-
161
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…Experimental results on a Xilinx XC7K410T FPGA development board demonstrate that while maintaining encryption speed, the hardware resources used by the improved RSA encryption algorithm are only half of those of the previous parallel structure and can operate at higher frequencies.…”
Get full text
Article -
162
Algorithms for Railway Embedded Control Devices for Safety Manoeuvres
Published 2020-12-01“…This study is dedicated to solve manoeuvres making task while working on the station with no marshalling hump. …”
Get full text
Article -
163
Machine learning algorithms for predicting unemployment duration in Russia
Published 2024-12-01Get full text
Article -
164
Datacasting: TikTok’s Algorithmic Flow as Televisual Experience
Published 2025-02-01“…Recommendation algorithms have acquired a central role in the suggestion of content within both subscription video on demand (SVOD) and advertising-based video on demand (AVOD) services and media-sharing platforms. …”
Get full text
Article -
165
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01“…To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.…”
Get full text
Article -
166
Segmentation of Brain Tumor Images Using Genetic Algorithms
Published 2009-03-01“…In both approaches tumor location was determined approximately, as a result the genetic algorithm was succeeded in about 85% while the first algorithm determine 80% of tumor locations.…”
Get full text
Article -
167
An Efficiency Analysis of Augmented Reality Marker Recognition Algorithm
Published 2014-05-01“…The obtained results demonstrate that augmented reality marker recognition algorithm is accurate and reliable in the case of changing lighting conditions and rotational angles - only 4 % markers were unidentified. …”
Get full text
Article -
168
EULER AND EXPONENTIAL ALGORITHM IN VISCOELASTIC ANALYSES OF LAMINATED GLASS
Published 2020-03-01Get full text
Article -
169
BOC Signal Acquisition Algorithm Based on Similar Enfoldment
Published 2020-01-01“…This paper simulates the acquisition performance of the SEA algorithm, Martin algorithm, and SCPC algorithm, while the simulation result shows that the SEA algorithm is superior to the Martin algorithm and SCPC algorithm. …”
Get full text
Article -
170
Hierarchical Quantum Architecture Search for Variational Quantum Algorithms
Published 2024-01-01“…Designing efficient variational quantum algorithms (VQAs) is crucial for transforming the theoretical advantages of quantum algorithms into practical applications. …”
Get full text
Article -
171
Dissipative Variational Quantum Algorithms for Gibbs State Preparation
Published 2025-01-01“…We demonstrate how such algorithms can prepare Gibbs states over a wide range of quantum many-body Hamiltonians and temperatures, while significantly reducing errors due to both coherent and noncoherent noise. …”
Get full text
Article -
172
Rethinking Metaheuristics: Unveiling the Myth of “Novelty” in Metaheuristic Algorithms
Published 2025-07-01“…In recent decades, the rapid development of metaheuristic algorithms has outpaced theoretical understanding, with experimental evaluations often overshadowing rigorous analysis. …”
Get full text
Article -
173
Viral Leadership: Algorithmic Amplification and the Rise of Leadership Fashions
Published 2025-05-01“…Algorithms designed to maximize engagement selectively elevate certain leadership styles, such as authentic, servant, and transformational leadership, while marginalizing others, including transactional or directive approaches. …”
Get full text
Article -
174
Research on Timing Synchronization Algorithm for Optical Signal Receiving
Published 2017-12-01“…Especially under the condition of low signalto- noise ratio,the bit error rate of the improved algorithm is around 0. 3,while the bit error rate of the S & C algorithm is over 0. 9.…”
Get full text
Article -
175
A hybrid approach to enhance HbA1c prediction accuracy while minimizing the number of associated predictors: A case-control study in Saudi Arabia.
Published 2025-01-01“…This study aims to develop hybrid prediction models that integrate the strengths of multiple algorithms to enhance HbA1c prediction accuracy while minimising the number of significant Key Performance Indicators (KPIs). …”
Get full text
Article -
176
Environmental risk determination algorithm for veterinary medicinal products
Published 2019-12-01“…Based on this calculation algorithm, a specialized interactive software has been developed to allow rapid and convenient determination of environmental risk for veterinary medicinal products. …”
Get full text
Article -
177
Accelerating the k-Means++ Algorithm by Using Geometric Information
Published 2025-01-01“…In this paper, we propose an acceleration of the exact k-means++ algorithm using geometric information, specifically the Triangle Inequality and additional norm filters, along with a two-step sampling procedure. …”
Get full text
Article -
178
Appling A Hybrid Encryption Algorithm in Cloud Computing
Published 2024-06-01“…While these algorithms are diverse, effective, and strong in protection, which yields the contribution significantly to increasing the level of security in the field of storing sensitive data in the cloud. …”
Get full text
Article -
179
An Unambiguous Acquisition Algorithm for BOC Signal with Arbitrary Order
Published 2024-06-01“…The theoretical and simulation results show that the algorithm has good adaptability, is suitable for BOC modulation signals with arbitrary order, and can completely eliminate side peaks while retaining the narrow correlation peak characteristics. …”
Get full text
Article -
180
Android malware detection using random forest algorithm
Published 2025-05-01“…Specifically, the research investigates the performance of various ML algorithms, with a focus on Random Forest, in detecting malware on the android platform. …”
Get full text
Article