Showing 1,061 - 1,080 results of 31,575 for search '"algorithm"', query time: 0.11s Refine Results
  1. 1061

    An Attribute Graph Embedding Algorithm for Sensing Topological and Attribute Influence by Dongming Chen, Shuyue Zhang, Yumeng Zhao, Mingzhao Xie, Dongqi Wang

    Published 2024-11-01
    “…Specifically, the proposed algorithm fuses topology information and attribute information using a lightweight sampling strategy, constructs an unbiased graph self-encoder on the sampled graph, implements topology aggregation and attribute aggregation, respectively, models the correlation between topology embedding and attribute embedding, and considers multi-level loss terms.…”
    Get full text
    Article
  2. 1062
  3. 1063

    Micro-blog topic detection algorithm based on topic model by Hua-jun HUANG, Jun-shan TAN, Jiao-hua QIN

    Published 2016-05-01
    “…Micro-blog data has the characteristic of real-time,volume,short-text,and noise-rich.So it is a challenge for the traditional topic detection technology.A novel micro-blog topic detection algorithm based on topic model was proposed.Firstly,the micro-blog data was expressed as text word matrix and word relation matrix.The topic word was extracted from the two vectors.Secondly,the topic model was obtained with clustering.Finally,the topic detection of micro-blog was obtained by clustering text and topic model.Experimental results show that the algorithm proposed can effectively detection the text topic,and with the best parameter group of precision,recall rate,F,and the value F is about 95%.…”
    Get full text
    Article
  4. 1064
  5. 1065

    An ultrafast algorithm for ultrafast time-resolved coherent Raman spectroscopy by Francesco Mazza, Dirk van den Bekerom

    Published 2025-01-01
    “…Here, we present an algorithm that achieves a million-fold improvement in computation time compared to existing methods. …”
    Get full text
    Article
  6. 1066

    Skin Lesion Image Segmentation Algorithm Based on MC-UNet by Guihua Yang, Bingxing Pan

    Published 2025-01-01
    “…The experimental results show that the proposed algorithm outperforms other mainstream algorithms and exhibits superior performance in skin lesion segmentation.…”
    Get full text
    Article
  7. 1067

    Image double fragile watermarking algorithm based on block neighborhood by Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU

    Published 2023-06-01
    “…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
    Get full text
    Article
  8. 1068
  9. 1069

    Improved Solutions for the Optimal Coordination of DOCRs Using Firefly Algorithm by Muhammad Sulaiman, Waseem, Shakoor Muhammad, Asfandyar Khan

    Published 2018-01-01
    “…From the numerical results, it is obvious that the firefly algorithm with certain parameter settings performs better than the other state-of-the-art algorithms.…”
    Get full text
    Article
  10. 1070

    Multi-Objective Genetic Algorithm for Task Assignment on Heterogeneous Nodes by Carolina Blanch Perez del Notario, Rogier Baert, Maja D'Hondt

    Published 2012-01-01
    “…This paper presents a task assignment strategy based on genetic algorithms in which multiple and conflicting objectives are simultaneously optimized. …”
    Get full text
    Article
  11. 1071
  12. 1072
  13. 1073
  14. 1074
  15. 1075
  16. 1076
  17. 1077

    Adaptive steganography algorithm in digital image based on Arnold transform by Qi LI, Xin LIAO, Guo-qing QU, Guo-yong CHEN, Jiao DU

    Published 2016-06-01
    “…Previous adaptive steganography algorithms were based on ordinal and full-embedding method.However,these algorithms might cause the concealment of secret information not good enough.Therefore,a random and non-fully embedding method was proposed to improve the concealment.The image system parameters could be obtained,so that the image full capacity was exactly greater than the length of information for non-full embedding.Moreover,these parameters made steganography more flexibility by reducing the modifications of image.Then,secret information embedding sequence was scrambled based on Arnold transform for the purpose that the steganalyst cannot detect out information orderly.Therefore,the secret information can be more concealed,which can improve the security of the algorithms.Experimental results show that the algorithm not only improves the concealment of steganography but also reduces stego distortion,and random non-full embedding operating can be applied to many other similar algorithms.…”
    Get full text
    Article
  18. 1078
  19. 1079

    Biodiversity in NLP: modelling lexical meaning with the Fruit Fly Algorithm by Simon Preissner, Aurélie Herbelot

    Published 2020-06-01
    “…Inspired by the biodiversity of the real world, we argue for a methodology which promotes ‘artificial diversity’, and we further propose that cognitively-inspired algorithms are a good starting point to explore new architectures. …”
    Get full text
    Article
  20. 1080

    Numerical Algorithms for Finding Zeros of Nonlinear Equations and Their Dynamical Aspects by Amir Naseem, M. A. Rehman, Thabet Abdeljawad

    Published 2020-01-01
    “…The convergence analysis of these algorithms is discussed. It is established that the newly developed algorithms have sixth order of convergence. …”
    Get full text
    Article