Showing 181 - 200 results of 2,858 for search 'role based algorithm', query time: 0.18s Refine Results
  1. 181

    A BP-Neural-Network-Based PID Control Algorithm of Shipborne Stewart Platform for Wave Compensation by Daoxi Li, Shuqing Wang, Xiancang Song, Zepeng Zheng, Wei Tao, Jvpeng Che

    Published 2024-11-01
    “…Then, the BP-PID control algorithm was designed based on the joint space control. …”
    Get full text
    Article
  2. 182

    Medical Image Segmentation Algorithm Based on Optimized Convolutional Neural Network-Adaptive Dropout Depth Calculation by Feng-Ping An, Jun-e Liu

    Published 2020-01-01
    “…This model better addresses the problem of the weak generalizability of deep learning models. Based on the above ideas, this paper proposes a medical image segmentation algorithm based on an optimized convolutional neural network with adaptive dropout depth calculation. …”
    Get full text
    Article
  3. 183

    Research on automatic processing system of financial information in colleges and universities based on NLP-KG fusion algorithm by Jin Lei, Mengke Wei, Yiwen She, Weixia Wang

    Published 2025-12-01
    “…The existing mechanisms ensure security and privacy from multiple aspects: access control (using multi-factor identity authentication and role-based permission management), data encryption (SSL/TLS encryption protocol and AES algorithms are used for transmission and storage, respectively), data backup and recovery (regular backup, off-site storage, and recovery drills), audit and monitoring (detailed recording of operations and real-time monitoring of network traffic, etc.). …”
    Get full text
    Article
  4. 184

    Examining the Impact of Distance-Based Similarity Metrics on the Performance of Projected Clustering Algorithm for Fingerprint Database Clustering by Abdulmalik Shehu Yaro, Filip Maly, Pavel Prazak, Karel Maly

    Published 2025-01-01
    “…The projected clustering (PROCLUS) algorithm is a subspace clustering algorithm based on the k-medoids clustering approach. …”
    Get full text
    Article
  5. 185

    A Novel Black Widow Optimization Algorithm Based on Lagrange Interpolation Operator for ResNet18 by Peiyang Wei, Can Hu, Jingyi Hu, Zhibin Li, Wen Qin, Jianhong Gan, Tinghui Chen, Hongping Shu, Mingsheng Shang

    Published 2025-06-01
    “…In response to this, we propose a black widow optimization algorithm based on Lagrange interpolation (LIBWONN) to optimize the learning rate of ResNet18. …”
    Get full text
    Article
  6. 186
  7. 187
  8. 188

    Retrieval of cloud fraction using machine learning algorithms based on FY-4A AGRI observations by J. Xia, L. Guan

    Published 2024-11-01
    “…Random forest (RF) and multilayer perceptron (MLP) algorithms were used in this paper to retrieve the cloud fraction of AGRI (Advanced Geosynchronous Radiation Imager) on board the Fengyun-4A (FY-4A) satellite based on its full-disk level-1 radiance observation. …”
    Get full text
    Article
  9. 189

    A Fine-Grained Aircraft Target Recognition Algorithm for Remote Sensing Images Based on YOLOV8 by Xiao-Nan Jiang, Xiang-Qian Niu, Fan-Lu Wu, Yao Fu, He Bao, Yan-Chao Fan, Yu Zhang, Jun-Yan Pei

    Published 2025-01-01
    “…This article addresses the issues of missed and false detections in existing aircraft target fine-grained recognition algorithms for remote sensing images by proposing an improved algorithm based on YOLOv8, called FD-YOLOv8 (Focus Detail-YOLOv8). …”
    Get full text
    Article
  10. 190

    Intelligent recognition algorithm and application of coal mine overhead passenger device based on multiscale feature fusion by Beijing XIE, Heng LI, Hang DONG, Zheng LUAN, Ben ZHANG, Xiaoxu LI

    Published 2024-12-01
    “…The YOLOv8n single-stage object detection algorithm was used as the baseline model, and a coal mine cmopd intelligent recognition algorithm based on multi-scale feature fusion was proposed.In the image preprocessing stage, adaptive histogram equalization was employed to enhance image quality, and random rectangle masking was applied to simulate real scenarios where cmopd is occluded by underground objects during operation. …”
    Get full text
    Article
  11. 191

    Energy-Efficient Computation Offloading and Resource Allocation in SWIPT-Based MEC Networks by E. Xuefei, Zhonggui Ma, Kaihang Yu

    Published 2025-01-01
    “…We also propose a three-part alternative optimization algorithm framework based on the categories of optimization variables. …”
    Get full text
    Article
  12. 192
  13. 193

    Conditioned secure access control model based on multi-weighted roles and rules in workflow system

    Published 2008-01-01
    “…A sort algorithm based on token and a sort algorithm based on weighted roles synthesis were presented in allusion to the problem of multi-roles and multi-users sequence constraint in the process of executing tasks. …”
    Get full text
    Article
  14. 194

    SAPA-based approach for defending DoS attacks in cloud computing by Meng YUE, Kun LI, Zhi-jun WU

    Published 2017-04-01
    “…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
    Get full text
    Article
  15. 195
  16. 196
  17. 197
  18. 198
  19. 199

    An Improved Human Evolution Optimization Algorithm for Unmanned Aerial Vehicle 3D Trajectory Planning by Xue Wang, Shiyuan Zhou, Zijia Wang, Xiaoyun Xia, Yaolong Duan

    Published 2025-01-01
    “…To address the challenges of slow convergence speed, poor convergence precision, and getting stuck in local optima for unmanned aerial vehicle (UAV) three-dimensional path planning, this paper proposes a path planning method based on an Improved Human Evolution Optimization Algorithm (IHEOA). …”
    Get full text
    Article
  20. 200