Showing 841 - 860 results of 19,511 for search '"Algorithms"', query time: 0.08s Refine Results
  1. 841

    Low frequency steganography algorithm for H.264/AVC by Guang-lu HUA, Zhi-tang LI, Bing FENG

    Published 2013-09-01
    “…On the basis of analyzing some existing video data hiding algorithms and combining it with the features of H.264/AVC video low frequency coefficients,a new data hiding algorithm based on H.264/AVC low frequency domain was proposed.After quantification of DCT blocks in the low frequency area,three maximum absolute value of the nonzero coefficients were selected and information was embedded with an improved matrix encoding method.Simulation results show that the proposed algorithm can realize real-time embedding and extracting information,great capacity of embedding information,embedded high efficiency and less influence on video quality etc.…”
    Get full text
    Article
  2. 842

    Adversarial patch defense algorithm based on PatchTracker by Zhenjie XIAO, Shiyu HUANG, Feng YE, Liqing HUANG, Tianqiang HUANG

    Published 2024-02-01
    “…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
    Get full text
    Article
  3. 843

    Slow task scheduling algorithm based on node identification by Yun-fei CUI, Xin-ming LI, Yi LI, Dong LIU

    Published 2014-07-01
    “…In order to reduce the influence of the slow task, produced in big data processing, a scheduling algorithm (TQST) combining recognition, speculation and seduction of slow task was proposed. …”
    Get full text
    Article
  4. 844

    An algorithm of blood typing using serological plate images by S.A. Korchagin, E.E. Zaychenkova, D.A. Sharapov, E.I. Ershov, Y.V. Butorin, Y.Y. Vengerov

    Published 2023-12-01
    “…The proposed recognition algorithm allows the alveolus boundaries to be accurately determined and the agglutination degree to be evaluated using a lightweight convolutional neural network. …”
    Get full text
    Article
  5. 845
  6. 846

    Research on the Extraction Algorithm of Dielectric Parameters of Simple Building by Zhongyu Liu, Yuanxi Wang, Lixin Guo, Zhigang Zhong, Zuoyong Nan, Lingfeng Shen, Jiangting Li

    Published 2024-01-01
    “…By combining the particle swarm optimization (PSO) algorithm, the dielectric parameters of the marble targets are successfully inverted. …”
    Get full text
    Article
  7. 847

    A Modified Grey Wolf Algorithm with Applications to Engineering by Vahid Mahboub

    Published 2024-04-01
    “…In this contribution, a modified gray wolf algorithm for use in engineering applications is presented. …”
    Get full text
    Article
  8. 848
  9. 849
  10. 850

    Algorithm for blind separation of PCMA based on CHASE decoding by Jian DU, Ke-xian GONG, Hua PENG

    Published 2015-03-01
    “…On the basis of SOVA-PSP, a novel algorithm for blind separation of PCMA signal was presented based on CHASE decoding. …”
    Get full text
    Article
  11. 851

    New Iterative Method Based on Laplace Decomposition Algorithm by Sabir Widatalla, M. Z. Liu

    Published 2013-01-01
    “…We introduce a new form of Laplace decomposition algorithm (LDA). By this form a new iterative method was achieved in which there is no need to calculate Adomian polynomials, which require so much computational time for higher-order approximations. …”
    Get full text
    Article
  12. 852

    Simultaneous Pose and Correspondence Estimation Based on Genetic Algorithm by Haiwei Yang, Fei Wang, Zhe Li, Hang Dong

    Published 2015-11-01
    “…Although several algorithms have been presented to solve the simultaneous pose and correspondence estimation problem, the correct solution may not be reached to with the traditional random-start initialization method. …”
    Get full text
    Article
  13. 853

    The Transcultural Diabetes Nutrition Algorithm: A Canadian Perspective by Réjeanne Gougeon, John L. Sievenpiper, David Jenkins, Jean-François Yale, Rhonda Bell, Jean-Pierre Després, Thomas P. P. Ransom, Kathryn Camelon, John Dupre, Cyril Kendall, Refaat A. Hegazi, Albert Marchetti, Osama Hamdy, Jeffrey I. Mechanick

    Published 2014-01-01
    “…The Transcultural Diabetes Nutrition Algorithm (tDNA) is a clinical tool designed to facilitate implementation of therapeutic lifestyle recommendations for people with or at risk for type 2 diabetes. …”
    Get full text
    Article
  14. 854

    Improved rule-based backward fuzzy reasoning algorithm by ZHANG Wen1, ZHANG Gui-xu1

    Published 2008-01-01
    “…An improved rule-based backward fuzzy reasoning algorithm was pointed. The algorithm is based on the fuzzy Petri net (FPN) which represents fuzzy production rules. …”
    Get full text
    Article
  15. 855
  16. 856

    A resource allocation algorithm based on double slots by EIPeng L, IYouming L, ITing L, HOUGuili Z, UCaimei F

    Published 2016-05-01
    “…A resource allocation algorithm based on double slots was proposed to minimize the transmitting power in wireless communications.Being aware of the channel difference between the two adjacent slots,the second slot was allocated in advance partial of the data rate conventionally scheduled to the first slot when the corresponding user had perfect channel state.Consequently,most of the required data was loaded by the sub-carriers with fine channel gain and finally less transmitting power was needed.The simulation results indicate that the proposed algorithm can effectively decrease the transmitting power while meeting the users' target rate requirement.…”
    Get full text
    Article
  17. 857

    Privacy-protected crowd-sensed data trading algorithm by Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG

    Published 2022-05-01
    “…To solve the problem that data privacy leakage of participants under the crowd-sensed data trading model, a privacy-protected crowd-sensed data trading algorithm was proposed.Firstly, to achieve the privacy protection of participants, an aggregation scheme based on differential privacy was designed.Participants were no longer needed to upload raw data, but analyzed and calculated the collected data according to the task requirements, and then sent the analysis results to the platform after adding noise in accordance with the privacy budget allocated by the platform to protect their privacy.Secondly, in order to ensure the credibility of participants, a reputation model of participants was proposed.Finally, in order to encourage consumers and participants to participate in transactions, a data trading optimization model was constructed by considering the consumer’s constraint on the result deviation,the participant’s privacy leakage compensation and platform profit, and a POA based on genetic algorithm was proposed to solve the model.The simulation results show that the POA not only protects the privacy of participants, but also increases the profit of the platform by 29.27% and 20.45% compared to VENUS and DPDT, respectively.…”
    Get full text
    Article
  18. 858

    Virtual Network Embedding Algorithm for Diverse Service Request by Hua Qu, Lixia Wang, Jihong Zhao, Henan Wang

    Published 2014-12-01
    “…In order to solve these problems, virtual network embedding algorithm for diverse service requests was proposed. …”
    Get full text
    Article
  19. 859
  20. 860