-
1161
Improving the convergence velocity of the balancing composite motion optimisation algorithm
Published 2024-12-01Subjects: “…algorithms…”
Get full text
Article -
1162
Joint recommendation algorithm based on tensor completion and user preference
Published 2019-12-01Subjects: “…recommendation algorithm…”
Get full text
Article -
1163
Optimization of shotcrete manipulator motion trajectory based on AIWCPSO algorithm
Published 2024-12-01Subjects: “…multi-segment trajectory planning algorithm…”
Get full text
Article -
1164
Micro-blog topic detection algorithm based on topic model
Published 2016-05-01“…Micro-blog data has the characteristic of real-time,volume,short-text,and noise-rich.So it is a challenge for the traditional topic detection technology.A novel micro-blog topic detection algorithm based on topic model was proposed.Firstly,the micro-blog data was expressed as text word matrix and word relation matrix.The topic word was extracted from the two vectors.Secondly,the topic model was obtained with clustering.Finally,the topic detection of micro-blog was obtained by clustering text and topic model.Experimental results show that the algorithm proposed can effectively detection the text topic,and with the best parameter group of precision,recall rate,F,and the value F is about 95%.…”
Get full text
Article -
1165
ALGORITHMIC THINKING IN HIGHER EDUCATION: DETERMINING OBSERVABLE AND MEASURABLE CONTENT
Published 2024-12-01Subjects: Get full text
Article -
1166
An ultrafast algorithm for ultrafast time-resolved coherent Raman spectroscopy
Published 2025-01-01“…Here, we present an algorithm that achieves a million-fold improvement in computation time compared to existing methods. …”
Get full text
Article -
1167
Skin Lesion Image Segmentation Algorithm Based on MC-UNet
Published 2025-01-01“…The experimental results show that the proposed algorithm outperforms other mainstream algorithms and exhibits superior performance in skin lesion segmentation.…”
Get full text
Article -
1168
Image double fragile watermarking algorithm based on block neighborhood
Published 2023-06-01“…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
Get full text
Article -
1169
Noise-tolerant Grover's algorithm via success-probability prediction
Published 2025-01-01Get full text
Article -
1170
Improved Solutions for the Optimal Coordination of DOCRs Using Firefly Algorithm
Published 2018-01-01“…From the numerical results, it is obvious that the firefly algorithm with certain parameter settings performs better than the other state-of-the-art algorithms.…”
Get full text
Article -
1171
Multi-Objective Genetic Algorithm for Task Assignment on Heterogeneous Nodes
Published 2012-01-01“…This paper presents a task assignment strategy based on genetic algorithms in which multiple and conflicting objectives are simultaneously optimized. …”
Get full text
Article -
1172
Study on satellite adaptive nulling antennas with hybrid genetic algorithm
Published 2006-01-01Subjects: Get full text
Article -
1173
User interest-aware content replica optimized placement algorithm
Published 2014-12-01Subjects: Get full text
Article -
1174
Multi-Strategy Enhanced Slime Mould Algorithm for Optimization Problems
Published 2025-01-01Subjects: “…Slime mould algorithm…”
Get full text
Article -
1175
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01Subjects: Get full text
Article -
1176
Research on architecture and algorithm for code resolution system in the internet of things
Published 2012-11-01Get full text
Article -
1177
Adaptive steganography algorithm in digital image based on Arnold transform
Published 2016-06-01“…Previous adaptive steganography algorithms were based on ordinal and full-embedding method.However,these algorithms might cause the concealment of secret information not good enough.Therefore,a random and non-fully embedding method was proposed to improve the concealment.The image system parameters could be obtained,so that the image full capacity was exactly greater than the length of information for non-full embedding.Moreover,these parameters made steganography more flexibility by reducing the modifications of image.Then,secret information embedding sequence was scrambled based on Arnold transform for the purpose that the steganalyst cannot detect out information orderly.Therefore,the secret information can be more concealed,which can improve the security of the algorithms.Experimental results show that the algorithm not only improves the concealment of steganography but also reduces stego distortion,and random non-full embedding operating can be applied to many other similar algorithms.…”
Get full text
Article -
1178
BLIND SOURCE SEPARATION OF MECHANICAL FAULT BASED ON BAT ALGORITHM
Published 2018-01-01Subjects: “…Bat algorithm…”
Get full text
Article -
1179
Multiobjective Synthesis of Linear Arrays by Using an Improved Genetic Algorithm
Published 2019-01-01“…In this paper, an improved genetic algorithm with dynamic weight vector (IGA-DWV) is proposed for the pattern synthesis of a linear array. …”
Get full text
Article -
1180
Anomaly Detection for Aviation Safety Based on an Improved KPCA Algorithm
Published 2017-01-01“…In this paper, an improved kernel principal component analysis (KPCA) method is proposed to search for signatures of anomalies in flight datasets through the squared prediction error statistics, in which the number of principal components and the confidence for the confidence limit are automatically determined by OpenMP-based K-fold cross-validation algorithm and the parameter in the radial basis function (RBF) is optimized by GPU-based kernel learning method. …”
Get full text
Article