Showing 10,101 - 10,120 results of 25,328 for search 'research algorithm', query time: 0.28s Refine Results
  1. 10101

    Perbandingan Aplikasi Algoritma Kernel K-Means pada Graf Bipartit dan K-Means pada Matriks Dokumen- Istilah dalam Dataset Penelitian Covid-19 RISTEKBRIN by Budi Nugroho

    Published 2021-03-01
    “…The kernel matrix value that represents the similarity score between documents is used as input for the kernel k-means clustering algorithm, which provides the results of mapping research topics. …”
    Get full text
    Article
  2. 10102

    Exploring the potential of German claims data to identify incident lung cancer patients by Josephine Kanbach, Nikolaj Rischke, Sabine Luttmann, Ulrike Haug

    Published 2025-06-01
    “…Methods Using the German Pharmacoepidemiological Research Database (GePaRD; claims data from ∼ 20% of the German population) we applied a previously developed algorithm which identifies incident LC patients and classifies them into advanced and non-advanced. …”
    Get full text
    Article
  3. 10103

    Loan classification using logistic regression by U. I. Behunkou, M. Y. Kovalyov

    Published 2023-03-01
    “…The research results confirm that the application of the logistic regression algorithm for solving loan classification problems is appropriate. …”
    Get full text
    Article
  4. 10104

    Deep neural network application in real-time economic dispatch and frequency control of microgrids by Liu Jun

    Published 2025-03-01
    “…Finally, a real-time integrated scheduling and control framework for microgrids is constructed. The research results showed that the IRPGC algorithm had an average error of less than 10−5 after 5,000 iterations. …”
    Get full text
    Article
  5. 10105

    Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network by Khairunnisak Khairunnisak, Gilang Miftakhul Fahmi, Didit Suhartono

    Published 2023-04-01
    “…The results obtained are that the Generative Adversarial Network algorithm can be applied to create mock objects, and images can revive based on training data which is a model for how the algorithm works. …”
    Get full text
    Article
  6. 10106

    Deep Reinforcement Learning Method for Wireless Video Transmission Based on Large Deviations by Yongxiao Xie, Shian Song

    Published 2025-07-01
    “…In scalable video transmission research, the video transmission process is commonly modeled as a Markov decision process, where deep reinforcement learning (DRL) methods are employed to optimize the wireless transmission of scalable videos. …”
    Get full text
    Article
  7. 10107
  8. 10108

    A New Approach Based on the Learning Effect for Sequence-Dependent Parallel Machine Scheduling Problem under Uncertainty by Maryam Ebrahimi, Parviz Dinari, Mohamad Samaei, Rouhollah Sohrabi, Soheil Sherafatianfini

    Published 2022-01-01
    “…The results show that the hybrid algorithm can provide more substantial results than classical algorithms. …”
    Get full text
    Article
  9. 10109
  10. 10110

    Review of information hiding on Chinese text by Guohua WU, Lichun GONG, Lifeng YUAN, Ye YAO

    Published 2019-09-01
    “…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
    Get full text
    Article
  11. 10111

    Throughput-Oriented Full-Duplex Cognitive Radio Network Parameter Optimization by Haibin Jiang, Zhiyong Yu, Jian Yang, Kai Kang

    Published 2022-01-01
    “…The FC makes a comprehensive judgment after summarizing the data through the fusion algorithm. In the secondary network with SU, throughput is an important index to measure the performance of the network. …”
    Get full text
    Article
  12. 10112

    Application of the Modified Method of ant Colonies to Search for Rational Assignment of Employees to Tasks Using Fuzzy Sets by V. A. Sudakov, Yu. P. Titov

    Published 2020-06-01
    “…Various stopping algorithms of the modified ant colony method are considered.Materials and research methods. …”
    Get full text
    Article
  13. 10113

    Maturity Classification and Quality Determination of Cherry Using VNIR Hyperspectral Images and Comprehensive Chemometrics by Yuzhen Wei, Siyi Yao, Feiyue Wu, Qiangguo Yu

    Published 2024-12-01
    “…Sweetness and acidity are the two most important indicators to evaluate cherry quality. In this research, hyperspectral imaging (380–1030 nm) technology was applied to visually detect the sweetness and acidity of cherry. …”
    Get full text
    Article
  14. 10114
  15. 10115

    Analysis of Tahfidz Program Entrance Examination Using C4.5 Method for Classification of Learning Groups in The Al-Mawaddah Region of Nurul Jadid Islamic Boarding School, Proboling... by Wahab Sya'roni, Yulia Sri Devi, Yanuar Ilmansyah

    Published 2024-10-01
    “… The tahfidz program aims to improve understanding and memorization of the Al-Quran in the Al-Mawaddah Region, Probolinggo, Indonesia, including those who organize the Tahfid Qur'an program. This research aims to increase the efficiency and accuracy of analyzing the Tahfid program entrance test results using the C4.5 Algorithm for study group classification and visualizing the results through a web-based interactive application using Streamlit. …”
    Get full text
    Article
  16. 10116
  17. 10117

    Study on the parameters of the matrix NTRU cryptosystem by LI Zichen, WU Qinghao, SONG Jiashuo, PENG Haipeng

    Published 2025-03-01
    “…With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized.MethodsBased on the method of constraining the parameter space in congruent cryptographic algorithms, a method for optimal selection of the parameter space of matrix NTRU cryptographic regimes was proposed. …”
    Get full text
    Article
  18. 10118
  19. 10119
  20. 10120