Showing 14,941 - 14,960 results of 19,511 for search '"algorithm"', query time: 0.12s Refine Results
  1. 14941

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. …”
    Get full text
    Article
  2. 14942

    Experimental Characterisation of the Interfacial Structure during Counter-Current Flow Limitation in a Model of the Hot Leg of a PWR by Christophe Vallée, Toshifumi Nariai, Takashi Futatsugi, Akio Tomiyama, Dirk Lucas, Michio Murase

    Published 2012-01-01
    “…The structure of the interface was observed from the side of the channel test section using a high-speed video camera. An algorithm was developed to recognise the stratified interface in the camera frames after background subtraction. …”
    Get full text
    Article
  3. 14943

    Fast Detection of Deceptive Reviews by Combining the Time Series and Machine Learning by Minjuan Zhong, Zhenjin Li, Shengzong Liu, Bo Yang, Rui Tan, Xilong Qu

    Published 2021-01-01
    “…Secondly, a co-training two-view semisupervised learning algorithm was performed in each captured interval, in which linguistic cues, metadata, and user purchase behaviors were synthetically employed to classify the reviews and check whether they are spam ones or not. …”
    Get full text
    Article
  4. 14944

    Advanced Text Summarization Model Incorporating NLP Techniques and Feature-Based Scoring by Estabraq Abdulreda Kadhim, Mohammad-Reza Feizi-Derakhshi, Hadi S. Aghdasi

    Published 2025-01-01
    “…This study’s summarization algorithm was tested using the CNN, XSum and BBC Summarization datasets, which aggregate documents from different areas. …”
    Get full text
    Article
  5. 14945

    ANALYSIS OF THE PRESSURE DISTRIBUTION ON RAIL SEAT OF CONCRETE SLEEPERS UNDER 40- TONNE AXLE LOAD by AN BoYang, YANG JiZhong, LIU Chao, ZHAO Xin, WEN ZeFeng, JIN XueSong

    Published 2016-01-01
    “…The FE model is first validated by comparing the calculated results with those of a traditional simplified algorithm. More results have shown that( 1) the typical heavy haul track structure in China can meet the requirements of 40- tonne axle load,but the stress on the top of subgrade exceeds the bearing capacity considered in normal design;( 2) with the increase of the lateral wheel-rail contact force,the width( along the lateral) of the contact patch between the railpad and the sleeper decreases and the length keeps almost unchanged,thereby the maximum pressure increases and its location moves towards the field side in the lateral;( 3) Under the typical wheel-rail contact forces,the pressure distribution on the rail seat changes significantly when the stiffness of the railpad increases from 80 MN / m to 200 MN / m,while un-affected as the stiffness further increases to 1300 MN / m;( 4) Assuming a constant dynamic amplification factor,the pressure on the rail seat decreases as the rail fastening system fails,and correspondingly,the shape of contact patch between the rail pad and the sleeper becomes more irregular due to less constraints.…”
    Get full text
    Article
  6. 14946

    ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF by Yuan Zhong, Pengfei Chen, Huxing Zhang

    Published 2025-01-01
    “…Our results show that ESX’s rule-mining algorithm achieves over 99% accuracy in generating access control policies, using only 40% of the log entries for mining. …”
    Get full text
    Article
  7. 14947

    Recent Progress about Flight Delay under Complex Network by Tang Zhixing, Huang Shan, Han Songchen

    Published 2021-01-01
    “…This may be achieved by analyzing flight delay in frequency domain instead of time domain. (4) Summation of most critical nodes/edges may not be the most crucial group to network resilience or flight delay propagations. Effective algorithm for most influential sequence is to be developed.…”
    Get full text
    Article
  8. 14948

    Assessing Hydropower Potential in Nepal’s Sunkoshi River Basin: An Integrated GIS and SWAT Hydrological Modeling Approach by Rinki Bhattarai, Binaya Kumar Mishra, Deepa Bhattarai, Dipendra Khatiwada, Pankaj Kumar, Gowhar Meraj

    Published 2024-01-01
    “…The Sequential Uncertainty Fitting Version 2 (SUFI-2) algorithm, integrated within the SWAT Calibration and Uncertainty Program (SWAT-CUP), was employed to calibrate and validate the model. …”
    Get full text
    Article
  9. 14949

    Retinal Fundus Image Enhancement Using the Normalized Convolution and Noise Removing by Peishan Dai, Hanwei Sheng, Jianmei Zhang, Ling Li, Jing Wu, Min Fan

    Published 2016-01-01
    “…First, the original retinal fundus image was processed by the normalized convolution algorithm with a domain transform to obtain an image with the basic information of the background. …”
    Get full text
    Article
  10. 14950

    Defense mechanism of SDN application layer against DDoS attack based on API call management by Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU

    Published 2022-04-01
    “…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
    Get full text
    Article
  11. 14951

