Showing 1,941 - 1,960 results of 2,679 for search 'decision three algorithm.', query time: 0.18s Refine Results
  1. 1941
  2. 1942
  3. 1943

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  4. 1944
  5. 1945
  6. 1946
  7. 1947
  8. 1948
  9. 1949
  10. 1950

    The association between cystatin C and hypertension risk in diabetes patients: A multi-cohort cross-sectional study by Ye Kuang, Jia Wang, Yang Wang, Chuanmei Peng, Pei He, Yong Ji, Jinrong Tian, Yong Yuan, Lei Feng

    Published 2025-07-01
    “…Analyzing 5210 DM patients from three cohorts, this study identified serum cystatin C (CysC) as an independent risk factor for DM + HTN through univariate and multivariate logistic regression. …”
    Get full text
    Article
  11. 1951
  12. 1952
  13. 1953
  14. 1954
  15. 1955

    Novel nocturnal insect pest monitoring for sustainable crop protection using ensemble augmented deep learning classification by Hui Zhao, Bo Fu, Fernando Auat Cheein, Matthew Butler, W. Edwin Harris, Tom W. Pope, Joe M. Roberts

    Published 2025-12-01
    “…The proposed framework strategically integrates a lightweight network model with adaptive ensemble augmentation mechanisms to comprehensively address three core data challenges: (1) chromatic variance under varying illumination conditions, (2) partial occlusion from pest aggregation, and (3) morphological deformation during specimen collection. …”
    Get full text
    Article
  16. 1956

    Oral contrast-enhanced ultrasonographic features and radiomics analysis to predict NIH risk stratification for gastrointestinal stromal tumors by Fan Yang, Fan Yang, Fan Yang, Fan Yang, Chun-wei Liu, Dai Zhang, Dai Zhang, Dai Zhang, Dai Zhang, Hai-Ling Wang, Hai-Ling Wang, Hai-Ling Wang, Hai-Ling Wang, Xi Wei, Xi Wei, Xi Wei, Xi Wei, Mo Yang, Mo Yang, Mo Yang

    Published 2025-07-01
    “…The patient dataset was randomly divided into a training set and a validation set at a ratio of 7:3. Leveraging the XGBoost (XGB) algorithm within the Scikit-learn (Sklearn) machine-learning library, three distinct predictive models were developed: a clinical ultrasound imaging model (US model), an ultrasonographic radiomics model (US radiomics model), and a combined model integrating both clinical, ultrasound, and radiomics features. …”
    Get full text
    Article
  17. 1957

    Enhanced cardiovascular risk prediction in the Western Pacific: A machine learning approach tailored to the Malaysian population. by Sazzli Kasim, Putri Nur Fatin Amir Rudin, Sorayya Malek, Nurulain Ibrahim, Xue Ning Kiew, Nafiza Mat Nasir, Khairul Shafiq Ibrahim, Raja Ezman Raja Shariff

    Published 2025-01-01
    “…Ensemble model were also created using three commonly used meta learners, including RF, Generalized Linear Model (GLM), and Gradient Boosting Model (GBM). …”
    Get full text
    Article
  18. 1958

    A manganese metabolism-related gene signature stratifies prognosis and immunotherapy efficacy in kidney cancer by Yang Liu, Hao Ye, Ruoxuan Zhang, Xiaolong Liu, Ranlu Liu

    Published 2025-07-01
    “…Through integrated bioinformatics approaches, including differential expression analysis, univariate Cox regression, and three machine learning algorithms (Boruta, GBM, and RFS), we identified prognosis-related MMCG. …”
    Get full text
    Article
  19. 1959

    Artificial Intelligence-Based Prediction of Bloodstream Infections Using Standard Hematological and Biochemical Markers by Ferhat DEMİRCİ, Murat AKŞİT, Aylin DEMİRCİ

    Published 2025-08-01
    “…Basophil count, while ranked highest by SHAP, showed low sensitivity, highlighting the difference between algorithmic weight and bedside utility. Conclusion: These findings support the integration of routine, readily available laboratory data into an explainable AI framework to accurately predict culture positivity. …”
    Get full text
    Article
  20. 1960

    A recurrence model for non-puerperal mastitis patients based on machine learning. by Gaosha Li, Qian Yu, Feng Dong, Zhaoxia Wu, Xijing Fan, Lingling Zhang, Ying Yu

    Published 2025-01-01
    “…<h4>Results</h4>The logistic regression model emerged as the optimal model for predicting recurrence of NPM with machine learning, primarily utilizing three variables: FIB, bacterial infection, and CD4+ T cell count. …”
    Get full text
    Article