-
841
Low frequency steganography algorithm for H.264/AVC
Published 2013-09-01“…On the basis of analyzing some existing video data hiding algorithms and combining it with the features of H.264/AVC video low frequency coefficients,a new data hiding algorithm based on H.264/AVC low frequency domain was proposed.After quantification of DCT blocks in the low frequency area,three maximum absolute value of the nonzero coefficients were selected and information was embedded with an improved matrix encoding method.Simulation results show that the proposed algorithm can realize real-time embedding and extracting information,great capacity of embedding information,embedded high efficiency and less influence on video quality etc.…”
Get full text
Article -
842
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01“…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
Get full text
Article -
843
Slow task scheduling algorithm based on node identification
Published 2014-07-01“…In order to reduce the influence of the slow task, produced in big data processing, a scheduling algorithm (TQST) combining recognition, speculation and seduction of slow task was proposed. …”
Get full text
Article -
844
An algorithm of blood typing using serological plate images
Published 2023-12-01“…The proposed recognition algorithm allows the alveolus boundaries to be accurately determined and the agglutination degree to be evaluated using a lightweight convolutional neural network. …”
Get full text
Article -
845
Distributed aggregate algorithm for average query based on WSN
Published 2008-01-01Subjects: Get full text
Article -
846
Research on the Extraction Algorithm of Dielectric Parameters of Simple Building
Published 2024-01-01“…By combining the particle swarm optimization (PSO) algorithm, the dielectric parameters of the marble targets are successfully inverted. …”
Get full text
Article -
847
A Modified Grey Wolf Algorithm with Applications to Engineering
Published 2024-04-01“…In this contribution, a modified gray wolf algorithm for use in engineering applications is presented. …”
Get full text
Article -
848
Assembly Sequence Optimization based on Improved Genetic Algorithm
Published 2016-01-01Subjects: Get full text
Article -
849
Tabu Search Algorithm for Optimization of Blood Distribution Routes
Published 2023-08-01Subjects: Get full text
Article -
850
Algorithm for blind separation of PCMA based on CHASE decoding
Published 2015-03-01“…On the basis of SOVA-PSP, a novel algorithm for blind separation of PCMA signal was presented based on CHASE decoding. …”
Get full text
Article -
851
New Iterative Method Based on Laplace Decomposition Algorithm
Published 2013-01-01“…We introduce a new form of Laplace decomposition algorithm (LDA). By this form a new iterative method was achieved in which there is no need to calculate Adomian polynomials, which require so much computational time for higher-order approximations. …”
Get full text
Article -
852
Simultaneous Pose and Correspondence Estimation Based on Genetic Algorithm
Published 2015-11-01“…Although several algorithms have been presented to solve the simultaneous pose and correspondence estimation problem, the correct solution may not be reached to with the traditional random-start initialization method. …”
Get full text
Article -
853
The Transcultural Diabetes Nutrition Algorithm: A Canadian Perspective
Published 2014-01-01“…The Transcultural Diabetes Nutrition Algorithm (tDNA) is a clinical tool designed to facilitate implementation of therapeutic lifestyle recommendations for people with or at risk for type 2 diabetes. …”
Get full text
Article -
854
Improved rule-based backward fuzzy reasoning algorithm
Published 2008-01-01“…An improved rule-based backward fuzzy reasoning algorithm was pointed. The algorithm is based on the fuzzy Petri net (FPN) which represents fuzzy production rules. …”
Get full text
Article -
855
OPTIMIZATION OF BLADE DEFLECTION BASED ON HYBRID GENETIC ALGORITHM
Published 2021-01-01Subjects: Get full text
Article -
856
A resource allocation algorithm based on double slots
Published 2016-05-01“…A resource allocation algorithm based on double slots was proposed to minimize the transmitting power in wireless communications.Being aware of the channel difference between the two adjacent slots,the second slot was allocated in advance partial of the data rate conventionally scheduled to the first slot when the corresponding user had perfect channel state.Consequently,most of the required data was loaded by the sub-carriers with fine channel gain and finally less transmitting power was needed.The simulation results indicate that the proposed algorithm can effectively decrease the transmitting power while meeting the users' target rate requirement.…”
Get full text
Article -
857
Privacy-protected crowd-sensed data trading algorithm
Published 2022-05-01“…To solve the problem that data privacy leakage of participants under the crowd-sensed data trading model, a privacy-protected crowd-sensed data trading algorithm was proposed.Firstly, to achieve the privacy protection of participants, an aggregation scheme based on differential privacy was designed.Participants were no longer needed to upload raw data, but analyzed and calculated the collected data according to the task requirements, and then sent the analysis results to the platform after adding noise in accordance with the privacy budget allocated by the platform to protect their privacy.Secondly, in order to ensure the credibility of participants, a reputation model of participants was proposed.Finally, in order to encourage consumers and participants to participate in transactions, a data trading optimization model was constructed by considering the consumer’s constraint on the result deviation,the participant’s privacy leakage compensation and platform profit, and a POA based on genetic algorithm was proposed to solve the model.The simulation results show that the POA not only protects the privacy of participants, but also increases the profit of the platform by 29.27% and 20.45% compared to VENUS and DPDT, respectively.…”
Get full text
Article -
858
Virtual Network Embedding Algorithm for Diverse Service Request
Published 2014-12-01“…In order to solve these problems, virtual network embedding algorithm for diverse service requests was proposed. …”
Get full text
Article -
859
Teaching Evaluation Algorithm Based on Grey Relational Analysis
Published 2021-01-01Get full text
Article -
860
Retracted: Study on the Macroeconomic Model Based on the Genetic Algorithm
Published 2023-01-01Get full text
Article