-
1441
Greedy gradient-free adaptive variational quantum algorithms on a noisy intermediate scale quantum computer
Published 2025-05-01“…In addition to demonstrating the algorithm’s improved resilience to statistical sampling noise in the computation of simple molecular ground states, we execute GGA-VQE on a 25-qubit error-mitigated QPU by computing the ground state of a 25-body Ising model. …”
Get full text
Article -
1442
Unsupervised machine learning with different sampling strategies and topographic factors for distinguishing between landslide source and runout areas to improve landslide inventory...
Published 2024-12-01“…In the second sampling strategy, the effectiveness of feature separation was tested by dividing polygon samples into several intervals on the basis of their sizes, thereby verifying the practicability of the adopted algorithms in real-world operations. …”
Get full text
Article -
1443
A chaos based image encryption algorithm using Rubik’s cube and prime factorization process (CIERPF)
Published 2022-05-01Get full text
Article -
1444
EVALUATION OF PARTICLE SWARM ALGORITHM MODIFICATIONS ON SUPPORT VECTOR MACHINE HYPERPARAMETER OPTIMIZATION TUNING FOR RAIN PREDICTION
Published 2024-12-01“… The Particle Swarm Optimization (PSO) algorithm, though simple and effective, faces challenges like premature convergence and local optima entrapment. …”
Get full text
Article -
1445
HIV testing algorithm using fourth generation reagents reduces the false positive rate of screening tests
Published 2025-04-01“…The median cut-off index (COI) of false positive samples was significantly lower than that of true positive samples. …”
Get full text
Article -
1446
A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing
Published 2017-01-01“…Specifically, the algorithm consists of four parts: firstly, we use a fractional-order hyperchaotic Lorenz system to generate a pseudorandom sequence that will be utilized during the whole encryption process; secondly, a simple but effective diffusion scheme is performed to spread the little change in one pixel to all the other pixels; thirdly, the plain image is encoded by DNA rules and corresponding DNA operations are performed; finally, global permutation and 2D and 3D permutation are performed on pixels, bits, and acid bases. …”
Get full text
Article -
1447
Identification and Validation of NK Marker Genes in Ovarian Cancer by scRNA-seq Combined with WGCNA Algorithm
Published 2023-01-01“…The “TIMER,” “CIBERSORT,” “MCPcounter,” “xCell,” and “EPIC” algorithms were performed to predict the infiltration characteristics of different immune cell types in each sample. …”
Get full text
Article -
1448
Theoretical knowledge enhanced genetic algorithm for mine ventilation system optimization considering main fan adjustment
Published 2024-11-01“…Additionally, leveraging mine ventilation sensitivity theory (MVST) enhances the quality of the initial algorithmic population. A simple case and two engineering cases collectively validated that the algorithm consistently provides effective and reliable optimization solutions for mine ventilation systems across varying scales. …”
Get full text
Article -
1449
Proposing Lane and Obstacle Detection Algorithm Using YOLO to Control Self-Driving Cars on Advanced Networks
Published 2022-01-01“…Finally, we use real-time videos and the TuSimple dataset to perform simulations for the proposed algorithm. …”
Get full text
Article -
1450
Enhanced Hybrid Artificial Fish Swarm Algorithm for Three-Dimensional Path Planning Applied to Robotic Systems
Published 2025-03-01“…An improved artificial fish swarm algorithm (AFSA) is proposed to solve 3D path planning problems in environments with obstacles. …”
Get full text
Article -
1451
Steganographic model to conceal the secret data in audio files utilizing a fourfold paradigm: Interpolation, multi-layering, optimized sample space, and smoothing
Published 2025-06-01“…Moreover, this study recommends that practitioners in steganography with audio data prioritize data concealment algorithms that enhance security over stego audio quality.…”
Get full text
Article -
1452
Improving aboveground biomass estimation by integrating ICESat-2 LiDAR sampling and tree species stratification strategies using multi-source datasets
Published 2025-06-01“…This study demonstrates that the UTSS framework incorporating ICESat-2 LiDAR sampling and tree species stratification strategies provides a promising approach to estimating AGB by integrating freely accessible datasets, algorithms, and platforms.…”
Get full text
Article -
1453
Multi-Biometric Feature Extraction from Multiple Pose Estimation Algorithms for Cross-View Gait Recognition
Published 2024-11-01“…We utilized state-of-the-art HPE algorithms, OpenPose, AlphaPose, and HRNet, to generate diverse skeleton data samples from a single source video. …”
Get full text
Article -
1454
The research on enhancing LA estimation accuracy across domains for small sample data based on data augmentation and data transfer integration optimization system
Published 2025-12-01“…Fourteen morphological feature parameters are constructed, and the leaf area values are measured through destructive sampling, together forming the dataset. A comprehensive comparison of six algorithms (linear regression, support vector regression, random forest, XGBoost, CatBoost, and K-nearest neighbors) is conducted, assessing their performance under a combined strategy of data augmentation (noise injection, generative adversarial networks, Gaussian mixture model, variational autoencoders) and transfer learning (random, clustering, and hierarchical parameter transfer). …”
Get full text
Article -
1455
-
1456
Design of intelligent detection method for electricity transmission line equipment defect based on data mining algorithm
Published 2024-11-01“…The replica rate of data mining algorithm was much lower than that of XGBoost algorithm and the performance of fault signal detection was better. …”
Get full text
Article -
1457
AB-VIP: Attack Method Using Brightness Information for Visibility Improvement of Adversarial Perturbations on the NMS Algorithm
Published 2025-01-01“…In this paper, we propose a simple yet effective attack method called Attack method using Brightness Information for Visibility Improvement(AB-VIP), to address the limitation of adversarial attack methods targeting the NMS algorithm. …”
Get full text
Article -
1458
Modified Hyperspheres Algorithm to Trace Homotopy Curves of Nonlinear Circuits Composed by Piecewise Linear Modelled Devices
Published 2014-01-01“…Furthermore, we take advantage of the fact that homotopy trajectories are PWL curves meant to replace the multidimensional interpolation and fine tuning stages of the path tracking algorithm with a simple and highly accurate procedure based on the parametric straight line equation.…”
Get full text
Article -
1459
A steady state micro genetic algorithm for hyper-heuristic generation in one-dimensional bin packing
Published 2025-07-01“…Due to the complexity of the problem, exact algorithms are often impractical for large instances, which has led to a reliance on tailored heuristics that may perform well on some instances but poorly on others. …”
Get full text
Article -
1460
Multimedia Detection and Processing of Remote-Sensing Image of Small Target Combined with Variable Neighborhood Search Algorithm
Published 2021-01-01“…In this paper, we merge the variable neighborhood search algorithm, reduce the accuracy of remote-sensing images, clean the invalid information of the data, use unsupervised classification methods to quickly locate small targets, use it as verification information, compare and select the image data through sample information, distinguish the background and target results, and get stable detection results. …”
Get full text
Article