-
1121
Optimizing Terminal Water Management in Irrigation District Using Water Balance and Genetic Algorithm
Published 2024-12-01Get full text
Article -
1122
Modeling of Bayesian machine learning with sparrow search algorithm for cyberattack detection in IIoT environment
Published 2024-11-01“…The hyperparameter tuning process employs the sparrow search algorithm (SSA) model to enhance the BBN model performance. …”
Get full text
Article -
1123
Pedestrian Re-Recognition Algorithm Based on Optimization Deep Learning-Sequence Memory Model
Published 2019-01-01“…Pedestrian re-recognition is an important research because it affects applications such as intelligent monitoring, content-based video retrieval, and human-computer interaction. …”
Get full text
Article -
1124
InfoKids+: A Validation Study of a Pediatric Acuity Risk Stratification Algorithm
Published 2025-06-01Get full text
Article -
1125
Analysis of student’s final qualification theses using text loans detection systems
Published 2019-05-01“…This research is actual because of the progress and development of new informational technologies used in the educational system. …”
Get full text
Article -
1126
Parameter Sensitivity Analysis and Algorithm Improvement of Optimization Scheduling Model for Cascade Pumping Stations
Published 2024-01-01“…The results could provide suggestions for the daily operation decision-making of the project. The TRUN algorithm was applied to the optimization scheduling research of cascade pump stations, and the results showed that TRUN had 67, 56 and 46 optimal values in 100 sets of comparison data for each single-stage pumping station, and the total number of optimal values had a clear advantage among the six algorithms, in the optimization results of single-stage pumping stations. …”
Get full text
Article -
1127
Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms
Published 2025-12-01“…Both algorithms demonstrated comparable performance across other modes. …”
Get full text
Article -
1128
Current Status and Trends of Wall-Climbing Robots Research
Published 2025-06-01Get full text
Article -
1129
An artificial intelligence technique: experimental analysis of population-based physarum-energy optimization algorithm
Published 2025-06-01“…To measure the effectiveness of the PEOs and the hybrids, the algorithms have been evaluated on several benchmark problems compared to the recent metaheuristics. …”
Get full text
Article -
1130
Renal parenchymal volume analysis: Clinical and research applications
Published 2025-03-01“…PVA provides improved accuracy when compared to NRS‐based estimates or non‐SRF‐based algorithms. …”
Get full text
Article -
1131
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article -
1132
A Sufficient Descent 3-Term Conjugate Gradient Method for Unconstrained Optimization Algorithm
Published 2023-12-01“…Despite the fact that the BRB algorithm achieved global convergence by employing a modified strong Wolfe line search, in this new MTTBRB-CG method the researchers employed the classical strong Wolfe-Powell condition (SWPC). …”
Get full text
Article -
1133
A node influence ranking algorithm combining k-shell iteration and node degree.
Published 2025-01-01“…To improve the K-shell decomposition method, many approaches have been proposed by researchers. However, there no algorithm has yet that simultaneously uses the iteration factor and degree to further distinguish nodes with the same K-shell value. …”
Get full text
Article -
1134
-
1135
Methodology сomparative statistical analysis of Russian industry based on cluster analysis
Published 2017-07-01“…The article is devoted to researching of the possibilities of applying multidimensional statistical analysis in the study of industrial production on the basis of comparing its growth rates and structure with other developed and developing countries of the world. …”
Get full text
Article -
1136
Techno-Economic Analysis and Optimization of the Hybrid System for a Research Campus—Case Study Center for Research, Innovation, and Technology Transfer in Cuenca-Ecuador
Published 2025-05-01“…Using data collected on site, particularly from the CIITT campus meteorological station and recorded on the RESMUCC platform, the size of each renewable system configuration is optimized based on the three proposed energy control algorithms. The designs of the different configurations developed using the Homer Pro tool are then compared in terms of costs and energy generated. …”
Get full text
Article -
1137
An easy iris center detection method for eye gaze tracking system
Published 2015-10-01Get full text
Article -
1138
Cervical Cancer Detection Using Deep Neural Network and Hybrid Waterwheel Plant Optimization Algorithm
Published 2025-04-01Get full text
Article -
1139
Evaluating the Efficiency of Gray Wolf Optimization and Colonial Competition Algorithm in Load Balancing of Distributed Systems
Published 2025-03-01“…Comparative evaluations with algorithms like the Colonial Competitive Algorithm (CCA) provide a strong foundation for future research. …”
Get full text
Article -
1140
Intra-Net Cognitive Radio Intelligent Utility Maximization using Adaptive PSO-Gradient Algorithm
Published 2020-11-01Get full text
Article