Showing 701 - 720 results of 31,575 for search '"algorithm"', query time: 0.13s Refine Results
  1. 701

    Image zero-watermarking algorithm based on region of interest by ZHANG Li-bao, MA Xin-yue, CHEN Qi

    Published 2009-01-01
    “…Based on ROI, a new watermarking algorithm was proposed.First, ROI was selected.Then, the wavelet transform was executed and ROI mask was constructed.Finally, the zero-watermarking was designed for the wavelet coefficients in ROI mask.The experimental results show that the zero-watermarking is more robust in the new algorithm than others that are not designed for ROI when the ROI of image is decoded at higher quality than the background.Additionally, the new algorithm can ensure ROI not to be disturbed by the watermarking information because of the zero-watermarking.…”
    Get full text
    Article
  2. 702
  3. 703

    A Novel Hybrid Self-Adaptive Bat Algorithm by Iztok Fister, Simon Fong, Janez Brest, Iztok Fister

    Published 2014-01-01
    “…Nature-inspired algorithms attract many researchers worldwide for solving the hardest optimization problems. …”
    Get full text
    Article
  4. 704

    The application of improved DTW algorithm in sports posture recognition by Changjiang Niu

    Published 2024-12-01
    “…A novel algorithmic model for postures recognition is proposed. …”
    Get full text
    Article
  5. 705

    Iterative Algorithms for the Split Problem and Its Convergence Analysis by Zhangsong Yao, Arif Rafiq, Shin Min Kang, Li-Jun Zhu

    Published 2014-01-01
    “…In this paper, the split common fixed point problem associated with the pseudocontractions is studied. An iterative algorithm has been presented for solving the split common fixed point problem. …”
    Get full text
    Article
  6. 706
  7. 707

    Efficient inter mode selection algorithm for H.264 by LU Lu, ZHOU Wei

    Published 2006-01-01
    “…The simulation results show that the algorithm can remarkably decrease the complexity at the encoder while keeping satisfying coding efficiency.…”
    Get full text
    Article
  8. 708

    Hierarchical Quantum Architecture Search for Variational Quantum Algorithms by Tong Zhao, Bo Chen, Guanting Wu, Liang Zeng

    Published 2024-01-01
    “…Designing efficient variational quantum algorithms (VQAs) is crucial for transforming the theoretical advantages of quantum algorithms into practical applications. …”
    Get full text
    Article
  9. 709

    Comparison of algorithms for the recognition of ChatGPT paraphrased texts by Aleksandar Kartelj, Miljana Mladenović, Staša Vujičić Stanković

    Published 2025-02-01
    “…We then comprehensively compare 19 widely used classification algorithms based on two feature sets: word unigrams and character multigrams. …”
    Get full text
    Article
  10. 710
  11. 711

    Quantum algorithm for bioinformatics to compute the similarity between proteins by Anthony Chagneau, Yousra Massaoudi, Imene Derbali, Linda Yahiaoui

    Published 2024-12-01
    “…The authors propose a quantum method for generating random sequences based on occurrence in a protein database and quantum algorithms for calculating a similarity rate between proteins. …”
    Get full text
    Article
  12. 712
  13. 713

    Cooperative coevolution algorithm with covariance analysis for differential evolution by Bin WANG, Lu REN, Xiaofan WANG, Yajuan CAO

    Published 2023-01-01
    “…With the increase of the number of decision variables, cooperative coevolution algorithm is easy to fall into local optimization in the process of searching the global optimal solution in large-scale high-dimensional optimization problems.Based on this, a cooperative coevolution algorithm with covariance analysis for differential evolution was proposed.After the optimization problems were grouped according to the correlation between the decision variables, the correlation between the internal variables of the subcomponents would affect the population evolution process.In the process of subcomponent optimization, covariance was used to calculate the characteristic vector of population distribution, and the correlation between variables was eliminated through coordinate rotation, which effectively avoided falling into local optimization in the process of population search and speeded up the optimization speed of the algorithm.Comparative experiments were carried out on the CEC 2014 test suite.The experimental results show that the proposed algorithm is feasible.…”
    Get full text
    Article
  14. 714
  15. 715

    Algorithms for Solving the Equilibrium Composition Model of Arc Plasma by Zhongyuan Chi, Yuzhang Ji, Ningning Liu, Tianchi Jiang, Xin Liu, Weijun Zhang

    Published 2024-12-01
    “…In the present study, the Homotopy Levenberg−Marquardt Algorithm (HLMA) and the Parameter Variation Levenberg–Marquardt Algorithm (PV–LMA), both developed in the context of high-temperature composition, are proposed to address the equilibrium composition model of plasma under the condition of local thermodynamic and chemical equilibrium. …”
    Get full text
    Article
  16. 716

    Multipath congestion control algorithm based on link capacity by Zhu WANG, Qingyun YUAN, Fanfan HAO, Liang FANG, Fenghua LI

    Published 2020-05-01
    “…Factors such as link differences and TCP friendliness constraints lead to the problem of unfair bandwidth allocation when the TCP congestion control mechanism was applied directly to multi-path transmission.To address the problem,it was proposed that a multipath congestion control algorithm was based on link capacity.The proposed algorithm which was based on the concept of feedback regulation achieved multipath joint congestion control by establishing the M/M/1 cache queue model to adjust the throughput rate of senders.Experimental results show the proposed algorithm can improve the multipath transmission bandwidth utilization and the multipath congestion control algorithm responsiveness,and ensure the fairness of multipath transmission.…”
    Get full text
    Article
  17. 717
  18. 718

    Low frequency steganography algorithm for H.264/AVC by Guang-lu HUA, Zhi-tang LI, Bing FENG

    Published 2013-09-01
    “…On the basis of analyzing some existing video data hiding algorithms and combining it with the features of H.264/AVC video low frequency coefficients,a new data hiding algorithm based on H.264/AVC low frequency domain was proposed.After quantification of DCT blocks in the low frequency area,three maximum absolute value of the nonzero coefficients were selected and information was embedded with an improved matrix encoding method.Simulation results show that the proposed algorithm can realize real-time embedding and extracting information,great capacity of embedding information,embedded high efficiency and less influence on video quality etc.…”
    Get full text
    Article
  19. 719

    Adversarial patch defense algorithm based on PatchTracker by Zhenjie XIAO, Shiyu HUANG, Feng YE, Liqing HUANG, Tianqiang HUANG

    Published 2024-02-01
    “…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
    Get full text
    Article
  20. 720