Suggested Topics within your search.
Suggested Topics within your search.
-
621
An Efficiency Analysis of Augmented Reality Marker Recognition Algorithm
Published 2014-05-01“…The obtained results demonstrate that augmented reality marker recognition algorithm is accurate and reliable in the case of changing lighting conditions and rotational angles - only 4 % markers were unidentified. …”
Get full text
Article -
622
Chaotic Image Encryption Algorithm Based on Circulant Operation
Published 2013-01-01“…Therefore, it can be adopted as an effective and fast image encryption algorithm.…”
Get full text
Article -
623
A QP-Free Algorithm for Finite Minimax Problems
Published 2014-01-01“…Due to the expensive computation for solving QP subproblems with inequality constraints of SQP algorithms, in this paper, a QP-free algorithm which is also called sequential systems of linear equations algorithm is presented. …”
Get full text
Article -
624
Efficient Orthogonal Bicomplex Bilinear DSP Algorithm Design
Published 2020-01-01“…The present paper describes the development of a new technique for designing orthogonal bicomplex Digital Signal Processing (DSP) algorithms. In contrast to those previously reported on, this novel method is of universal application while being unaffected by either the type or the order of the real digital processing algorithm employed as a prototype. …”
Get full text
Article -
625
Light block cipher algorithm for electric power industry
Published 2015-12-01Subjects: Get full text
Article -
626
Pulmonary hemorrhage in oncologic patients – a diagnostic algorithm
Published 2024-10-01“…The OBJECTIVE was to develop a diagnostic algorithm in oncologic patients with pulmonary hemorrhage.METHODS AND MATERIAL. …”
Get full text
Article -
627
Optimization Models of Sound Systems Using Genetic Algorithms
Published 2021-03-01Get full text
Article -
628
The Extended Hamiltonian Algorithm for the Solution of the Algebraic Riccati Equation
Published 2014-01-01“…We use a second-order learning algorithm for numerically solving a class of the algebraic Riccati equations. …”
Get full text
Article -
629
The Art of Randomness: Sampling and Chance in the Age of Algorithmic Reproduction
Published 2024-10-01Get full text
Article -
630
Chaos-based scramble self-embedding watermarking algorithm
Published 2006-01-01“…A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the wa- termarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effec- tively locate tamper block. …”
Get full text
Article -
631
A topology optimization algorithm for electroelasticity coupled problems
Published 2024-09-01“…A topology optimization algorithm was formulated and implemented (as program code in Python) for bodies under the action of the coupled electric and mechanical fields. …”
Get full text
Article -
632
A Sparsity Preestimated Adaptive Matching Pursuit Algorithm
Published 2021-01-01“…In the matching pursuit algorithm of compressed sensing, the traditional reconstruction algorithm needs to know the signal sparsity. …”
Get full text
Article -
633
An Improved Differential Evolution Algorithm Based on Adaptive Parameter
Published 2013-01-01“…The differential evolution (DE) algorithm is a heuristic global optimization technique based on population which is easy to understand, simple to implement, reliable, and fast. …”
Get full text
Article -
634
Distributed Voronoi coverage algorithm in wireless sensor networks
Published 2010-01-01“…On the hypothesis conditions that wireless sensor networks only covered partial target region and the commu-nication radius was no less than twice of the sensing radius,a coverage-preserved and connected distributed Voronoi cov-erage algorithm was presented.Firstly,a method of detecting coverage redundancy sensors based on the local Voronoi re-gions was proposed,whose computational complexity was unconcerned with the density of sensors.Then,an en-ergy-prior self-scheduling strategy based on local Voronoi neighbors was proposed,where those sensors that were com-munication neighbors but not local Voronoi neighbors could synchronously execute self-scheduling,which improved the astringency of distributed scheduling.The simulation results show that the average number and coverage-degree of active sensors produced by the proposed algorithm are close to the centralized algorithm and smaller than the general distributed algorithm,while the proposed algorithm has more advantages in terms of active sensors’ average energy,scheduling as-tringency and runtime.…”
Get full text
Article -
635
A survey of 3D object detection algorithms
Published 2023-03-01“…3D object detection is a fundamental problem in autonomous driving,virtual reality,robotics,and other applications.Its goal is to extract the most accurate 3D box characterizing interested targets from the disordered point clouds,such as the closest 3D box surrounding the pedestrians or vehicles.The target 3D box's location,size,and orientation are also output.Currently,there are two primary approaches for 3D object detection: (1) pure point cloud based 3D object detection,in which the point clouds are created by binocular vision,RGB-D camera,and lidar; (2) fusion-based 3D object detection based on the fusion of image and point cloud.The various representations of 3D point clouds were introduced.Then representative methods were introduced from three aspects: traditional machine learning techniques; non-fusion deep learning based algorithms; and multimodal fusion-based deep learning algorithms in progressive relation.The algorithms within and across each category were examined and compared,and the differences and connections between the various methods were analyzed thoroughly.Finally,remaining challenges of 3D object detection were discussed and explored.And the primary datasets and metrics used in 3D object detection studies were summarized.…”
Get full text
Article -
636
Improved tree structure anti-collision algorithm of RFID
Published 2015-07-01“…The whole big query tree is divided into several branches,and the work of tag recognition is executed in each branch,thus reducing the probability of tag collision.The proposed algorithm can be divided into prefix determination and branch query two phases.In the prefix determination phase,the prefix of every tag is identified,and each prefix denotes a branch.Traverse each branch by turns to recognize tags; in the branch query phase,backward search strategy and dynamic search method are used.Theoretical analysis and simulation experiment show that when the improved algorithm can improved the overall performance of RFID system from the aspects of the number of queries,time delay,and throughput.…”
Get full text
Article -
637
Mapping Iterative Medical Imaging Algorithm on Cell Accelerator
Published 2011-01-01“…We compare the performance of our proposed algorithm on Cell BE to that of Sun Fire ×4600, a shared memory machine. …”
Get full text
Article -
638
Effect of Population Structures on Quantum-Inspired Evolutionary Algorithm
Published 2014-01-01“…Quantum-inspired evolutionary algorithm (QEA) has been designed by integrating some quantum mechanical principles in the framework of evolutionary algorithms. …”
Get full text
Article -
639
Computational Algorithms and Aesthetic Impact in Animated Visual Effects
Published 2024-01-01Subjects: “…Computational algorithms…”
Get full text
Article -
640
An algorithm and application to efficiently analyse DNA fibre data
Published 2023-03-01Subjects: Get full text
Article