-
1
CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks
Published 2020-10-01“…The research in this paper focuses on design, detection and the mitigation of attacks in a vehicle platoon. priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.…”
Get full text
Article -
2
Improved Denclue Outlier Detection Algorithm With Differential Privacy and Attribute Fuzzy Priority Relation Ordering
Published 2023-01-01“…A differential privacy the Denclue outlier detection algorithm based on attribute fuzzy priority ordering (EAF-DP-Denclue) is proposed. …”
Get full text
Article -
3
Hurst and priority adaptive RED combined with dynamic scheduling algorithm based on AOS
Published 2012-10-01“…In order to efficiently transmit different types of high-capacity and burst data,based on virtual channel multiplexing technology on advanced orbiting systems(AOS),a Hurst and priority adaptive random early detection(RED) combined with dynamic scheduling algorithm named HPRED-DS was proposed.In queue management state,the algorithm designed an adaptive two-level packet dropping strategy based on Hurst parameter and priority.In virtual channel scheduling state,a VIP,synchronous and asynchronous mixed virtual channels scheduling mode was designed.Meanwhile,the algorithm efficiently combined queue management and virtual channel scheduling.Experimental results show that on the basis of maintaining high treatment efficiency and throughput,the algorithm stabilizes queue length,reduces delay and delay jitter,can meet various services’transmitting requirement.…”
Get full text
Article -
4
3D Buildings Change Detection from Aerial and Satellite Stereo Imagery Using Kullback–Leibler Divergence Algorithm
Published 2023-06-01“…This paper proposes a Kullback–Leibler divergence (KLD) algorithm to detect urban area changes based on stereo imagery. …”
Get full text
Article -
5
Enhancing Camera Source Identification: A Rapid Algorithm with Enhanced Discriminative Power
Published 2024-12-01“…This paper addresses the issues in digital image source identification by proposing a rapid fingerprint search algorithm based on global information. The algorithm innovatively introduces a search priority queue (SPQ), which analyzes the global correlation between the query fingerprint and all reference fingerprints in the database to construct a comprehensive priority ranking, thereby achieving the efficient retrieval of matching fingerprints. …”
Get full text
Article -
6
NEONATOLOGIST'S TACTICS IN CASES OF NEWBORN CONGENITAL MALFORMATION
Published 2012-12-01“…Mortality reduction is the priority aim of practical healthcare in our country. …”
Get full text
Article -
7
Methodology for detecting anomalies in cyber attack assessment data using Random Forest and Gradient Boosting in machine learning
Published 2024-10-01“…Developing effective methods for detecting anomalies and protecting against cyber threats is becoming a priority for organizations. …”
Get full text
Article -
8
-
9
Optimization Method for Transit Signal Priority considering Multirequest under Connected Vehicle Environment
Published 2018-01-01“…Conventional arrival time of transit depended on the detection information and the front road state, which restricted the effect of priority seriously. …”
Get full text
Article -
10
OperonSEQer: A set of machine-learning algorithms with threshold voting for detection of operon pairs using short-read RNA-sequencing data.
Published 2022-01-01“…We implement a voting system to allow users to choose the stringency of operon calls depending on whether your priority is high recall or high specificity. In addition, we provide the code so that users can retrain the algorithm and re-establish hyperparameters based on any data they choose, allowing for this method to be expanded as additional data is generated. …”
Get full text
Article -
11
Real-time anti-sleep alert algorithm to prevent road accidents to ensure road safety
Published 2025-03-01“…This paper proposes an anti-sleep driver detection algorithm designed specifically for four-wheelers and larger vehicles to mitigate accidents caused by driver drowsiness. …”
Get full text
Article -
12
Diagnostic accuracy of case-identification algorithms for heart failure in the general population using routinely collected health data: a systematic review
Published 2024-12-01“…Abstract Background Heart failure (HF), affecting 1–4% of adults in industrialized countries, is a major public health priority. Several algorithms based on administrative health data (HAD) have been developed to detect patients with HF in a timely and inexpensive manner, in order to perform real-world studies at the population level. …”
Get full text
Article -
13
A comparative study of machine learning algorithms for fall detection in technology-based healthcare system: Analyzing SVM, KNN, decision tree, random forest, LSTM, and CNN
Published 2025-01-01“…The implications of these findings that the selection of fall detection algorithms must consider system priorities, whether focused on high accuracy or processing efficiency. …”
Get full text
Article -
14
Local congestion control algorithm with fair channel allocation
Published 2015-04-01“…A local congestion control algorithm with fair channel allocation (FCA) was presented to mitigate local congestion as well as to improve the fairness of channel utilization.In order to decrease the extra communication overhead for obtaining the real-time buffer length of neighbors and improve the accuracy of congestion detection model based on buffer occupancy of single node,FCA presented a new model considers the total buffer length of neighbors with predict-based mechanism for real-time buffer occupancy and the average transmission time of packet.To avoid deteriorating congestion with an explicit notified package,FCA embedded an additional node address to the ACK control frame to carry congestion information.During the congestion alleviation stage,FCA presented a fair channel allocation mechanism based on real-time buffer occupancy and queue priority to prevent some nodes from overflowing resulting in package loss due to the growth of buffer fast.Simulation results show that the proposed protocol has comparative advantages compare with 802.11,CODA and PCCP in terms of collision,package delivery ratio,throughput and fairness.…”
Get full text
Article -
15
Crime Busting Model Based on Dynamic Ranking Algorithms
Published 2013-01-01“…This paper proposed a crime busting model with two dynamic ranking algorithms to detect the likelihood of a suspect and the possibility of a leader in a complex social network. …”
Get full text
Article -
16
How to identify a patient with autoinflammatory syndrome: Clinical and diagnostic algorithms
Published 2013-10-01“…A clinical diagnostic algorithm is presented, which can be used to detect patients with AIS and to determine indications to and the time of molecular genetic typing, and to choose priority genes.…”
Get full text
Article -
17
Algorithm for forming a geo-map of citizen appeals using artificial intelligence
Published 2025-01-01“…This article presents the development of a method, mechanism, module, and algorithm for the automatic analysis, real-time visualization, and intelligent resolution of citizen appeals using artificial intelligence (AI) and geo-mapping technologies. …”
Get full text
Article -
18
Prognostic algorithm for early diagnosis of subcritical conditions as predictors of sudden cardiac death
Published 2024-08-01“…The basis is to improve the efficiency of predictive algorithms.Material and methods. This pilot, controlled, open-label, randomized, prospective clinical trial included 220 patients at risk of SCD and 150 patients without risk of SCD. …”
Get full text
Article -
19
Fraud Detection Using a Fuzzy Expert System In Motor Insurance
Published 2015-06-01“…Over the years, many methods have been used in the literature for fraud detection, one of which is expert systems. Fraud detection expert systems are based on the knowledge of experts in the field of insurance identify fraud. …”
Get full text
Article -
20
Identification and evaluation of the effective criteria for detection of congestion in a smart city
Published 2022-03-01“…In the simulation of urban mobility (SUMO) simulator, a transport network is created and parameters of vehicles facing congestion are taken to extract the key parameter by using the k‐means clustering technique and mathematical mean algorithm. This parameter is utilized in analytical hierarchy process to detect the highest priorities parameter and based on that the congestion is detected in particular lane. …”
Get full text
Article