Showing 41 - 60 results of 2,858 for search 'role based algorithm', query time: 0.23s Refine Results
  1. 41

    Predicting algorithm of attC site based on combination optimization strategy by Zhendong Liu, Xi Chen, Dongyan Li, Xinrong Lv, Mengying Qin, Ke Bai, Zhiqiang He, Yurong Yang, Xiaofeng Li, Qionghai Dai

    Published 2022-12-01
    “…Based on the structural features of attC sites, the prediction algorithm realises the high-precision prediction of the recombination frequencies between sites and the screening of the top 20 important features that play a role in recombination, which are effective for improving the design method of attC sites. …”
    Get full text
    Article
  2. 42
  3. 43

    Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm by Tingzhe Pan, Jue Hou, Xin Jin, Chao Li, Xinlei Cai, Xiaodong Zhou

    Published 2025-01-01
    “…Second, a complex network is constructed, and a federated user clustering method is developed based on the Louvain algorithm, which divides users into multiple clusters based on load pattern similarity. …”
    Get full text
    Article
  4. 44

    Optimization based machine learning algorithms for software reliability growth models by Myeongguen Shin, Juwon Jung, Jihyun Lee, Insoo Ryu, Sanggun Park

    Published 2025-05-01
    “…To fill this gap, current study employs a broader range of optimization algorithms based on the Least Squares Method (LSM) and Maximum Likelihood Estimation (MLE) to approximate global optima. …”
    Get full text
    Article
  5. 45

    Research on Traffic Marking Segmentation Detection Algorithm Based on Feature Fusion by Zhonghe He, Zizheng Gan, Pengfei Gong, Min Li, Kailong Li

    Published 2024-10-01
    “…In order to make the target detection task applicable to irregular objects or to detection tasks with higher accuracy requirements while reducing the waste of computational resources, this paper improves the accuracy of traffic marking segmentation detection by designing a multi-type traffic marking segmentation detection model based on image segmentation algorithms and designing a segmentation guidance matrix module based on a rank guidance matrix computation method. …”
    Get full text
    Article
  6. 46

    NECTAR-An Agent-Based Dynamic Task Allocation Algorithm in the UAV Swarm by Chao Chen, Weidong Bao, Tong Men, Xiaomin Zhu, Ji Wang, Rui Wang

    Published 2020-01-01
    “…On the basis of the assigning mechanism, we put up with a novel agent-based real-time task allocation algorithm named NECTAR for dynamic tasks in the UAV swarm. …”
    Get full text
    Article
  7. 47
  8. 48

    Retrieval algorithm based on locally sensitive hash for ocean observation data by Meijuan Jia, Xiaodong Mao, Shuai Guo, Xin Li

    Published 2025-06-01
    “…The fingerprint retrieval process in duplicate data deletion technology plays a key role in the entire process. Therefore, this paper proposes a fast retrieval strategy based on locally sensitive hashing. …”
    Get full text
    Article
  9. 49

    FEATURE-BASED IMPLEMENTATION OF MACHINE LEARNING ALGORITHMS FOR CARDIOVASCULAR DISEASE PREDICTION by H. Singh, R. Tripathy, P. Kumar Sarangi, U. Giri, S. Kumar Mohapatra, N. Rameshbhai Amin

    Published 2024-11-01
    “…In eukaryotic organisms, each and every organ takes a major role in ensuring the seamless functioning of the entire system. …”
    Get full text
    Article
  10. 50
  11. 51

    Research on Mobile Robot Path Planning Based on MSIAR-GWO Algorithm by Danfeng Chen, Junlang Liu, Tengyun Li, Jun He, Yong Chen, Wenbo Zhu

    Published 2025-02-01
    “…Secondly, an adaptive position-update strategy based on detour foraging and dynamic weights is introduced to adjust the weights according to changes in the adaptability of the leadership roles, increasing the guiding role of the dominant individual and accelerating the overall convergence speed of the algorithm. …”
    Get full text
    Article
  12. 52
  13. 53

    Photovoltaic Global Maximum Power Tracking Based on Improved Dragonfly Algorithm by Fei XUE, Xin MA, Bei TIAN, Hui WU

    Published 2022-02-01
    “…Thus, this paper proposes an improved MPPT algorithm based on the dragonfly algorithm (DA) and the perturbation and observation (P & O) algorithm. …”
    Get full text
    Article
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58

    Interactive design of digital museum based on artificial intelligence and user role model by Liu Shunli

    Published 2025-01-01
    “…The results show that in the DM based on artificial intelligence and user role model, the system innovation has increased by 19.81%, and the satisfaction of tourists has increased by 9.44%.…”
    Get full text
    Article
  19. 59

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  20. 60

    Role-based fine-grained delegation constraint framework in collaborative environments by LIU Wei1, CAI Jia-yong1, HE Ye-ping1

    Published 2008-01-01
    “…A role-based delegation constraint method was introduced by separating role into two parts for fine-grained controlling. …”
    Get full text
    Article