Results for 'BrainStrom optimization'

179 found
Order:
  1. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Optimisation of mixed proportion for cement brick containing plastic waste using response surface methodology (RSM).Chuck Chuan Ng - 2022 - Innovative Infrastructure Solutions 7.
    Plastic waste is a significant environmental problem for almost all countries; therefore, protecting the environment from the problem is crucial. The most sensible solution to these problems is substituting the natural aggregates with substantial plastic waste in various building materials. This study aimed to optimise the mixed design ratio of cement brick containing plastic waste as aggregate replacement. Plastic cement brick mixtures were prepared by the incorporation of four different types of plastic waste such as polyethylene terephthalate (PET), high-density polyethylene, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Referent tracking for treatment optimisation in schizophrenic patients.Werner Ceusters & Barry Smith - 2006 - Journal of Web Semantics 4 (3):229-236.
    The IPAP Schizophrenia Algorithm was originally designed in the form of a flow chart to help physicians optimise the treatment of schizophrenic patients. We examined the current version from the perspective of recent work on terminologies and ontologies thereby drawing on the resources of Basic Formal Ontology, and this with the objective to make the algorithm appropriate for Semantic Web applications. We found that Basic Formal Ontology is a rich enough theory to represent all the entities involved and that applying (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  63
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Does optimization imply rationality?Philippe Mongin - 2000 - Synthese 124 (1-2):73 - 111.
    The relations between rationality and optimization have been widely discussed in the wake of Herbert Simon's work, with the common conclusion that the rationality concept does not imply the optimization principle. The paper is partly concerned with adding evidence for this view, but its main, more challenging objective is to question the converse implication from optimization to rationality, which is accepted even by bounded rationality theorists. We discuss three topics in succession: (1) rationally defensible cyclical choices, (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  6. Global Optimization Studies on the 1-D Phase Problem.Jim Marsh, Martin Zwick & Byrne Lovell - 1996 - Int. J. Of General Systems 25 (1):47-59.
    The Genetic Algorithm (GA) and Simulated Annealing (SA), two techniques for global optimization, were applied to a reduced (simplified) form of the phase problem (RPP) in computational crystallography. Results were compared with those of "enhanced pair flipping" (EPF), a more elaborate problem-specific algorithm incorporating local and global searches. Not surprisingly, EPF did better than the GA or SA approaches, but the existence of GA and SA techniques more advanced than those used in this study suggest that these techniques still (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  56
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Optimization Models for Reaction Networks: Information Divergence, Quadratic Programming and Kirchhoff’s Laws.Julio Michael Stern - 2014 - Axioms 109:109-118.
    This article presents a simple derivation of optimization models for reaction networks leading to a generalized form of the mass-action law, and compares the formal structure of Minimum Information Divergence, Quadratic Programming and Kirchhoff type network models. These optimization models are used in related articles to develop and illustrate the operation of ontology alignment algorithms and to discuss closely connected issues concerning the epistemological and statistical significance of sharp or precise hypotheses in empirical science.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  9. Economic rationality and the optimization trap.Nikil Mukerji & Julian Nida-Rümelin - 2015 - St. Gallen Business Review 2015 (1):12-17.
    The theme of this issue of the St. Gallen Business Review is "Harmony". For this reason, we would like to discuss whether two aspects of our life- world are in harmony, namely economic optimization and morality. What is the relation between them? According to a widely shared view, which is one aspect of the doctrine of "mainstream economics", the functioning of an economic system does not require moral behaviour on the part of the individual economic agent. In what follows, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  51
    Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled WSNs, utilizing advanced optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. OPTIMIZATION OF DESTINATION IMAGE: THE ENVIRONMENTAL IMPLICATIONS OF TOURISTS ARRIVALS IN MATABUNGKAY BEACH, LIAN.James Edrian M. Cotacte, Ma Jane Dimple N. Anit, Luzielle F. Fuerte, Maria Aurora R. Marasigan & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (2):61-80.
