-
341
Anomaly domains detection algorithm based on historical data
Published 2016-10-01“…An anomaly domains detection algorithm was proposed based on domains’ historical data.Based on statistical differences in historical data of legitimate domains and malicious domains,the proposed algorithm used domains’ lifetime,changes of whois information,whois information integrity,IP changes,domains that share same IP,TTL value,etc,as main parameters and concrete representations of features for classification were given.And on this basis the proposed algorithm constructed SVM classifier for detecting anomaly domains.Features analysis and experimental results show that the algorithm obtains high detection accuracy to unknown domains,especially suitable for detecting long lived malicious domains.…”
Get full text
Article -
342
Novel image registration algorithm for scene-matching navigation
Published 2025-03-01“…Moreover, unlike deep learning algorithms that require extensive data training for generalization, our algorithm achieves the necessary level of generalization without such extensive training. …”
Get full text
Article -
343
Novel Adaptive Bacteria Foraging Algorithms for Global Optimization
Published 2014-01-01“…The results show that the proposed algorithms outperform the predecessor algorithm in all test functions and acquire better model for the twin rotor system.…”
Get full text
Article -
344
A Heuristic Algorithm for Resource Allocation/Reallocation Problem
Published 2011-01-01“…The performance of our heuristic is compared with the best state-of-art heuristic algorithms with respect to the quality of the solutions found. …”
Get full text
Article -
345
User similarity-based collaborative filtering recommendation algorithm
Published 2014-02-01“…Collaborative filtering recommendation algorithms widely used in e-commerce, recommend interesting content for users from massive data resources by studying their preferences and interests. …”
Get full text
Article -
346
Fast surface reconstruction algorithm with adaptive step size.
Published 2025-01-01“…This algorithm employs a fixed step size during iterations to enhance convergence. …”
Get full text
Article -
347
Phishing detection algorithm based on attention and feature fusion
Published 2024-08-01“…For instance, current phishing attacks often employ images in place of text and apply small-scale shifts or rotations to high-weight website logo images to evade traditional detection algorithms that rely on text or image features. To address the problem of escalating adversarial phishing technologies, a phishing detection algorithm based on the attention mechanism and feature fusion was proposed, and a hierarchical classification model was established. …”
Get full text
Article -
348
Evaluation of Public Hospitals' Performance with Decision Tree Algorithms
Published 2025-01-01“…In the third phase, the selected operational and financial indicators were analyzed with decision tree algorithms. The ID3, C4.5 and CART decision tree algorithms and AUC were used for predicting operational and financial indicators and performance assessment of decision trees.Findings: It has been observed that decision trees created using the ID3 algorithm exhibit higher performance compared to other algorithms (AUC = 0.93). …”
Get full text
Article -
349
Real time interpolation algorithm based on Lanczos kernel
Published 2017-06-01“…In order to improve the timeliness and reliability of color image scaling algorithms,a high effective real-time color image scaling algorithm was proposed,which first generated the kernel look up table that could be used for whole target image based on Lanczos kernel,and interpolation of all target image pixels had only fixed point operation which had low computational complexity.Meanwhile,an optimized method for rasterizing pixels of target image was proposed,which needed little memory space but embraced high efficiency of memory utilization.The experiment results show that the proposed algorithm achieves good image quality,and the computational complexity is far more less than classic image scaling algorithms.So the proposed algorithm can effectively implement real-time resizing of color images and color videos in any scaling factors.…”
Get full text
Article -
350
Adaptive integration algorithm for stiff ordinary differential equations
Published 1999-12-01“… The accuracy of one adaptive integration algorithm is investigated. The accuracy of the discretization is estimated by comparing the discrete and exact stability factors. …”
Get full text
Article -
351
Least square-based vehicle position estimation algorithm
Published 2010-01-01“…A vehicle position estimation algorithm base on least square optimization was prposed.Firstly,the algorithm deduced the convex constraint condition which the distance matrix had to conform within a short time interval.Then,the least square method was employed to estimate the vehicles’ relative position.Finally,the local maps were merged into the global map.Simulation results demonstrate that the algorithm can achieve preferable estimation accuracy,and meet the real time constraint in vehicular networks.…”
Get full text
Article -
352
Extending structural subsumption reasoning algorithms for ontology matching
Published 2012-08-01Subjects: “…structural subsumption reasoning algorithms…”
Get full text
Article -
353
Algorithm for optimization of cold‑rolled pipe rolling routes
Published 2024-09-01Subjects: Get full text
Article -
354
The Optimization Algorithm for Large-Scale In Situ Stress Field
Published 2021-01-01“…In order to reduce the computing cost without losing the accuracy of the calculation, an optimization algorithm combined with a reduced order model, which is realized by the proper orthogonal decomposition algorithm (POD) for large-scale in situ stress field, is put forward in this paper. …”
Get full text
Article -
355
Retracted Article: Using bibliometrics to understand algorithmic finance
Published 2024-12-01Get full text
Article -
356
A Method for Improving the Accuracy of Link Prediction Algorithms
Published 2021-01-01“…These algorithms help identify actual missing and false links in various networks. …”
Get full text
Article -
357
Region inpainting algorithm of mouth-muffles for facial recognition
Published 2021-08-01“…Facial recognition under occlusion is a well-known difficult problem in real scenes.Especially after the outbreak of COVID-19, in airports, stations and other places that need to verify the identity of visitors, the mouth-muffle occlusion greatly reduces the facial features that can be important for identification, and the accuracy of face recognition algorithm decreases.Face de-occlusion was studied, and a novel framework was proposed to restore face, which used the edge generation network to generate edge maps.On this basis, the occluded region was restored by the region completion network while preserving identity information.In order to improve the performance, the spatial weighted adversarial loss and identity-preserving loss were introduced to train the above two networks.Then two face datasets with mouth-muffles were constructed by face landmarks.The experimental results show that the accuracy of facial recognition algorithm ArcFace on the face dataset restored by the proposed model was 98.39%, which was 4.13% higher than that of directly using ArcFace.…”
Get full text
Article -
358
Predicting Heart Diseases by Selective Machine Learning Algorithms
Published 2025-02-01“…Consequently, the objective of this paper was to predict heart diseases using selective machine learning algorithms. The leverage technique was evaluated using the Cleveland heart disease dataset. …”
Get full text
Article -
359
Solution Algorithms for the Capacitated Location Tree Problem with Interconnections
Published 2025-01-01“…Algorithms…”
Get full text
Article -
360
DIGITISATION OF LEGAL ALGORITHMS TO PREVENT PUBLIC PROCUREMENT CORRUPTION
Published 2024-12-01Subjects: “…algorithm…”
Get full text
Article