-
541
FORMAL MODELS AND ALGORITHMS IN POLITICAL SCIENCE: GAME-THEORETIC APPROACH
Published 2022-08-01Get full text
Article -
542
THE MODIFIED MARINE PREDATOR ALGORITHM FOR SOLVING OPTIMIZATION PROBLEMS (MMPA)
Published 2025-05-01Get full text
Article -
543
Algorithm of Classroom Teaching Quality Evaluation Based on Markov Chain
Published 2021-01-01“…Therefore, after an in-depth study of Markov chain algorithm theory, this research proposes an improved Markov chain hybrid teaching quality evaluation model and designs comparative experiments and applies it to the hybrid teaching quality evaluation system of universities, designs a corresponding hybrid teaching quality evaluation model, and finally verifies its effectiveness through experiments. …”
Get full text
Article -
544
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01“…Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore, based on the spread spectrum technology, firstly, the relationship between steganography parameters (i.e., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
Get full text
Article -
545
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…Consequently, this research conducts a comparative analysis of RSA and ElGamal cryptographic algorithms by applying them to mixed data, including binary, text, and image files. …”
Get full text
Article -
546
Memetic Salp Swarm Algorithm for economic load dispatch problems
Published 2025-08-01Get full text
Article -
547
Optimizing Models and Data Denoising Algorithms for Power Load Forecasting
Published 2024-11-01Get full text
Article -
548
-
549
Automated Input Variable Selection for Analog Methods Using Genetic Algorithms
Published 2024-04-01“…Previous work showed the potential of genetic algorithms (GAs) to optimize most of the AM parameters. …”
Get full text
Article -
550
Optimal PID controller with evolutionary optimization algorithms for rehabilitation robots
Published 2025-07-01“…There exist evidences of rejection to the external disturbances by the control technique, alongside keeping the system stable during the course of harsh and extremely uneven circumstances. This research study validates the mathematical models for finding optimizing parameters of the PID, including a comparative study comprising of four diverse cost functions. …”
Get full text
Article -
551
Parameter Extraction for Photovoltaic Models with Flood-Algorithm-Based Optimization
Published 2024-12-01“…The FLA’s performance is systematically evaluated against nine recently developed optimization algorithms through comprehensive comparative and statistical analyses. …”
Get full text
Article -
552
Focused Crawler for Event Detection Using Metaheuristic Algorithms and Knowledge Extraction
Published 2023-07-01Get full text
Article -
553
RLS-Based Control Algorithms for 3D Zones of Quiet
Published 2008-12-01“…Finally, the efficiency of ANC systems using different control structures and RLS-based control algorithms is compared.…”
Get full text
Article -
554
Localization of Acoustic Emission Source in Rock Using SMIGWO Algorithm
Published 2025-02-01Get full text
Article -
555
An algorithm for automatic fitting and formula assignment in atmospheric mass spectra
Published 2025-04-01“…We hope this can save valuable time of researchers for data interpretation rather than data processing and curation.…”
Get full text
Article -
556
Chaos Time Series Prediction Based on Membrane Optimization Algorithms
Published 2015-01-01Get full text
Article -
557
A Review of Simultaneous Localization and Mapping Algorithms Based on Lidar
Published 2025-01-01“…Then, the classical representative SLAM algorithms are described and compared from three aspects: pure lidar SLAM algorithm, multi-sensor fusion SLAM algorithm, and deep learning lidar SLAM algorithm. …”
Get full text
Article -
558
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01“…Experimental results show that our algorithm significantly improves the interpretability of roles, reduces the Weighted Structure Complexity (WSC), and decreases time complexity compared to previous works.…”
Get full text
Article -
559
Algorithm for the development of enriched bakery products using food additives
Published 2022-04-01Get full text
Article -
560
Underground helmet detection algorithm based on improved YOLOv8s
Published 2025-05-01Get full text
Article