    This qualitative case study investigates the environmental implications of tourist arrivals in Matabungkay Beach, Lian, and their impact on the destination image. Through in-depth interviews with seven key stakeholders, including local residents, business owners, and environmental activists, the study explores perceptions, concerns, and potential solutions regarding the intersection of tourism and environmental sustainability. Findings reveal a complex relationship between tourism and environmental degradation, with participants expressing concerns about poor waste management, impacts on destination image, and health concerns. These challenges not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Optimization and Beyond.Akshath Jitendranath - 2024 - Journal of Philosophy 121 (3):121-146.
    This paper will be concerned with hard choices—that is, choice situations where an agent cannot make a rationally justified choice. Specifically, this paper asks: if an agent cannot optimize in a given situation, are they facing a hard choice? A pair of claims are defended in light of this question. First, situations where an agent cannot optimize because of incompleteness of the binary preference or value relation constitute a hard choice. Second, situations where agents cannot optimize because the binary preference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  62
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Structural Optimization with Reliability Constraints.John Dalsgaard Sørensen & Palle Thoft-Christensen - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  16. Optimization of commodity stocks enterprise by means of HML-FRM clustering.Igor Britchenko & Maksym Bezpartochnyi - 2020 - Financial and Credit Activity: Problems of Theory and Practice 3 (34(2020)):259-269.
    The article examines the process of formation inventory of the enterprise and determines the optimal volume of commodity resources for sale. A generalization of author’s approaches to the formation and evaluation of inventories of the enterprise is carried out. The marketing-logistic approach was applied for the purpose of distribution groups of commodity resources due to the risk of non-fulfillment the order for the supply of goods of the enterprise. In order to ensure an effective process of commodity provision of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  52
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Combining Optimization and Randomization Approaches for the Design of Clinical Trials.Julio Michael Stern, Victor Fossaluza, Marcelo de Souza Lauretto & Carlos Alberto de Braganca Pereira - 2015 - Springer Proceedings in Mathematics and Statistics 118:173-184.
    t Intentional sampling methods are non-randomized procedures that select a group of individuals for a sample with the purpose of meeting specific prescribed criteria. In this paper we extend previous works related to intentional sampling, and address the problem of sequential allocation for clinical trials with few patients. Roughly speaking, patients are enrolled sequentially, according to the order in which they start the treatment at the clinic or hospital. The allocation problem consists in assigning each new patient to one, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  41
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  21. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Intentional Sampling by Goal Optimization with Decoupling by Stochastic Perturbation.Julio Michael Stern, Marcelo de Souza Lauretto, Fabio Nakano & Carlos Alberto de Braganca Pereira - 2012 - AIP Conference Proceedings 1490:189-201.
    Intentional sampling methods are non-probabilistic procedures that select a group of individuals for a sample with the purpose of meeting specific prescribed criteria. Intentional sampling methods are intended for exploratory research or pilot studies where tight budget constraints preclude the use of traditional randomized representative sampling. The possibility of subsequently generalize statistically from such deterministic samples to the general population has been the issue of long standing arguments and debates. Nevertheless, the intentional sampling techniques developed in this paper explore pragmatic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. e-AIMSS (Electronic Asset Inventory and Management System in School) for Resource Optimization and Organizational Productivity.Antonio C. Ahmad - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (3):109-120.
    This capstone is centered around the development of an efficient electronic property inventory system tailored for school assets, driven by the overarching objective of resource optimization to ensure equitable access to vital materials for all learners. The methodology follows the “ISSO” framework (Ignite, Strategize, Systematize, Operationalize), complemented by a Logical Framework. The project employs a homegrown digitalized system constructed through a waterfall model approach, which undergoes alpha and beta testing. The study’s analysis utilizes a t-Test to evaluate its impact. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Skull-bound perception and precision optimization through culture.Bryan Paton, Josh Skewes, Chris Frith & Jakob Hohwy - 2013 - Behavioral and Brain Sciences 36 (3):222-222.
