-
1
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01“…This paper proposes an Interpretable Role Mining Algorithm Based on Overlapping Clustering (IRMAOC). …”
Get full text
Article -
2
Roles query algorithm in cloud computing environment based on user require
Published 2011-01-01“…Roles based access control model CARBAC for cloud computing environment was proposed.Roles in the model include user roles and resources owner roles,the latter were called administrator roles.For the resources owner roles assigning the roles to the users,roles query algorithm in the hybrid hierarchies based on users’ access require was proposed.Through this algorithm,for the certain privileges set,this model could choose the least roles set to be assigned to the users.The simulation experiment indicates that for the mass user access,this algorithm can reduce the roles quan-tity,shorten the authorization procedure,and advance the system efficiency.…”
Get full text
Article -
3
ALGORITHM TO CHOOSE ENERGY GENERATION MULTIPLE ROLE STATION
Published 2014-05-01Get full text
Article -
4
The role of smart electricity meter data analysis in driving sustainable development
Published 2025-06-01“…To address the challenge of handling the ever-increasing data, an incremental clustering algorithm proves to be the most suitable choice. Proposed Closeness-based Gaussian Mixture Incremental Clustering (CGMIC) Algorithm updates load patterns without relying on overall daily load curve clustering. …”
Get full text
Article -
5
Commentary: The Role of Geodetic Algorithms for Earthquake Early Warning in Cascadia
Published 2021-03-01Get full text
Article -
6
Reconfiguring Role-Based Access Control via Role Clustering
Published 2025-01-01“…Role-based access control (RBAC) systems have become a widely used and accepted method by many organizations today due to their efficiency and ease of management. …”
Get full text
Article -
7
ARTIFICIAL INTELLIGENCE AND ITS ROLE IN INTERNATIONAL MANAGEMENT
Published 2023-07-01Get full text
Article -
8
A Collaborative Recommend Algorithm Based on Bipartite Community
Published 2014-01-01“…Therefore, on account of data characteristics and application requirements of collaborative recommend systems, we proposed a link community partitioning algorithm based on the label propagation and a collaborative recommendation algorithm based on the bipartite community. …”
Get full text
Article -
9
Application of Genetic Algorithm to Hexagon-Based Motion Estimation
Published 2014-01-01“…The aim of this paper is to propose a new technique which focuses on combing the hexagon-based search algorithm, which is faster than diamond search, and genetic algorithm. …”
Get full text
Article -
10
-
11
A Regionalization Approach Based on the Comparison of Different Clustering Techniques
Published 2024-11-01“…Its aim is to compare different clustering algorithms—such as K-means++, DBSCAN, PD-clustering, Infomap, and federated heuristic optimization based on fuzzy clustering—with a reference regionalization, using environmental and soil data. …”
Get full text
Article -
12
Music Genre Classification Algorithm Based on Multihead Attention Mechanism
Published 2022-01-01“…It can be seen from the experimental research that the music genre classification algorithm based on the multihead attention mechanism proposed in this paper has obvious advantages compared with the traditional algorithm, and it has a certain role in music genre classification.…”
Get full text
Article -
13
Efficient i-DFA construction algorithm based on state grouping
Published 2013-08-01“…Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.…”
Get full text
Article -
14
-
15
Ensemble Learning Algorithms based on Road Accident Data Prediction
Published 2025-01-01Get full text
Article -
16
Medical Images Segmentation Based on Unsupervised Algorithms: A Review
Published 2021-04-01“…Unsupervised ranking criteria use some of the statistics in the hash score based on the original picture. The key aim of this paper is to study some literature on unsupervised algorithms (K-mean, K-medoids) and to compare the working efficiency of unsupervised algorithms with different types of medical images. …”
Get full text
Article -
17
Architectural animation generation system based on AL-GAN algorithm
Published 2025-07-01“…To this end, a new AA generation system based on the architecture learning generative adversarial network (AL-GAN) algorithm is proposed, aiming to solve the problems of insufficient detail handling, poor animation continuity, and inefficiency in traditional AA generation. …”
Get full text
Article -
18
Beijing Opera Synthesis Based on Straight Algorithm and Deep Learning
Published 2018-01-01Get full text
Article -
19
Target Tracking Algorithm Based on Adaptive Scale Detection Learning
Published 2021-01-01Get full text
Article -
20
ACOFuzz: An ant colony algorithm-based fuzzer for smart contracts
Published 2025-09-01“…In today's blockchain landscape, smart contracts are assuming a pivotal role, albeit accompanied by a heightened risk of exploitation by attackers. …”
Get full text
Article