Showing 15,021 - 15,040 results of 25,328 for search 'research algorithm', query time: 0.29s Refine Results
  1. 15021

    Planning of career growth of agricultural enterprises staff by Litynska V.

    Published 2024-12-01
    “…The works of foreign researchers are studied and an algorithm for planning career growth for employees of agricultural enterprises is generalized, which will contribute to successful career formation. …”
    Get full text
    Article
  2. 15022

    Feature Variable Selection Based on VIS-NIR Spectra and Soil Moisture Content Prediction Model Construction by Nan Zhou, Jin Hong, Bo Song, Shichao Wu, Yichen Wei, Tao Wang

    Published 2024-01-01
    “…The investigation looked at how changes in the soil moisture content impacted the response of the soil spectra. The researchers used a genetic algorithm (GA), interval combination optimization (ICO), and competitive adaptive reweighted sampling (CARS) to filter feature variables from full-band spectral data. …”
    Get full text
    Article
  3. 15023
  4. 15024
  5. 15025

    Enhancing Resilience and Efficiency in Power System: A Five-Level Dynamic Planning Model by Mahnaz Rezaei, Mohammad Tolou Askari, Meysam Amirahmadi, Vahid Ghods

    Published 2024-01-01
    “…Researchers consider the planning of power systems to be of utmost importance, and due to its significant budget, further studies on the resilience of energy systems are necessary. …”
    Get full text
    Article
  6. 15026

    GRU-based multi-scenario gait authentication for smartphones by Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI

    Published 2022-10-01
    “…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
    Get full text
    Article
  7. 15027

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  8. 15028
  9. 15029
  10. 15030
  11. 15031

    Diagnosis of gastrointestinal fistulas in pancreatic necrosis by X-ray and computed tomography by T. G. Barmina, L. T. Khamidova, O. A. Zabavskaya, I. E. Selina, P. A. Yartsev, F. A.-K. Sharifullin, I. E. Popova, E. A. Eletskaia, А. M. Kuzmin

    Published 2025-01-01
    “…The purpose of the study: to clarify the possibilities of using X-ray research methods in the framework of a comprehensive diagnosis of gastrointestinal fistulas in pancreatic necrosis.Materials and methods. …”
    Get full text
    Article
  12. 15032
  13. 15033
  14. 15034
  15. 15035

    Exploring the Realization of Creative Dimensions within the Metaverse: The Case of Tabriz Metropolis by Saied Jaffari namvar, Hossein Nazmfar, Ibrahim Taghav

    Published 2025-06-01
    “…To ascertain the relative importance of research components, 20 experts were consulted using the preferential weighting evaluation ratio algorithm (SOARA). …”
    Get full text
    Article
  16. 15036

    Congenital cytomegalovirus infection and its impact on the auditory function by R. A. Ivanova, M. Yu. Boboshko, E. S. Garbaruk, S. M. Vikhnina, V. V. Vasiliev, N. V. Rogozina, A. A. Grineva

    Published 2019-10-01
    “…The aim is to assess the frequency and time of hearing loss occurrence in children with congenital cytomegalovirus infection and to develop the audiological follow-up algorithm adapted for those children. Materials and methods: 60 children with verified congenital cytomegalovirus infection have been involved into research as the main group. 61 children, with other sensorineural hearing loss risk factors, but excluding congenital cytomegalovirus, were included into the comparison group. …”
    Get full text
    Article
  17. 15037
  18. 15038

    Factors Influencing Misinformation Propagation: A Systemic Review by HAN Xi, LIAO Ke

    Published 2024-12-01
    “…The study also identified some limitations of current studies, including an excessive focus on the political and health issues, a lack of attention to how information characteristics, intervention factors, and platform characteristics play a role, and the relative simplicity of the research methods. Future studies should focus on misinformation propagation in other scenarios, explore more information characteristics suitable for algorithmic intervention, examine the differences in misinformation propagation on different platforms, and use mixed research methods to reach more credible conclusions. …”
    Get full text
    Article
  19. 15039
  20. 15040