-
4641
Computing mutual similarity of 3D human faces in nearly linear time.
Published 2025-01-01“…Our solution utilizes properties of facial scan geometry to optimize individual steps. Moreover, the algorithm deals with possible holes and other artifacts in polygonal meshes automatically. …”
Get full text
Article -
4642
Benthos-DETR: a high-precision efficient network for benthic organisms detection
Published 2025-08-01“…Through a series of experimental analyses, it was evident that the performance of the Benthos-DETR network surpasses existing target detection algorithms, achieving an optimal equilibrium between high recognition precision and a trim network scale.…”
Get full text
Article -
4643
Integrated multiomics analysis and machine learning refine neutrophil extracellular trap-related molecular subtypes and prognostic models for acute myeloid leukemia
Published 2025-02-01“…The formation of NETs is impaired in acute myeloid leukemia (AML), which can result in immunodeficiency and increased susceptibility to infection.MethodsThe gene set variation analysis (GSVA) algorithm was employed for the calculation of NET score, while the consensus clustering algorithm was utilized to identify molecular subtypes. …”
Get full text
Article -
4644
Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT
Published 2025-08-01“…In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource consumption) while satisfying reliability, latency, and throughput requirements. …”
Get full text
Article -
4645
A Model‐Independent Strategy for the Targeted Observation Analysis and Its Application in ENSO Prediction
Published 2025-07-01“…Sensitive experiments show that while number of data sets reaches 12, a robust optimal observational array is obtained. …”
Get full text
Article -
4646
Deep reinforcement learning applications and prospects in industrial scenarios
Published 2025-04-01“…Central to these systems are control algorithms, which enable the automation of operations, optimization of process parameters, and reduction of operational costs. …”
Get full text
Article -
4647
A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P
Published 2025-01-01“…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
Get full text
Article -
4648
Adaptive Switching Redundant-Mode Multi-Core System for Photovoltaic Power Generation
Published 2024-11-01“…Additionally, by analyzing the relationship between performance and reliability, we proposed optimization methods to improve reliability while ensuring a high performance was maintained. …”
Get full text
Article -
4649
Novel channel attention-based filter pruning methods for low-complexity semantic segmentation models
Published 2025-09-01“…Examples of widely used semantic segmentation models are the U-Net and DeeplabV3+ models. While the aforementioned models have been deemed very successful in segmenting medical targets including organs and diseases in high resolution images, the computational complexity represents a burden for the real-time application of the algorithms or the deployment of the models on resource-constrained platforms. …”
Get full text
Article -
4650
Towards a smart debt collection system: a Design Science Research approach
Published 2025-07-01“…Abstract While manual, expert-based approaches to debt collection have long dominated the industry, the growing complexity and volume of data—resulting in information overload—highlight the need for machine-learning solutions. …”
Get full text
Article -
4651
Evaluation of a Polarimetric Contrast Enhancement Technique as Preprocessing Step for Vessel Detection in SAR Images: Comparison of Frequency Bands and Polarimetric Modes
Published 2025-03-01“…A potential solution to this issue is to develop methodologies that suppress backscattered signals from the sea while preserving the radar returns from ships. In this work, we analyse a contrast enhancement method which is designed to suppress unwanted sea clutter while preserving signals from potential ships. …”
Get full text
Article -
4652
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
4653
Digital mapping of peat thickness and extent in Finland using remote sensing and machine learning
Published 2025-03-01“…In this study, we present a workflow for producing peat occurrence maps for the whole of Finland. For this, we used random forest classification to map areas with peat thicknesses of ≥ 10 cm, ≥30 cm, ≥40 cm, and > 60 cm. …”
Get full text
Article -
4654
Path Planning for Lunar Rovers in Dynamic Environments: An Autonomous Navigation Framework Enhanced by Digital Twin-Based A*-D3QN
Published 2025-06-01“…This paper proposes a digital twin-enhanced hierarchical planning method, A*-D3QN-Opt (A-Star-Dueling Double Deep Q-Network-Optimized). The framework combines the A* algorithm for global optimal paths in static environments with an improved D3QN (Dueling Double Deep Q-Network) for dynamic obstacle avoidance. …”
Get full text
Article -
4655
YOLOv8-Based Estimation of Estrus in Sows Through Reproductive Organ Swelling Analysis Using a Single Camera
Published 2024-10-01“…Accurate and efficient estrus detection in sows is crucial in modern agricultural practices to ensure optimal reproductive health and successful breeding outcomes. …”
Get full text
Article -
4656
Cross-sectional imaging of speed-of-sound distribution using photoacoustic reversal beacons
Published 2025-02-01“…By picking up the PRB signal using a graph-based dynamic programing algorithm, we formulate a linear inverse model for pixel-wise SOS reconstruction and solve it with iterative optimization technique. …”
Get full text
Article -
4657
Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction
Published 2025-07-01“…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
Get full text
Article -
4658
Enhancing Vertical Trajectory Reconstruction in SASS-C: Advanced Segmentation, Outlier Detection, and Filtering Techniques
Published 2024-10-01“…The invalid detection algorithm, while incurring a slight computational cost, significantly enhances trajectory accuracy. …”
Get full text
Article -
4659
Recommendations on Chronic Constipation (Including Constipation Associated with Irritable Bowel Syndrome) Treatment
Published 2007-01-01“…The myriad of treatment options available to Canadian physicians can be confusing; thus, the main aim of the recommendations and treatment algorithm is to optimize the approach in clinical care based on available evidence.…”
Get full text
Article -
4660
Toward a unified gait freeze index: a standardized benchmark for clinical and regulatory evaluations
Published 2025-05-01“…Our algorithm is made available as open-source Python code, promoting accessibility and reproducibility.…”
Get full text
Article