Showing 14,581 - 14,600 results of 19,511 for search '"algorithm"', query time: 0.12s Refine Results
  1. 14581

    Effective practices in enhancing autonomous English language learning through YouTube by Ritueli Daeli, Santosa Santosa

    Published 2025-02-01
    “…However, the study identifies significant challenges, including the overwhelming quantity and variable quality of available content, which may hinder learners’ ability to find reliable sources. The platform’s algorithm-driven design can also distract learners, reducing their focus and productivity. …”
    Get full text
    Article
  2. 14582

    New hash function based on C-MD structure and chaotic neural network by Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA

    Published 2023-06-01
    “…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
    Get full text
    Article
  3. 14583

    A lightweight weed detection model for cotton fields based on an improved YOLOv8n by Jun Wang, Zhengyuan Qi, Yanlong Wang, Yanyang Liu

    Published 2025-01-01
    “…This study proposes the YOLO-Weed Nano algorithm based on the improved YOLOv8n model. First, the Depthwise Separable Convolution (DSC) structure is used to improve the HGNetV2 network, creating the DS_HGNetV2 network to replace the backbone of the YOLOv8n model. …”
    Get full text
    Article
  4. 14584

    Digital Sovereignty in times of AI: between perils of hegemonic agendas and possibilities of alternative approaches by Alexandre Costa-Barbosa, Bianca Herlo, Gesche Joost

    Published 2024-12-01
    “…Predominant perspectives often focus on state, market, or individual sovereignty over data, algorithms, and AI models. However, through document and discourse analysis, the article examines alternative approaches such as sustainable, grassroots, and feminist digital sovereignties and those led by communities or indigenous peoples. …”
    Get full text
    Article
  5. 14585

    Spatial Modeling of Airborne Particles (PM2.5 and PM10) in Tehran city Using Convolutional Neural Network. by Abed Bashar Doost, Mohammad Saadi Mesgari

    Published 2024-03-01
    “…This study presents an approach for air quality management in Tehran using the Convolutional Neural Network (CNN) algorithm. The proposed method provides the possibility of spatial modeling and preparation of risk maps of two important air pollutants, namely particulate matter 2.5 (PM2.5) and particulate matter 10 (PM10). …”
    Get full text
    Article
  6. 14586

    Noise-immune zeroing neural dynamics for dynamic signal source localization system and robotic applications in the presence of noise by Yuxin Zhao, Jiahao Wu, Mianjie Zheng

    Published 2025-02-01
    “…The NIZND model is a brain-inspired algorithm that incorporates an integral term and an activation function into the traditional zeroing neural dynamics (ZND) model, designed to effectively mitigate noise interference during localization tasks. …”
    Get full text
    Article
  7. 14587

    DDC_Calc, software to diagnose developmental dysplasia of the hip in infants (version 1) by José Julio Requeiro Molina, Ernesto Pérez Pérez, Ana María Machado Consuegra, Karina Leonor Fernández Sánchez, Roberto Díaz Amador, José Julio Requeiro Morejón

    Published 2023-02-01
    “…The Viola-Jones artificial vision algorithm was used for the detection of the structures, as well as a rule-based system with a view to a diagnostic suggestion. …”
    Get full text
    Article
  8. 14588

    Analysis and Optimization of Influencing Factors for Turnout Lateral Passing Performance of Rubber-tired Metro by DU Zixue, XU Chenyu, YANG Zhen, LIAO Congjian

    Published 2025-01-01
    “…The parameters with greater influence are optimized by using the non-dominated sorting genetic algorithm-II. [Result & Conclusion] With the vertical force of the running wheel, the lateral force of the guide wheel, the lateral force of the axle, the load transfer coefficient of the running wheel, and the roll angle of the car body as evaluation indexes, it is concluded that the vertical stiffness of air spring has the greatest impact on the turnout lateral passing performance of rubber-tired metro vehicles, followed by the damping of the vertical shock absorber and the radial stiffness of the guide wheel and etc. …”
    Get full text
    Article
  9. 14589

    Model Error Correction in Data Assimilation by Integrating Neural Networks by Jiangcheng Zhu, Shuang Hu, Rossella Arcucci, Chao Xu, Jihong Zhu, Yi-ke Guo

    Published 2019-06-01
    “…The effectiveness of the proposed algorithm is validated by examples and by a sensitivity study.…”
    Get full text
    Article
  10. 14590

    A Framework for Detecting Vehicle Occupancy Based on the Occupant Labeling Method by Jooyoung Lee, Jihye Byun, Jaedeok Lim, Jaeyun Lee