    Clark acknowledges but resists the indirect mind–world relation inherent in prediction error minimization (PEM). But directness should also be resisted. This creates a puzzle, which calls for reconceptualization of the relation. We suggest that a causal conception captures both aspects. With this conception, aspects of situated cognition, social interaction and culture can be understood as emerging through precision optimization.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26.  28
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The infinite regress of optimization.Philippe Mongin - 1991 - Behavioral and Brain Sciences 14 (2):229-230.
    A comment on Paul Schoemaker's target article in Behavioral and Brain Sciences, 14 (1991), p. 205-215, "The Quest for Optimality: A Positive Heuristic of Science?" (https://doi.org/10.1017/S0140525X00066140). This comment argues that the optimizing model of decision leads to an infinite regress, once internal costs of decision (i.e., information and computation costs) are duly taken into account.
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Many Faces of Attention: why precision optimization is not attention.Madeleine Ransom & Sina Fazelpour - 2020 - In Dina Mendonça, Manuel Curado & Steven S. Gouveia (eds.), The Philosophy and Science of Predictive Processing. New York, NY: Bloomsbury Publishing. pp. 119-139.
    The predictive coding (PC) theory of attention identifies attention with the optimization of the precision weighting of prediction error. Here we provide some challenges for this identification. On the one hand, the precision weighting of prediction error is too broad a phenomenon to be identified with attention because such weighting plays a central role in multimodal integration. Cases of crossmodal illusions such as the rubber hand illusion and the McGurk effect involve the differential precision weighting of prediction error, yet (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  40
    Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Multitask Music-Based Therapy Optimization in Aging Neurorehability by Activation of the Informational Cognitive Centers of Consciousness.Florin Gaiseanu - 2020 - Gerontology and Geriatric Studies 6 (3):1-5.
    The rapid increase of the old age people imposes the reconsideration of the rehabilitation techniques and procedures and/or the development of the existing ones, at least from two points of view: the limitation use of the pharmaceutical drugs because of their secondary effects in the debilitated organisms and their avoidance; the high risk of the induced anxiety states, depression or other symptoms as a consequence of the main disease, i.e. the neuro-degenerative or mobility dysfunctions, limiting again the use of such (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  28
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Big Data Optimization in Machine Learning.Xiaocheng Tang - 2015 - Disertation 1.
    Download  
     
    Export citation  
     
    Bookmark  
  33.  58
    Analysis of the amount of latent carbon in the reconstruction of residential buildings with a multi-objective optimization approach.Nima Amani, Abdulamir Rezasoroush & Ehsan Kiaee - 2024 - International Journal of Energy Sector Management (Ijesm) (ahead-of-print).
    Purpose: Due to the increase in energy demand and the effects of global warming, energy-efficient buildings have gained significant importance in the modern construction industry. To create a suitable framework with the aim of reducing energy consumption in the building sector, the external walls of a residential building were considered with two criteria of global warming potential and energy consumption. -/- Design/methodology/approach: In the first stage, to achieve a nearly zero-energy building, energy analysis was performed for 37 different states of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Isaac Levi Prize 2023: Optimization and Beyond.Akshath Jitendranath - 2024 - Journal of Philosophy 121 (3):1-2.
    This paper will be concerned with hard choices—that is, choice situations where an agent cannot make a rationally justified choice. Specifically, this paper asks: if an agent cannot optimize in a given situation, are they facing a hard choice? A pair of claims are defended in light of this question. First, situations where an agent cannot optimize because of incompleteness of the binary preference or value relation constitute a hard choice. Second, situations where agents cannot optimize because the binary preference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  43
    Automated Phishing Classification Model Utilizing Genetic Optimization and Dynamic Weighting Algorithms.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-530.
    The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced false positives. The proposed model outperformed traditional machine learning algorithms, showing promise for real-world deployment in phishing detection systems. We conclude with suggestions for future improvements, such as incorporating more behavioral data and deploying the system in realtime monitoring applications.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Viés da Escalada, Daemons de Otimização, e a Influência da Narrativa Social Aceleracionista (Hill-Climbing Bias, Optimization Daemons, and the Influence of Accelerated Social Narratives).Nicholas Kluge Corrêa - 2021 - Ciências and Cognição 26 (2):266-276.
