-
2041
Storm‐Time Characteristics of Ionospheric Model (MSAP) Based on Multi‐Algorithm Fusion
Published 2024-01-01“…We use the Multi‐Step Auxiliary Prediction (MSAP) model, a deep learning algorithm, to forecast TEC during geomagnetic storms. …”
Get full text
Article -
2042
An improved video watermarking algorithm with extraction using a mobile device camera
Published 2023-12-01“…However, the development of algorithms that implement this scenario is associated with the problem of balancing between the imperceptibility of embedding and robustness. …”
Get full text
Article -
2043
A Modified Algorithm Based on Haar Wavelets for the Numerical Simulation of Interface Models
Published 2022-01-01Get full text
Article -
2044
Immune algorithm-based base station location optimization in the TD-SCDMA network
Published 2014-05-01Subjects: “…immune algorithm…”
Get full text
Article -
2045
A Review of Foreign Object Debris Detection on Airport Runways: Sensors and Algorithms
Published 2025-01-01“…Radar technologies, such as millimeter-wave radar and synthetic aperture radar, offer robust performance, with advancements in algorithms and sensor fusion significantly enhancing their effectiveness. …”
Get full text
Article -
2046
Robust DWT-HMM image watermarking algorithm optimized with content-adaptive approach
Published 2007-01-01“…A robust watermarking algorithm based on content-adaptive approach was proposed to optimize the tradeoff between robustness and imperceptibility,which was characterized as follows: the entropy masking proposed by Watson etc.was constructed in wavelet domain,which was then used to constitute the integrated HVS model;three different measures,namely,energy,entropy and integrated HVS,for content-adaptive selection were constructed and investigated;repeat-accumulate(RA) code with erasure and error correction was used to tackle the synchronization issue of the exact positions for watermark embedding;and a posteriori DWT-HMM detector was utilized for watermark detection.Simula-tion results show that the proposed content-adaptive watermarking algorithm,under the same imperceptibility,has con-siderable improvement in robustness performance over the traditional one with stochastic approach.…”
Get full text
Article -
2047
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Published 2014-11-01Subjects: Get full text
Article -
2048
Artificial intelligence in the service of entrepreneurial finance: knowledge structure and the foundational algorithmic paradigm
Published 2025-02-01Subjects: Get full text
Article -
2049
Oscillation Between Resist and to Not? Users’ Folk Theories and Resistance to Algorithmic Curation on Douyin
Published 2025-01-01“…An increasing number of users are aware of algorithmically driven content curation. Yet, while numerous studies have examined how people understand algorithmic power, there are insufficient numbers of studies about how people respond to and resist algorithmic curation in different sociocultural contexts. …”
Get full text
Article -
2050
Retracted: Cluster Analysis Algorithm in the Analysis of College Students’ Mental Health Education
Published 2023-01-01Get full text
Article -
2051
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. …”
Get full text
Article -
2052
Dynamic Community in static social networks using the gray wolf optimizer algorithm
Published 2020-03-01Subjects: Get full text
Article -
2053
HaVec: An Efficient de Bruijn Graph Construction Algorithm for Genome Assembly
Published 2017-01-01Get full text
Article -
2054
SHAPE OPTIMIZATION DESIGN OF THE UNDERWATER GLIDER BASED ON SURROGATE OPTIMAL ALGORITHM (MT)
Published 2023-01-01Subjects: Get full text
Article -
2055
Image restoration algorithm based on compensated transmission and adaptive haze concentration coefficient
Published 2020-01-01“…Aiming at the drawbacks of traditional dark channel prior,which was prone to distortion and Halo effects in the bright areas,a haze image restoration algorithm based on compensated transmission and adaptive haze concentration coefficient was proposed.First of all,a Gaussian function was used to fit the attenuation relationship between the haze and haze-free image,and the compensation transmission was set to correct the initial transmission.Then the characteristics of haze was analyzed,the concept of brightness entropy was introduced and the bright channel operation was performed to acquire entropy value with pixel by pixel.Combined with the Gaussian pyramid to extract texture features,the haze distribution map was obtained.An adaptive transformation was established to seek the haze concentration coefficient and get the accurate transmission.Finally,the recovery results were restored by improved atmospheric light value and atmospheric scattering model.Experimental results show that the recovered image has better color and detail,the degree of dehazing is thorough,the brightness is appropriate,and the effect is clear and natural.…”
Get full text
Article -
2056
Data Analysis of College Students’ Mental Health Based on Clustering Analysis Algorithm
Published 2021-01-01“…Based on expounding the advantages and disadvantages of fast-clustering analysis algorithm and hierarchical clustering analysis algorithm, this paper introduces the concept of the two-step clustering algorithm, discusses the algorithm flow of clustering model in detail, and gives the algorithm flow chart. …”
Get full text
Article -
2057
Wiener LMS channel estimation and tracking algorithm for OFDM systems with transmitter diversity
Published 2006-01-01“…A Wiener LMS channel estimating and tracking algorithm for OFDM systems with transmitter diversity was proposed. …”
Get full text
Article -
2058
Evaluation Method of IT English Blended Teaching Quality Based on the Data Mining Algorithm
Published 2021-01-01“…In this paper, we use a data mining algorithm to implement an evaluation method for the interconversion of quantitative data and qualitative concepts and use the IT English mixed teaching model to evaluate and analyze the teaching quality of the course. …”
Get full text
Article -
2059
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
Published 2023-04-01Subjects: Get full text
Article -
2060
Target Positioning with GDOP Assisted Nodes Selection Algorithm in Wireless Sensor Networks
Published 2014-06-01“…This paper proposes GDOP assisted nodes selection (GANS) algorithm to calculate GDOP value of the current geometric distribution. …”
Get full text
Article