Showing 1,161 - 1,180 results of 19,511 for search '"Algorithms"', query time: 0.08s Refine Results
  1. 1161
  2. 1162
  3. 1163
  4. 1164

    Micro-blog topic detection algorithm based on topic model by Hua-jun HUANG, Jun-shan TAN, Jiao-hua QIN

    Published 2016-05-01
    “…Micro-blog data has the characteristic of real-time,volume,short-text,and noise-rich.So it is a challenge for the traditional topic detection technology.A novel micro-blog topic detection algorithm based on topic model was proposed.Firstly,the micro-blog data was expressed as text word matrix and word relation matrix.The topic word was extracted from the two vectors.Secondly,the topic model was obtained with clustering.Finally,the topic detection of micro-blog was obtained by clustering text and topic model.Experimental results show that the algorithm proposed can effectively detection the text topic,and with the best parameter group of precision,recall rate,F,and the value F is about 95%.…”
    Get full text
    Article
  5. 1165
  6. 1166

    An ultrafast algorithm for ultrafast time-resolved coherent Raman spectroscopy by Francesco Mazza, Dirk van den Bekerom

    Published 2025-01-01
    “…Here, we present an algorithm that achieves a million-fold improvement in computation time compared to existing methods. …”
    Get full text
    Article
  7. 1167

    Skin Lesion Image Segmentation Algorithm Based on MC-UNet by Guihua Yang, Bingxing Pan

    Published 2025-01-01
    “…The experimental results show that the proposed algorithm outperforms other mainstream algorithms and exhibits superior performance in skin lesion segmentation.…”
    Get full text
    Article
  8. 1168

    Image double fragile watermarking algorithm based on block neighborhood by Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU

    Published 2023-06-01
    “…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
    Get full text
    Article
  9. 1169
  10. 1170

    Improved Solutions for the Optimal Coordination of DOCRs Using Firefly Algorithm by Muhammad Sulaiman, Waseem, Shakoor Muhammad, Asfandyar Khan

    Published 2018-01-01
    “…From the numerical results, it is obvious that the firefly algorithm with certain parameter settings performs better than the other state-of-the-art algorithms.…”
    Get full text
    Article
  11. 1171

    Multi-Objective Genetic Algorithm for Task Assignment on Heterogeneous Nodes by Carolina Blanch Perez del Notario, Rogier Baert, Maja D'Hondt

    Published 2012-01-01
    “…This paper presents a task assignment strategy based on genetic algorithms in which multiple and conflicting objectives are simultaneously optimized. …”
    Get full text
    Article
  12. 1172
  13. 1173
  14. 1174
  15. 1175
  16. 1176
  17. 1177

    Adaptive steganography algorithm in digital image based on Arnold transform by Qi LI, Xin LIAO, Guo-qing QU, Guo-yong CHEN, Jiao DU

    Published 2016-06-01
    “…Previous adaptive steganography algorithms were based on ordinal and full-embedding method.However,these algorithms might cause the concealment of secret information not good enough.Therefore,a random and non-fully embedding method was proposed to improve the concealment.The image system parameters could be obtained,so that the image full capacity was exactly greater than the length of information for non-full embedding.Moreover,these parameters made steganography more flexibility by reducing the modifications of image.Then,secret information embedding sequence was scrambled based on Arnold transform for the purpose that the steganalyst cannot detect out information orderly.Therefore,the secret information can be more concealed,which can improve the security of the algorithms.Experimental results show that the algorithm not only improves the concealment of steganography but also reduces stego distortion,and random non-full embedding operating can be applied to many other similar algorithms.…”
    Get full text
    Article
  18. 1178
  19. 1179

    Multiobjective Synthesis of Linear Arrays by Using an Improved Genetic Algorithm by Bo Yang

    Published 2019-01-01
    “…In this paper, an improved genetic algorithm with dynamic weight vector (IGA-DWV) is proposed for the pattern synthesis of a linear array. …”
    Get full text
    Article
  20. 1180

    Anomaly Detection for Aviation Safety Based on an Improved KPCA Algorithm by Xiaoyu Zhang, Jiusheng Chen, Quan Gan

    Published 2017-01-01
    “…In this paper, an improved kernel principal component analysis (KPCA) method is proposed to search for signatures of anomalies in flight datasets through the squared prediction error statistics, in which the number of principal components and the confidence for the confidence limit are automatically determined by OpenMP-based K-fold cross-validation algorithm and the parameter in the radial basis function (RBF) is optimized by GPU-based kernel learning method. …”
    Get full text
    Article