    O fenômeno de aceleração social, intimamente ligado a nossa modernização tecnológica e os sistemas políticos e sociais que adotamos, vem sendo alvo de questionamentos por parte da teoria crítica por diversos filósofos e sociólogos, principalmente em relação a se tal "aceleração" seja algo que, possa ser justificável pelo bem comum da sociedade. De fato, as rápidas mudanças que ocorreram no último século causaram uma tremenda mudança em nossos estilos-de-vida, e na maneira como experienciamos o mundo. Que a nossa sociedade mudou (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Otimizacao e Processos Estocasticos Aplicados a Economia e Financas.Julio Michael Stern - manuscript
    Optimization and Stochastic Processes Applied to Economy and Finance. Textbook for the BM&F-USP (Brazilian Mercantile and Futures Exchange - University of Sao Paulo) Master's degree program in Finance.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  44
    OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):362-370.
    Consumer behavior analytics has become a pivotal aspect for businesses to understand and predict customer preferences and actions. The advent of machine learning (ML) algorithms has revolutionized this field by providing sophisticated tools for data analysis, enabling businesses to make data-driven decisions. However, the effectiveness of these ML algorithms significantly hinges on the optimization techniques employed, which can enhance model accuracy and efficiency. This paper explores the application of various optimization techniques in consumer behaviour analytics using machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  56
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  75
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. On Characterizing Efficient and Properly Efficient Solutions for Multi- Objective Programming Problems in a Complex Space.Alhanouf Alburaikan, Hamiden Abd El-Wahed Khalifa & Florentin Smarandache - 2023 - Journal of Optimization in Industrial Engineering 16 (2):369-375.
    In this paper, a complex non- linear programming problem with the two parts (real and imaginary) is considered. The efficient and proper efficient solutions in terms of optimal solutions of related appropriate scalar optimization problems are characterized. Also, the Kuhn-Tuckers' conditions for efficiency and proper efficiency are derived. This paper is divided into two independently parts: The first provides the relationships between the optimal solutions of a complex single-objective optimization problem and solutions of two related real programming problems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  58
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  46
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Mensch, gut siehst du aus! Ethische Betrachtung der heutigen Körperoptimierung: Balancing Autonomie und Fremdbestimmung.Anna Puzio - 2023 - In Sebastian Kistler, Anna Puzio, Anna-Maria Riedl & Werner Veith (eds.), Digitale Transformationen der Gesellschaft. Sozialethische Perspektiven auf den technologischen Wandel. pp. 73-93.
    Ob im Fitnessstudio, in der Mode oder bei der Ernährung – heute wird ständig Körperoptimierung betrieben. Durch neue technologische Entwicklungen wie Neuroimplantate und Brain-Computer-Interfaces (neurologisches Enhancement) wird die Körperoptimierung auf eine neue Ebene gehoben. Mittels Pharmazeutika sollen Kognition (kognitives Enhancement) oder moralische Verhaltensweisen (moralisches Enhancement) verbessert werden, Prothesen werden in den Körper integriert und es werden ästhetisch-chirurgische Eingriffe vorgenommen. 2019 wurden insgesamt 983.432 ästhetische Eingriffe in Deutschland unternommen.1 Im Alltag sind Wearables wie Smartwatches mit ihren Fitnessprogrammen und vielfältige Smartphone-Apps zur (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  60
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  59
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  70
    Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Regulation by Design: Features, Practices, Limitations, and Governance Implications.Kostina Prifti, Jessica Morley, Claudio Novelli & Luciano Floridi - 2024 - Minds and Machines 34 (2):1-23.
    Regulation by design (RBD) is a growing research field that explores, develops, and criticises the regulative function of design. In this article, we provide a qualitative thematic synthesis of the existing literature. The aim is to explore and analyse RBD’s core features, practices, limitations, and related governance implications. To fulfil this aim, we examine the extant literature on RBD in the context of digital technologies. We start by identifying and structuring the core features of RBD, namely the goals, regulators, regulatees, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  41
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 179