-
381
Prediction of Blood Donations Using Data Mining Based on the Decision Tree Algorithms KNN, SVM, and MLP
Published 2020-03-01Subjects: Get full text
Article -
382
Ego-Motion Estimation for Autonomous Vehicles Based on Genetic Algorithms and CUDA Parallel Processing
Published 2025-01-01Subjects: Get full text
Article -
383
OPTIMIZATION METHOD OF DYNAMIC LOAD IDENTIFICATION BASED ON GENETIC ALGORITHM
Published 2015-01-01Subjects: Get full text
Article -
384
A novel group-based framework for nature-inspired optimization algorithms with adaptive movement behavior
Published 2025-01-01Subjects: Get full text
Article -
385
Algorithmic agency and “fighting back” against discriminatory Instagram content moderation: #IWantToSeeNyome
Published 2025-01-01Subjects: Get full text
Article -
386
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“….), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the "projecting-shooting" process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.…”
Get full text
Article -
387
An Acquisition Algorithm with NCCFR for BOC Modulated Signals
Published 2017-01-01“…The simulation results show that the new algorithm can suppress first side peaks and restrain other side peaks.…”
Get full text
Article -
388
Research on secure DPC localization algorithm of WSN
Published 2011-01-01Subjects: “…distance and position consistent algorithm…”
Get full text
Article -
389
Advance in Nonlinear Analysis: Algorithm, Convergence, and Applications
Published 2013-01-01Get full text
Article -
390
Location prediction algorithm based on movement tendency
Published 2014-02-01“…According to the characteristics of the future location, algorithm results were divided into prediction locations and recommendation locations. …”
Get full text
Article -
391
Research on Collision Detection Algorithm of Dual Manipulator
Published 2021-01-01“…In order to ensure the safety of dual manipulator in public space, an accurate and efficient collision detection algorithm is proposed. The sphere and capsule bounding boxes are used to simplify the manipulator model, and the collision is judged according to the intersection between the bounding boxes. …”
Get full text
Article -
392
Broadcast authentication algorithm for wireless sensor networks
Published 2010-01-01“…In order to authenticate the broadcast data in wireless sensor networks efficiently,a broadcast authentication algorithm based on the properties of one-way,quasi-commutative and absorbency in Nyberg’s fasting one-way accumulator was put forward.The MACs computed by hashing the broadcast data with the shared key between the broadcaster and each scheduled receiver were used to be the accumulative items in this algorithm.The detailed analyses in the aspects of the security,anti-captured and costs show that the proposed broadcast authentication algorithm can authenticate the random broadcast data immediately in small area and meet the essential requirements for broadcast authentication in wireless sensor networks.…”
Get full text
Article -
393
Evolutionary algorithm-driven screw press design
Published 2025-12-01Subjects: Get full text
Article -
394
Cryptography algorithm for wireless channel of CBTC system
Published 2011-01-01“…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
Get full text
Article -
395
Cooperative routing algorithm based on game theory
Published 2013-08-01“…Based on the fit function, a fit value based routing selection algorithm and a fit value based routing forward al-gorithm were proposed. …”
Get full text
Article -
396
Self-healing algorithm based on feedback mechanism
Published 2012-01-01“…A network self-healing algorithm was presented.The proposed algorithm reduced the probability of selecting the failure or congestion paths and achieved self-healing by selecting recovery path adaptively when the nodes failure or link congestion in the network,which was based on Q-learning feedback mechanism,multi-QoS constrained of the evaluation function and path selection strategy using Boltzmann-Gibbs distribution.Simulation results show that the proposed algorithm outperforms in the recovery rate,the diffserv-aware capability and network resource optimization.…”
Get full text
Article -
397
Approximation Algorithm for a System of Pantograph Equations
Published 2012-01-01“…We show how to adapt an efficient numerical algorithm to obtain an approximate solution of a system of pantograph equations. …”
Get full text
Article -
398
An improved clustering algorithm based on local density
Published 2016-01-01“…Clustering analysis is an important and challenging research field in machine learning and data mining.A fast and effective clustering algorithm based on the idea of local density was proposed by Alex.But the number of clusters and cluster centers in the algorithm were determined by hand.Therefore,the candidates of cluster centers based on local density were firstly selected and then density connectivity method was used to optimize the candidates.The classes of samples are the same as the nearest center with bigger local density.Experiments show that the proposed method has a better cluster efficiency and can handle the problems of uncertain cluster number and cluster centers.…”
Get full text
Article -
399
A Fusion Multiobjective Empire Split Algorithm
Published 2020-01-01“…Imperialist competitive algorithm (ICA) and sine cosine algorithm (SCA) are two potential algorithms for handling single-objective optimization problems, but the research of them in multiobjective optimization is scarce. …”
Get full text
Article -
400
A New Algorithm for System of Integral Equations
Published 2014-01-01“…We develop a new algorithm to solve the system of integral equations. …”
Get full text
Article