active users and their uplink data.Simulation results show that the proposed scheme can effectively reduce the bit error rate of massive random access.…”
    Get full text
    Article
  8. 68

    Combining machine learning and single-cell sequencing to identify key immune genes in sepsis by Hao Wang, Linghan Len, Li Hu, Yingchun Hu

    Published 2025-01-01
    “…Next, a Biological association network was constructed, and five key hub genes (CD4, HLA-DOB, HLA-DRB1, HLA-DRA, AHNAK) were identified using a combination of three topological analysis algorithms (MCC, Closeness, and MNC) and four machine learning algorithms (Random Forest, LASSO regression, SVM, and XGBoost). immune cell distribution showed that the key genes correlated with multiple immune cell infiltrations. …”
    Get full text
    Article
  9. 69

    End-to-End Vector Simplification for Building Contours via a Sequence Generation Model by Longfei Cui, Junkui Xu, Lin Jiang, Haizhong Qian

    Published 2025-03-01
    “…Additionally, a self-supervised reconstruction mechanism is introduced, where random perturbations are applied to input sequences, and the model learns to reconstruct the original contours. …”
    Get full text
    Article
  10. 70

    HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS by A. V. Sidorenko, I. V. Shakinko

    Published 2017-08-01
    “…The statistical characteristics of the sequence formed of hash-values are identical to those of the sequence with the randomly obtained values of the elements, pointing to the adequate performance of this algorithm. …”
    Get full text
    Article
  11. 71

    A recursive filter for a class of two-dimensional nonlinear stochastic systems by Shulan Kong, Chengbin Wang, Yawen Sun

    Published 2025-01-01
    “…A recursive filtering problem on minimum variance is investigated for a type of two-dimensional systems incorporating noise and a random parameter matrix in the measurement equation, along with random nonlinearity. …”
    Get full text
    Article
  12. 72

    Random walk based snapshot clustering for detecting community dynamics in temporal networks by Filip Blašković, Tim O. F. Conrad, Stefan Klus, Nataša Djurdjevac Conrad

    Published 2025-07-01
    “…Abstract The evolution of many dynamical systems that describe relationships or interactions between objects can be effectively modeled by temporal networks, which are typically represented as a sequence of static network snapshots. In this paper, we introduce a novel random walk-based approach that can identify clusters of time-snapshots in which network community structures are stable. …”
    Get full text
    Article
  13. 73

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  14. 74

    Application of FMICW technology based on stagger algorithm in automotive radar by Yuanhui ZHANG, Jian YANG, Junjiang ZHU, Xiaolu LI, Yuchen HE

    Published 2018-10-01
    “…The problem of spurious spectral peaks produced by the traditional method of using a single switching frequency in automotive FMICW radar was focused by the proposed scheme.The system accuracy depended on the previously estimated range if a bandpass filter was utilized to eliminate the spurious spectral peaks,and the noise floor could be too high to achieve the required dynamic detection range if the random interrupted sequence method was utilized.A stagger algorithm based on multiple switching frequencies was used,in which the spurious peaks from the frequency domain could be removed by minimizing each frequency position on multiple spectrums.Simulation results show that the proposed method is close to the equivalent FMCW radar detection performance,and is good in multiple targets scenario.…”
    Get full text
    Article
  15. 75

    A comprehensive machine learning for high throughput Tuberculosis sequence analysis, functional annotation, and visualization by Md. Saddam Hossain, Md. Parvez Khandocar, Farzana Akter Riti, Md. Yeakub Ali, Prithbey Raj Dey, S M Jahurul Haque, Amira Metouekel, Atrsaw Asrat Mengistie, Mohammed Bourhia, Farid Khallouki, Khalid S. Almaary

    Published 2025-07-01
    “…We trained ML-supervised algorithms like XG Boost, Logistic Regression, Random Forest Classifier, Ad- aBoost, and Support Vector Machine to help classify TB patients from large RNA-sequence count data. …”
    Get full text
    Article
  16. 76

    Improved Snake Optimization Algorithm for Global Optimization and Engineering Applications by Kaiyuan Zheng, Huiyong Liu, Bopeng Li

    Published 2025-05-01
    “…Levy flight facilitates large random steps, balancing exploration and refinement. …”
    Get full text
    Article
  17. 77

    Test case minimizing based on combination chaos genetic algorithm by Qing SHEN, Yunliang JIANG, Zhangguo SHEN, Jungang LOU

    Published 2016-06-01
    “…Test case minimizing is one of the most important research fields in software testing.Uniformly distributed Chebyshev and Logistic chaos sequence were introduced in the selection,crossover and mutation of genetic algorithm.Chaos disturbance was also added in genetic testing suite to address the common problems of weak ability in local search and premature convergence,thus to optimize the test result.Experiments were conducted in randomly generated test suites and Siemens test suites.Comparisons were also made with classical methods regard to the scale of production of test suite and the execution time of the algorithms.The results of the experiment indicate that based on the same execution time of the algorithms,a smaller scale test suite can be produced by introducing chaotic sequence in genetic testing suite selection.…”
    Get full text
    Article
  18. 78

    An Image Encryption Algorithm Based on Multichaotic System and DNA Coding by Jiming Zheng, Zheng Luo, Zhirui Tang

    Published 2020-01-01
    “…In the scrambling stage, DNA encoding is carried out for pixels after scrambling by two chaotic sequences generated by N2D-LSCM; in the stage of diffusion, DNA random coding acts on random matrix obtained by two chaotic sequences generated by NHenon, and DNA XOR operation is carried out with the image obtained in the scrambling stage to diffuse. …”
    Get full text
    Article
  19. 79

    A novel chaotic interleaving algorithm for mobile wireless channels by Xianping WANG, Hui CAO

    Published 2016-07-01
    “…Interleaving technique is an efficient technique to resist serious burst errors over mobile wireless fading channels.To resist 2 dimensionality burst errors effectively,a novel chaotic interleaving algorithm based on Baker map was proposed.In the proposed scheme,the binary source sequence was converted to the data matrix,and then the data matrix was dispersed randomly by using the chaotic Baker map approach,in order to realize the function of transforming 2 dimensionality long bust error into the short 1 dimensionality short bust error after de-interleaving.In additional,the proposed algorithm was combined with the convolution code based on Viterbi decoding,and was applied into the scenario of convolutional codes (2,1,3) and the scenario of (2,1,7) separately for a performance comparison.The simulation results show that the performance of the proposed algorithm outperforms better than the traditional algorithms under image transmission over mobile wireless channel.Moreover,the anti-fading capability of the proposed algorithm grows as the packet length increases,while reducing the complexity significantly.Finally,the chaotic interleaver can also enhance every transmitted packet's security with different secret keys.…”
    Get full text
    Article
  20. 80

    Influence maximization algorithm of social networks based on Transformer model by YU Shuke, YAO Yao, YAN Chenxue

    Published 2024-12-01
    “…Seconcly, the topology structure information and connection framework information of the candidate nodes were discovered by use of the random walk strategy. Finally, the Transformer model was improved, in order to support scalable node feature sequences, and the improved Transformer model was taken advantage to predict the seed nodes of the social network. …”
    Get full text
    Article