-
481
Application of the joint clustering algorithm based on Gaussian kernels and differential privacy in lung cancer identification
Published 2025-05-01“…For the LLCS dataset, For the LLCS dataset, the DPFCM_GK demonstrates significant improvement as the privacy budget increases, especially in low-budget scenarios, where the performance gap is most pronounced (T=4.20, 8.44, 10.92, 3.95, 7.16, 8.51, P < 0.05). …”
Get full text
Article -
482
An Improved DGA Feature Clustering-Based Method for Transformer Fault Diagnosis
Published 2025-01-01“…This paper also uses genetic algorithm (GA) to optimize multiple data clustering spaces and improve clustering effect. …”
Get full text
Article -
483
Wireless Energy Transmission Link Optimization considering Microwave Energy Relay
Published 2020-01-01“…Based on the idea of microwave energy relay transmission, the paper constructs a microwave wireless transmission link planning model which considers power relay and uses the evolutionary algorithm to solve the wireless transmission link planning model with two-layer optimization. …”
Get full text
Article -
484
CALCULATION METHODS OF OPTIMAL ADJUSTMENT OF CONTROL SYSTEM THROUGH DISTURBANCE CHANNEL
Published 2014-10-01“…As the automatic control system optimization with proportional plus reset controllers on disturbance channel is an unimodal task, the main algorithm of optimization is realized by Hooke – Jeeves method. …”
Get full text
Article -
485
RESEARCH ON PARAMETRIC ANALYSIS AND MULTI-OBJECTIVE OPTIMIZATION OF CYLINDRICAL PRESSURE STRUCTURE
Published 2021-01-01“…In order to improve the design efficiency and performance of the cylindrical pressure structure,strength and stability analysis methods were determined,the initial scheme was analyzed. the second development of Abaqus software was carried out by using Python language,Abaqus was integrated with i Sight software,the parametric analysis flow of pressure structure was designed,could realize automatic modeling and analysis of cylindrical pressure structure. the most Latin hypercube method was used to selectting the sample points,the sensitivity analysis of the design variables were carried out,The comparison of the fitting accuracy shown that the response surface model had the highest accuracy,the approximate model of the cylindrical pressure structure based on the fourth-order response surface was obtained. the multi-objective optimization model was established,The second generation of non dominated sorting genetic algorithm was used to solving the multi-objective optimization problem,the results shown that the weight of the optimization scheme was reduced,while the ultimate strength was greatly improved,improved the performance of the cylindrical pressure structure.…”
Get full text
Article -
486
Frequency Optimization Objective during System Prototyping on Multi-FPGA Platform
Published 2013-01-01“…Many scenarios are proposed to obtain the most optimized results in terms of prototyping system frequency. …”
Get full text
Article -
487
Optimization of Intelligent English Pronunciation Training System Based on Android Platform
Published 2021-01-01Get full text
Article -
488
Multi-objective Optimization Design of Component Cooling System in HPR1000
Published 2025-03-01“…To manage this complexity, a novel optimization algorithm was implemented to perform multi-objective optimization. …”
Get full text
Article -
489
Bayesian Optimization of insect trap distribution for pest monitoring efficiency in agroecosystems
Published 2025-01-01“…In this study, a Bayesian optimization (BO) algorithm was used to learn more about the optimal distribution of a fine-scale trap network targeting Helicoverpa zea (Boddie), a significant agricultural pest across North America. …”
Get full text
Article -
490
Optimizing Feature Selection for IOT Intrusion Detection Using RFE and PSO
Published 2025-06-01“…Two feature selection mechanisms, which are Particle Swarm Optimization Algorithm (PSO) and Correlation-based Feature Selection Recursive Feature Elimination (RFE) have been used to compare their performances. …”
Get full text
Article -
491
Adaptive Q-Learning Grey Wolf Optimizer for UAV Path Planning
Published 2025-03-01“…Grey Wolf Optimization (GWO) is one of the most popular algorithms for solving such problems. …”
Get full text
Article -
492
Bi-Objective Optimization of Product Selection and Ranking Considering Sequential Search
Published 2025-08-01“…Customer choices in online retailing are often influenced by sequential search behavior. However, most existing models ignore the dynamic property of this process. …”
Get full text
Article -
493
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01Get full text
Article -
494
Bio inspired optimization techniques for disease detection in deep learning systems
Published 2025-05-01“…This work assists researchers in selecting the most effective bio-inspired algorithm for disease categorization, prediction, and the analysis of high-dimensional biomedical data.…”
Get full text
Article -
495
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
496
Optimization of Identification and Zoning Method for Landscape Characters of Urban Historic Districts
Published 2025-01-01“…Then the research utilizes K-means clustering algorithm to optimize the zoning method for historic landscape characters. …”
Get full text
Article -
497
Shape optimization of non-uniform parametric piezoelectric energy harvester beam
Published 2025-04-01“…The model, validated through finite element method (FEM) simulations and experimental data, enables rapid analysis and optimization of PEHs. The Nelder-Mead optimization algorithm was employed to enhance power generation performance across three cross-sectional configurations: rectangular, trapezoidal, and quadratic. …”
Get full text
Article -
498
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
499
Optimized detection of insertions/deletions (INDELs) in whole-exome sequencing data.
Published 2017-01-01Get full text
Article -
500
Classification of finger movements through optimal EEG channel and feature selection
Published 2025-07-01Get full text
Article