-
661
Game and Application Purchasing Patterns on Steam using K-Means Algorithm
Published 2024-11-01“…The findings reveal that free-to-play games are the most popular among users, while the "Animation Modelling" category is the most expensive based on price comparisons…”
Get full text
Article -
662
Optimal Speed and Position Controller for PMDC Motor Based GWO Algorithm
Published 2025-07-01“…Nonetheless, the primary goal of this work is to determine how well the intelligent algorithm GWO performs while autotuning the PID controller for a permanent magnet direct current (PMDC) motor. …”
Get full text
Article -
663
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
664
An Energy-Efficient CKN Algorithm for Duty-Cycled Wireless Sensor Networks
Published 2012-05-01“…., duty cycles) using sleep scheduling algorithms. The connected K -neighborhood (CKN) algorithm is an efficient decentralized sleep scheduling algorithm for reducing the number of awake nodes while maintaining both network connectivity and an on-demand routing latency. …”
Get full text
Article -
665
Sigmoid-Function-Based Adaptive Pelican Optimization Algorithm for Global Optimization
Published 2025-03-01“… This paper introduces the Sigmoid-function-based Adaptive Pelican Optimization Algorithm (MPOA), an enhanced version of the traditional Pelican Optimization Algorithm (POA) aimed at improving the POA's performance. …”
Get full text
Article -
666
An interpolated quantized guard band algorithm for physical layer key generation
Published 2025-03-01“…With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. …”
Get full text
Article -
667
A novel transcendental metaphor metaheuristic algorithm based on power method
Published 2025-07-01“…Abstract This paper proposes a novel metaheuristic algorithm-the Power Method Algorithm (PMA), which is inspired by the power iteration method to solve complex optimization problems. …”
Get full text
Article -
668
Artificial Intelligence and Algorithmic Approaches of Health Security Systems: A Review
Published 2025-01-01“…According to our approach, the studies analyzed highlight the growing importance of advanced security frameworks, especially those incorporating artificial intelligence and algorithmic methodologies, in safeguarding healthcare systems while enhancing patient care quality. …”
Get full text
Article -
669
Multi-Objective Robust Optimization Reconstruction Algorithm for Electrical Capacitance Tomography
Published 2025-04-01“…Qualitative and quantitative evaluation results demonstrate that the proposed method surpasses mainstream imaging algorithms, enhancing the automation level of the reconstruction process and image quality while exhibiting exceptional robustness. …”
Get full text
Article -
670
DATA DRIVEN RULE-BASED PEAK SHAVING ALGORITHM FOR SCHEDULING REFRIGERATORS
Published 2024-12-01“…This approach aims to minimize energy consumption while maintaining thermal comfort. The algorithm’s performance was evaluated using real-world data from the Spanish Transmission Service Operators (TSO). …”
Get full text
Article -
671
Efficient Implementation of Matrix-Based Image Processing Algorithms for IoT Applications
Published 2025-04-01“…The proposed method uses CNN in a different way, not for artificial intelligence algorithms, but for matrix calculations using CNN resources effectively while maintaining the accuracy of the calculations. …”
Get full text
Article -
672
Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty
Published 2025-03-01“…One solution is to infer the missing sensitive attribute information and apply an existing bias mitigation algorithm using this inferred knowledge. While researchers are beginning to explore this question, it is still unclear how robust existing bias mitigation algorithms are to different levels of inference accuracy. …”
Get full text
Article -
673
Pulmonary Nodules Detection Algorithm Combining Multi-view and Attention Mechanism
Published 2022-12-01Get full text
Article -
674
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. Our simulations demonstrate beSnake's advantage over an existing routing solution on random circuits and real quantum algorithms with up to 1000 qubits, showing an average improvement of up to 80% in gate overhead, 54% in depth overhead, and up to 8.33 times faster routing times.…”
Get full text
Article -
675
Cloud Data Security through BB84 Protocol and Genetic Algorithm
Published 2022-12-01“…It is a unique algorithm which may be used to minimize the security threats over the clouds. …”
Get full text
Article -
676
Comparison of algorithms for multi-objective optimization of radio technical device characteristics
Published 2022-12-01“…One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.Results. …”
Get full text
Article -
677
An Enhanced Artificial Lemming Algorithm and Its Application in UAV Path Planning
Published 2025-06-01“…When applied to UAV path planning in large- and medium-scale environments with realistic obstacle constraints, the EALA generates Pareto-optimal paths that minimize length, curvature, and computation time while guaranteeing collision avoidance. Benchmark tests and realistic simulations show that the EALA outperforms 10 algorithms. …”
Get full text
Article -
678
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
679
Lightweight remote sensing ship detection algorithm based on YOLOv5s
Published 2024-10-01“…ObjectiveThis paper proposes a lightweight remote sensing ship target detection algorithm LR-YOLO based on improved YOLOv5s to meet the lightweight and fast inference requirements of ship target detection tasks involving remote sensing images. …”
Get full text
Article -
680
Study on lightweight strategies for L-YOLO algorithm in road object detection
Published 2025-03-01“…However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
Get full text
Article