-
81
ALGORITHMIC AND PROGRAM IMPLEMENTATION OF THE PLAGIARISM DEFINITION IN LEARNING MANAGEMENT SYSTEMS
Published 2018-06-01“…The software implementation of the proposed algorithms is implemented as a web service in the Java language.…”
Get full text
Article -
82
A Multicriteria Evaluation of Single Underwater Image Improvement Algorithms
Published 2025-07-01“…Enhancement and restoration algorithms are widely used in the exploration of coral reefs for improving underwater images. …”
Get full text
Article -
83
Karatsuba Algorithm Revisited for 2D Convolution Computation Optimization
Published 2025-05-01“…The Karatsuba algorithm, since its introduction in the 1960s, has been traditionally used as a fast arithmetic method to perform multiplication between large-bit-width operands. …”
Get full text
Article -
84
NFT Cryptopunk Generation Using Machine Learning Algorithm (DCGAN)
Published 2024-10-01“…These results highlight the effectiveness of our machine learning algorithms in improving the quality and uniqueness of NFT assets.…”
Get full text
Article -
85
FPGA implementation of a chaos-based image encryption algorithm
Published 2022-11-01“…The importance of this matrix lies both in its use to generate encryption keys and in the encryption algorithm itself. In formulating the proposed encryption algorithm, we adopted the Feistel network in addition to some steps of the Advanced Encryption Standard (AES). …”
Get full text
Article -
86
A fast algorithm for constructing suffix arrays for DNA alphabets
Published 2022-07-01“…The continuous improvement of sequencing technologies has been paralleled by the development of efficient algorithms and data structures for sequencing data analysis and processing. …”
Get full text
Article -
87
Anti-Jamming RIS Communications Using DQN-Based Algorithm
Published 2022-01-01“…The Python simulation results conducted by averaging 10<sup>4</sup> time slots show that the proposed algorithm is not only able to learn from environment, but also yields better performance than baseline schemes under network changes. …”
Get full text
Article -
88
An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms
Published 2023-06-01Get full text
Article -
89
Numerical Solutions to the Variational Problems by Dijkstra’s Path-Finding Algorithm
Published 2024-11-01“…In this work, we propose the general idea of using a path-finding algorithm to solve a variational problem. By interpreting a variational problem of finding the function that minimizes a functional integral as a shortest path finding, we can apply the shortest path-finding algorithm to numerically estimate the optimal function. …”
Get full text
Article -
90
An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis
Published 2024-12-01“…For this purpose, the Correlation Extraction Algorithm (CEA), which leverages the emerging field of quantum computing, appears promising. …”
Get full text
Article -
91
Binary Secretary Bird Optimization Algorithm for the Set Covering Problem
Published 2025-08-01“…Since the SBOA was originally designed for optimization problems in continuous space and the SCP is a binary problem, this paper proposes the implementation of several binarization techniques to adapt the algorithm to the discrete domain. …”
Get full text
Article -
92
Development of deep learning algorithm for detecting dyskalemia based on electrocardiogram
Published 2024-10-01Get full text
Article -
93
Predicting Voluntary Auditor Change Using the Water Cycle Algorithm
Published 2024-06-01“…Additionally, these algorithms were run 10 times to ensure the reliability of the results.ResultsIn almost all implementations and based on all 4 performance evaluation criteria, the Water Cycle Algorithm is more suitable than logistic regression for predicting auditor change. …”
Get full text
Article -
94
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01Get full text
Article -
95
RETRACTED: Comparative analysis of compression algorithms for four-dimensional light fields
Published 2022-07-01“…It has also been shown that with a small distance between the optical centers of the captured images, the use of video compression algorithms is preferable to the use of image compression algorithms, since they show better results in both three-dimensional and four-dimensional versions.Conclusions. …”
Get full text
Article -
96
A new binary grasshopper optimization algorithm for feature selection problem
Published 2022-02-01“…It is an efficient optimization algorithm and since demonstrates excellent performance in solving continuous problems, but cannot resolve directly binary optimization problems. …”
Get full text
Article -
97
Analysis of solving methods and complexity of algorithmics problems in Lithuanian and Baltic Olympiads
Published 2003-12-01“… Lithuanian Olympiads in Informatics are being organized since 1990. Each Olympiad consists of three rounds. …”
Get full text
Article -
98
A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA
Published 2024-12-01“…A theoretical analysis of all variants, including the proposed modifications, demonstrates that these key generation algorithms improve the encryption process compared to the original variants, and since the encryption key size and one of the decryption key sizes are approximately equal in length, they achieve a more balanced computational effort between encryption and decryption.…”
Get full text
Article -
99
Research on Target Tracking Algorithm of Micro-UAV Based on Monocular Vision
Published 2023-01-01“…Aiming at the problem of limited payload and endurance of micro-UAV, the target tracking algorithm based on monocular vision is proposed. Since monocular vision cannot directly measure distance between the UAV and the target, triangulation and triangle similarity are used to calculate the distance information. …”
Get full text
Article -
100
A secure communication algorithm for UAV swarms based on cooperative beamforming
Published 2025-06-01“…To maximize the confidentiality of the system, the relative position and energy of each drone in the swarm, as well as the overall movement of the swarm and the beam of the antenna array, were comprehensively considered. Since this optimization problem was characterized by highly coupled non-convex terms, the initial problem was decomposed into two sub-problems and a cyclic iterative successive convex approximation algorithm was designsed to solve it through Taylor expansion and convex relaxation. …”
Get full text
Article