Suggested Topics within your search.
Suggested Topics within your search.
-
1061
An Attribute Graph Embedding Algorithm for Sensing Topological and Attribute Influence
Published 2024-11-01“…Specifically, the proposed algorithm fuses topology information and attribute information using a lightweight sampling strategy, constructs an unbiased graph self-encoder on the sampled graph, implements topology aggregation and attribute aggregation, respectively, models the correlation between topology embedding and attribute embedding, and considers multi-level loss terms.…”
Get full text
Article -
1062
Optimization of shotcrete manipulator motion trajectory based on AIWCPSO algorithm
Published 2024-12-01Subjects: “…multi-segment trajectory planning algorithm…”
Get full text
Article -
1063
Micro-blog topic detection algorithm based on topic model
Published 2016-05-01“…Micro-blog data has the characteristic of real-time,volume,short-text,and noise-rich.So it is a challenge for the traditional topic detection technology.A novel micro-blog topic detection algorithm based on topic model was proposed.Firstly,the micro-blog data was expressed as text word matrix and word relation matrix.The topic word was extracted from the two vectors.Secondly,the topic model was obtained with clustering.Finally,the topic detection of micro-blog was obtained by clustering text and topic model.Experimental results show that the algorithm proposed can effectively detection the text topic,and with the best parameter group of precision,recall rate,F,and the value F is about 95%.…”
Get full text
Article -
1064
ALGORITHMIC THINKING IN HIGHER EDUCATION: DETERMINING OBSERVABLE AND MEASURABLE CONTENT
Published 2024-12-01Subjects: Get full text
Article -
1065
An ultrafast algorithm for ultrafast time-resolved coherent Raman spectroscopy
Published 2025-01-01“…Here, we present an algorithm that achieves a million-fold improvement in computation time compared to existing methods. …”
Get full text
Article -
1066
Skin Lesion Image Segmentation Algorithm Based on MC-UNet
Published 2025-01-01“…The experimental results show that the proposed algorithm outperforms other mainstream algorithms and exhibits superior performance in skin lesion segmentation.…”
Get full text
Article -
1067
Image double fragile watermarking algorithm based on block neighborhood
Published 2023-06-01“…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
Get full text
Article -
1068
Noise-tolerant Grover's algorithm via success-probability prediction
Published 2025-01-01Get full text
Article -
1069
Improved Solutions for the Optimal Coordination of DOCRs Using Firefly Algorithm
Published 2018-01-01“…From the numerical results, it is obvious that the firefly algorithm with certain parameter settings performs better than the other state-of-the-art algorithms.…”
Get full text
Article -
1070
Multi-Objective Genetic Algorithm for Task Assignment on Heterogeneous Nodes
Published 2012-01-01“…This paper presents a task assignment strategy based on genetic algorithms in which multiple and conflicting objectives are simultaneously optimized. …”
Get full text
Article -
1071
Study on satellite adaptive nulling antennas with hybrid genetic algorithm
Published 2006-01-01Subjects: Get full text
Article -
1072
User interest-aware content replica optimized placement algorithm
Published 2014-12-01Subjects: Get full text
Article -
1073
Multi-Strategy Enhanced Slime Mould Algorithm for Optimization Problems
Published 2025-01-01Subjects: “…Slime mould algorithm…”
Get full text
Article -
1074
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01Subjects: Get full text
Article -
1075
Research on architecture and algorithm for code resolution system in the internet of things
Published 2012-11-01Get full text
Article -
1076
Dynamic path planning using a modified genetic algorithm
Published 2024-08-01Subjects: Get full text
Article -
1077
Adaptive steganography algorithm in digital image based on Arnold transform
Published 2016-06-01“…Previous adaptive steganography algorithms were based on ordinal and full-embedding method.However,these algorithms might cause the concealment of secret information not good enough.Therefore,a random and non-fully embedding method was proposed to improve the concealment.The image system parameters could be obtained,so that the image full capacity was exactly greater than the length of information for non-full embedding.Moreover,these parameters made steganography more flexibility by reducing the modifications of image.Then,secret information embedding sequence was scrambled based on Arnold transform for the purpose that the steganalyst cannot detect out information orderly.Therefore,the secret information can be more concealed,which can improve the security of the algorithms.Experimental results show that the algorithm not only improves the concealment of steganography but also reduces stego distortion,and random non-full embedding operating can be applied to many other similar algorithms.…”
Get full text
Article -
1078
BLIND SOURCE SEPARATION OF MECHANICAL FAULT BASED ON BAT ALGORITHM
Published 2018-01-01Subjects: “…Bat algorithm…”
Get full text
Article -
1079
Biodiversity in NLP: modelling lexical meaning with the Fruit Fly Algorithm
Published 2020-06-01“…Inspired by the biodiversity of the real world, we argue for a methodology which promotes ‘artificial diversity’, and we further propose that cognitively-inspired algorithms are a good starting point to explore new architectures. …”
Get full text
Article -
1080
Numerical Algorithms for Finding Zeros of Nonlinear Equations and Their Dynamical Aspects
Published 2020-01-01“…The convergence analysis of these algorithms is discussed. It is established that the newly developed algorithms have sixth order of convergence. …”
Get full text
Article