-
1541
Intercomparison of Numerical Inversion Algorithms for Particle Size Determination of Polystyrene Suspensions Using Spectral Turbidimetry
Published 2015-01-01“…In this context, for the evaluation of turbidimetric spectral measurements, the application of different numerical inversion algorithms is investigated with respect to the particle size distribution determination of polystyrene suspensions. …”
Get full text
Article -
1542
Solving Nonnative Combinatorial Optimization Problems Using Hybrid Quantum–Classical Algorithms
Published 2024-01-01Subjects: Get full text
Article -
1543
New Algorithms Based on the Voronoi Diagram Applied in a Pilot Study on Normal Mucosa and Carcinomas
Published 2000-01-01Get full text
Article -
1544
Accuracy analysis on access hyper-point real-time detection algorithms in high-speed network
Published 2020-04-01“…Real-time access hyper-point helps managers better control the network.Under high-speed network conditions,the difficulty in accessing hyper-point detection lies in the pressure exerted by large traffic on computing.Based on the 40 Gbit/s bandwidth network environment,from the perspective of accuracy analysis,the flow record statistics algorithm and the estimation-based superpoint detection algorithm were compared.The flow record statistical algorithm was improved by the threshold model based on heavy-tailed distribution.The estimation-based superpoint detection algorithm was implemented in the GPU environment by SRLA.The research results show that the estimation-based hyper-point detection algorithm which has obviously higher accuracy and more room for improvement is more suitable for real-time detection of hyper-point in high-speed network than the flow record statistical algorithm.…”
Get full text
Article -
1545
Proposition for Path Loss Prediction Models with the Inclusion of Altitude Parameter and Optimization Through Evolutionary Algorithms
Published 2025-02-01Subjects: Get full text
Article -
1546
Performance of Gradient-Based Solutions versus Genetic Algorithms in the Correlation of Thermal Mathematical Models of Spacecrafts
Published 2017-01-01“…Previous studies have shown the ability of genetic algorithms to perform this task in several cases, although some limitations have been detected. …”
Get full text
Article -
1547
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
1548
-
1549
Parallel Algorithms of Well-Balanced and Weighted Average Flux for Shallow Water Model Using CUDA
Published 2021-01-01“…Four versions of the CUDA algorithm are presented in addition to a CPU implementation. …”
Get full text
Article -
1550
Book review: Zegart, Amy B. Spies, lies, and algorithms: the history and future of American intelligence
Published 2023-09-01“…Zegart, Amy B. Spies, lies, and algorithms: the history and future of American intelligence. …”
Get full text
Article -
1551
Forecasting power generation of wind turbine with real-time data using machine learning algorithms
Published 2024-12-01“…The findings indicated XGBoost algorithm outperformed the other models, achieving high accuracy while demonstrating computational efficiency, making it particularly suitable for real-time applications in energy forecasting.…”
Get full text
Article -
1552
Exploring the feasibility of GF1-WFV data in estimating SPAD using spatiotemporal fusion algorithms
Published 2025-05-01“…In this study, we evaluated the performance of four fusion algorithms fusing Gaofen-1 WFV and MODIS data while also exploring their fusion accuracy. …”
Get full text
Article -
1553
Solar energy prediction through machine learning models: A comparative analysis of regressor algorithms
Published 2025-01-01Get full text
Article -
1554
Research on Recognition of Quiet Period of Sandstone Acoustic Emission Based on Four Machine Learning Algorithms
Published 2022-01-01“…Aiming at solving the problem that it is difficult to recognize the quiet period of acoustic emission in rocks, four machine learning algorithms were adopted to develop and improve the recognition method of the quiet period of acoustic emission. …”
Get full text
Article -
1555
Assessment of different genotyping markers and algorithms for distinguishing Plasmodium falciparum recrudescence from reinfection in Uganda.
Published 2025“…The 3/3 match-counting algorithm classified significantly fewer recrudescences than both the ≥ 2/3 and Bayesian algorithms at probability cutoffs of ≥ 0.7 and ≥ 0.8 (P < 0.05). …”
Get full text
Article -
1556
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01Subjects: Get full text
Article -
1557
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&amp;CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
Get full text
Article -
1558
A Mathematical Modeling and an Optimization Algorithm for Marine Ship Route Planning
Published 2023-01-01“…Based on the mathematical model, the ant colony algorithm is used to optimize the initial route of the ship. …”
Get full text
Article -
1559
Spectrum allocation algorithm of elastic optical networks in power distribution system
Published 2019-02-01“…In order to effectively improve the resource utilization of information transmission network in reality,the spectrum allocation problem in flexible optical network in smart grid environment was analyzed,and a spectrum allocation method was proposed.Combining the advantages of genetic algorithm and ant colony algorithm,the genetic algorithm was used to generate the initial solution.Finally,the optimal solution of the spectrum allocation problem was obtained by the characteristics of positive feedback of ant colony algorithm and efficient convergence.The performance of the optimization algorithm mentioned was verified by software simulation.The proposed algorithm can optimize the use of idle spectrum resources to meet the needs of mass data transmission in distribution network,and improve the reliability of distribution network communication system,which is of great significance to the safe and reliable operation of smart grid.…”
Get full text
Article -
1560
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01Subjects: Get full text
Article