    Published 2020-01-01
    “…This study overcomes these limits and proposes an overall framework for an algorithm that effectively detects occupants in vehicles using photographic data. …”
    Get full text
    Article
  11. 14591

    Linking interannual variability of turbidity fronts in the Eastern China Seas to local processes and ocean warming by Yunfei Du, Daidu Fan, Jicai Zhang

    Published 2025-02-01
    “…A gradient-based front detection algorithm and frontal probability are used to identify the geographical locations of turbidity fronts and their variability at the interannual scale, respectively. …”
    Get full text
    Article
  12. 14592

    Recognizing Cognitive and Psychiatric Changes in the Post-Highly Active Antiretroviral Therapy Era by Adriana Carvalhal, Jean-Guy Baril, Frederic Crouzat, Joss De Wet, Patrice Junod, Colin Kovacs, Nancy Sheehan

    Published 2012-01-01
    “…Specifically addressed in the present review are the International HIV Dementia Scale, a novel screening equation and algorithm for HAND, as well as brief, validated, verbal questionnaires for detection of depression and substance abuse. …”
    Get full text
    Article
  13. 14593

    A Vision-Based Video Crash Detection Framework for Mixed Traffic Flow Environment Considering Low-Visibility Condition by Chen Wang, Yulu Dai, Wei Zhou, Yifei Geng

    Published 2020-01-01
    “…First, Retinex image enhancement algorithm was introduced to improve the quality of images, collected under low-visibility conditions (e.g., heavy rainy days, foggy days and dark night with poor lights). …”
    Get full text
    Article
  14. 14594

    Bounded rational real‐time charging pricing strategy under the traffic‐grid coupling network by Chudi Wang, Shaohua Ma, Zhiyuan Cai, Ning Yan, Qiwei Wang

    Published 2022-12-01
    “…Finally, the particle swarm optimisation algorithm is used to solve the game model so as to solve the real‐time charging price under various constraints. …”
    Get full text
    Article
  15. 14595

    Macro Modeling of Column Removal in RC Frames with Consideration of Importance Factor and Infill Walls by Seyed Ali Hassanzadeh, Hamid Reza Ashrafi, Mehdi Komasi

    Published 2023-05-01
    “…Finally, a proposed approach for column removal in NDA via OpenSees program is introduced, and its high accuracy is shown. This developed algorithm can remove any element of structure in different time intervals.…”
    Get full text
    Article
  16. 14596

    Current Trends in the Development of Reporting in the Sphere of Investments in Human Capital by Maryna Resler, Jurij Renkas, Ivan Rusyn

    Published 2024-08-01
    “…In the process of work, a system of updated reporting on the level of payment of human capital of employees was developed, taking into account current needs and the possibility of ranking employees by category. Also, a visual algorithm of the process of forming an updated reporting form from primary documents to the corresponding result was created separately. …”
    Get full text
    Article
  17. 14597

    Improved YOLOX-DeepSORT for Multitarget Detection and Tracking of Automated Port RTG by ZHENGTAO YU, XUEQIN ZHENG, JUN YANG, JINYA SU

    Published 2024-01-01
    “…This article introduces a multitarget detection and tracking (MTDT) algorithm specifically tailored for automated port RTG operations. …”
    Get full text
    Article
  18. 14598

    Dynamic Spatiotemporal Causality Analysis for Network Traffic Flow Based on Transfer Entropy and Sliding Window Approach by Senyan Yang, Lianju Ning, Xilong Cai, Mingyu Liu

    Published 2021-01-01
    “…This study proposes a dynamic spatiotemporal causality modeling approach to analyze traffic causal relationships for the large-scale road network. Transfer entropy algorithm is utilized to detect the spatiotemporal causality of network traffic states based on the extensive traffic time series data, which could measure the amount and direction of information transmission. …”
    Get full text
    Article
  19. 14599

    Redundancy and conflict detection method for label-based data flow control policy by Rongna XIE, Xiaonan FAN, Suzhe LI, Yuxin HUANG, Guozhen SHI

    Published 2023-10-01
    “…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
    Get full text
    Article
  20. 14600

    Calibration of Microscopic Traffic Flow Simulation Models considering Subsets of Links and Parameters by Alexander Paz, Kul Shrestha, Cristian Arteaga, Douglas Baker

    Published 2020-01-01
    “…Traffic volume and speed are the performance measures used in this study, and the methodology is developed without considering the characteristics of a specific traffic flow model. A genetic algorithm was implemented to find a solution to the proposed mathematical program. …”
    Get full text
    Article