    Optimal Bus-Bridging Service under a Metro Station Disruption by Haodong Yin, Jianjun Wu, Huijun Sun, Yunchao Qu, Xin Yang, Bo Wang

    Published 2018-01-01
    “…Two main contributions are made: (1) a three-layer discrete choice behavior model is developed to analyze the dynamic passenger flow demand under station disruption; and (2) an integrated algorithm is designed to manage and control the station disruption crisis by providing additional bus-bridging services with the objective of minimizing the total travel time of affected passengers and the operating cost of bridging-buses. …”
    Get full text
    Article
  12. 14952

    Testing convolutional neural network based deep learning systems: a statistical metamorphic approach by Faqeer ur Rehman, Clemente Izurieta

    Published 2025-01-01
    “…Furthermore, we also propose an MRs minimization algorithm for the CUT, thus saving computational costs and organizational testing resources.…”
    Get full text
    Article
  13. 14953

    Using the clustering method to find the final environmental parameters coefficients in road construction projects by Eshagh Rasouli Sarabi, Ramin Vafaei Poursorkhabi, Mehdi Ravanshadnia

    Published 2025-02-01
    “…In the first phase, the Genetic Optimization Algorithm was implemented to determine convenient coefficients for the relevant parameters. …”
    Get full text
    Article
  14. 14954

    Effects of Regional Trade Agreement to Local and Global Trade Purity Relationships by Siyu Huang, Wensha Gou, Hongbo Cai, Xiaomeng Li, Qinghua Chen

    Published 2020-01-01
    “…Here, we separate the influence of geographical distance, economic volume, and overall increase in transportation and labor costs and use the expectation maximization algorithm to optimize the parameters and quantify the trade purity indicator, which describes the true global trade environment and relationships among countries. …”
    Get full text
    Article
  15. 14955

    Deep learning models for detection of explosive ordnance using autonomous robotic systems: trade-off between accuracy and real-time processing speed by Vadym Mishchuk, Herman Fesenko, Vyacheslav Kharchenko

    Published 2024-11-01
    “…The main contribution of this study is the results of a detailed evaluation of the YOLOv8 and RT-DETR models for real-time EO detection, helping to find trade-offs between the speed and accuracy of each model and emphasizing the need for special datasets and algorithm optimization to improve the reliability of EO detection in autonomous systems.…”
    Get full text
    Article
  16. 14956

    Extreme‐Event Magnetic Storm Probabilities Derived From Rank Statistics of Historical Dst Intensities for Solar Cycles 14–24 by Jeffrey J. Love

    Published 2021-04-01
    “…Three different models are fitted to the cycle‐ranked −Dst1 and −Dst2 values using a maximum‐likelihood algorithm: A Gumbel model, an unconstrained Generalized‐Extreme‐Value model, and a Weibull model constrained to have a physically justified maximum storm intensity of −Dstm = 2500 nT. …”
    Get full text
    Article
  17. 14957

    Global foot-and-mouth disease risk assessment based on multiple spatial analysis and ecological niche model by Qi An, Yiyang Lv, Yuepeng Li, Zhuo Sun, Xiang Gao, Hongbin Wang

    Published 2025-12-01
    “…This study utilized multi-distance spatial cluster analysis, kernel density analysis, directional distribution analysis to investigate the spatial distribution patterns of historical FMD epidemics. A multi-algorithm ensemble model considering climatic, geographic, and social factors was developed to predict the suitability area for FMDV, and then risk maps of FMD for each species of livestock were generated in combination with the distribution of livestock. …”
    Get full text
    Article
  18. 14958

    Optimizing Solar Energy Harvesting: A K‐Means Clustering Approach for Enhanced Efficiency and Viability by Li Bin, Muhammad Shahzad, Muhammad Farhan, Muhammad Sanaullah Khan, Mubaarak Abdulrahman Abdu Saif, Girmaw Teshager Bitew

    Published 2025-01-01
    “…This research introduces an innovative synthesis method for a typical solar radiation year (TSRY) based on K‐means clustering to maximize energy harvest. The K‐means algorithm, a fundamental image processing technique, is utilized to classify images into distinct groups. …”
    Get full text
    Article
  19. 14959

    An improved Fully Homomorphic Encryption model based on N-Primes by Mohammed Anwar Mohammed, Fadhil Salman Abed

    Published 2019-10-01
    “…The security of the presumptive algorithm to be more efficient in front of the security challenges facing cloud computing. …”
    Get full text
    Article
  20. 14960

    Comparative Study of Statistical Features to Detect the Target Event During Disaster by Madichetty Sreenivasulu, M. Sridevi

    Published 2020-06-01
    “…Therefore, SVM (linear kernel) with proposed features is applied for detecting the earthquake during disaster. The proposed algorithm is tested on Nepal earthquake and landslide datasets, 2015.…”
    Get full text
    Article