Suggested Topics within your search.
Suggested Topics within your search.
-
10101
Perbandingan Aplikasi Algoritma Kernel K-Means pada Graf Bipartit dan K-Means pada Matriks Dokumen- Istilah dalam Dataset Penelitian Covid-19 RISTEKBRIN
Published 2021-03-01“…The kernel matrix value that represents the similarity score between documents is used as input for the kernel k-means clustering algorithm, which provides the results of mapping research topics. …”
Get full text
Article -
10102
Exploring the potential of German claims data to identify incident lung cancer patients
Published 2025-06-01“…Methods Using the German Pharmacoepidemiological Research Database (GePaRD; claims data from ∼ 20% of the German population) we applied a previously developed algorithm which identifies incident LC patients and classifies them into advanced and non-advanced. …”
Get full text
Article -
10103
Loan classification using logistic regression
Published 2023-03-01“…The research results confirm that the application of the logistic regression algorithm for solving loan classification problems is appropriate. …”
Get full text
Article -
10104
Deep neural network application in real-time economic dispatch and frequency control of microgrids
Published 2025-03-01“…Finally, a real-time integrated scheduling and control framework for microgrids is constructed. The research results showed that the IRPGC algorithm had an average error of less than 10−5 after 5,000 iterations. …”
Get full text
Article -
10105
Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network
Published 2023-04-01“…The results obtained are that the Generative Adversarial Network algorithm can be applied to create mock objects, and images can revive based on training data which is a model for how the algorithm works. …”
Get full text
Article -
10106
Deep Reinforcement Learning Method for Wireless Video Transmission Based on Large Deviations
Published 2025-07-01“…In scalable video transmission research, the video transmission process is commonly modeled as a Markov decision process, where deep reinforcement learning (DRL) methods are employed to optimize the wireless transmission of scalable videos. …”
Get full text
Article -
10107
Recombining Features of Frequency Domain and Location for Machine Recognition of Sign Language
Published 2024-02-01Get full text
Article -
10108
A New Approach Based on the Learning Effect for Sequence-Dependent Parallel Machine Scheduling Problem under Uncertainty
Published 2022-01-01“…The results show that the hybrid algorithm can provide more substantial results than classical algorithms. …”
Get full text
Article -
10109
Global Methane Retrieval, Monitoring, and Quantification in Hotspot Regions Based on AHSI/ZY-1 Satellite
Published 2025-04-01Get full text
Article -
10110
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
10111
Throughput-Oriented Full-Duplex Cognitive Radio Network Parameter Optimization
Published 2022-01-01“…The FC makes a comprehensive judgment after summarizing the data through the fusion algorithm. In the secondary network with SU, throughput is an important index to measure the performance of the network. …”
Get full text
Article -
10112
Application of the Modified Method of ant Colonies to Search for Rational Assignment of Employees to Tasks Using Fuzzy Sets
Published 2020-06-01“…Various stopping algorithms of the modified ant colony method are considered.Materials and research methods. …”
Get full text
Article -
10113
Maturity Classification and Quality Determination of Cherry Using VNIR Hyperspectral Images and Comprehensive Chemometrics
Published 2024-12-01“…Sweetness and acidity are the two most important indicators to evaluate cherry quality. In this research, hyperspectral imaging (380–1030 nm) technology was applied to visually detect the sweetness and acidity of cherry. …”
Get full text
Article -
10114
Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data
Published 2012-01-01Get full text
Article -
10115
Analysis of Tahfidz Program Entrance Examination Using C4.5 Method for Classification of Learning Groups in The Al-Mawaddah Region of Nurul Jadid Islamic Boarding School, Proboling...
Published 2024-10-01“… The tahfidz program aims to improve understanding and memorization of the Al-Quran in the Al-Mawaddah Region, Probolinggo, Indonesia, including those who organize the Tahfid Qur'an program. This research aims to increase the efficiency and accuracy of analyzing the Tahfid program entrance test results using the C4.5 Algorithm for study group classification and visualizing the results through a web-based interactive application using Streamlit. …”
Get full text
Article -
10116
Optimizing Deep Learning Models with Improved BWO for TEC Prediction
Published 2024-09-01Get full text
Article -
10117
Study on the parameters of the matrix NTRU cryptosystem
Published 2025-03-01“…With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized.MethodsBased on the method of constraining the parameter space in congruent cryptographic algorithms, a method for optimal selection of the parameter space of matrix NTRU cryptographic regimes was proposed. …”
Get full text
Article -
10118
Bayesian curriculum generation in sparse reward reinforcement learning environments
Published 2025-06-01Get full text
Article -
10119
-
10120