-
41
Predicting algorithm of attC site based on combination optimization strategy
Published 2022-12-01“…Based on the structural features of attC sites, the prediction algorithm realises the high-precision prediction of the recombination frequencies between sites and the screening of the top 20 important features that play a role in recombination, which are effective for improving the design method of attC sites. …”
Get full text
Article -
42
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
43
Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm
Published 2025-01-01“…Second, a complex network is constructed, and a federated user clustering method is developed based on the Louvain algorithm, which divides users into multiple clusters based on load pattern similarity. …”
Get full text
Article -
44
Optimization based machine learning algorithms for software reliability growth models
Published 2025-05-01“…To fill this gap, current study employs a broader range of optimization algorithms based on the Least Squares Method (LSM) and Maximum Likelihood Estimation (MLE) to approximate global optima. …”
Get full text
Article -
45
Research on Traffic Marking Segmentation Detection Algorithm Based on Feature Fusion
Published 2024-10-01“…In order to make the target detection task applicable to irregular objects or to detection tasks with higher accuracy requirements while reducing the waste of computational resources, this paper improves the accuracy of traffic marking segmentation detection by designing a multi-type traffic marking segmentation detection model based on image segmentation algorithms and designing a segmentation guidance matrix module based on a rank guidance matrix computation method. …”
Get full text
Article -
46
NECTAR-An Agent-Based Dynamic Task Allocation Algorithm in the UAV Swarm
Published 2020-01-01“…On the basis of the assigning mechanism, we put up with a novel agent-based real-time task allocation algorithm named NECTAR for dynamic tasks in the UAV swarm. …”
Get full text
Article -
47
Assessment of Soil Thermal Conductivity Based on BPNN Optimized by Genetic Algorithm
Published 2020-01-01Get full text
Article -
48
Retrieval algorithm based on locally sensitive hash for ocean observation data
Published 2025-06-01“…The fingerprint retrieval process in duplicate data deletion technology plays a key role in the entire process. Therefore, this paper proposes a fast retrieval strategy based on locally sensitive hashing. …”
Get full text
Article -
49
FEATURE-BASED IMPLEMENTATION OF MACHINE LEARNING ALGORITHMS FOR CARDIOVASCULAR DISEASE PREDICTION
Published 2024-11-01“…In eukaryotic organisms, each and every organ takes a major role in ensuring the seamless functioning of the entire system. …”
Get full text
Article -
50
What is the role of artificial intelligence in general surgery?
Published 2024-04-01Get full text
Article -
51
Research on Mobile Robot Path Planning Based on MSIAR-GWO Algorithm
Published 2025-02-01“…Secondly, an adaptive position-update strategy based on detour foraging and dynamic weights is introduced to adjust the weights according to changes in the adaptability of the leadership roles, increasing the guiding role of the dominant individual and accelerating the overall convergence speed of the algorithm. …”
Get full text
Article -
52
Phase diagram construction and prediction method based on machine learning algorithms
Published 2025-05-01Get full text
Article -
53
Photovoltaic Global Maximum Power Tracking Based on Improved Dragonfly Algorithm
Published 2022-02-01“…Thus, this paper proposes an improved MPPT algorithm based on the dragonfly algorithm (DA) and the perturbation and observation (P & O) algorithm. …”
Get full text
Article -
54
-
55
Human autonomy teaming-based safety-aware navigation through bio-inspired and graph-based algorithms
Published 2024-12-01Get full text
Article -
56
Algorithm of management of patients with acute cholestatic hepatitis (Clinical case presentation)
Published 2011-12-01Get full text
Article -
57
-
58
Interactive design of digital museum based on artificial intelligence and user role model
Published 2025-01-01“…The results show that in the DM based on artificial intelligence and user role model, the system innovation has increased by 19.81%, and the satisfaction of tourists has increased by 9.44%.…”
Get full text
Article -
59
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
60
Role-based fine-grained delegation constraint framework in collaborative environments
Published 2008-01-01“…A role-based delegation constraint method was introduced by separating role into two parts for fine-grained controlling. …”
Get full text
Article