-
201
A novel method for encoding and decoding based on enhanced parity-check-concatenated polar codes
Published 2021-03-01Get full text
Article -
202
Closing the loop: establishing an autonomous test-learn cycle to optimize induction of bacterial systems using a robotic platform
Published 2025-01-01“…An evaluation of chosen (learning) algorithms for single and dual factor optimization was performed. …”
Get full text
Article -
203
Weak form shallow ice approximation models with an improved time-step restriction
Published 2025-01-01“…When that velocity field is used to advance the ice surface in time, the time steps have to take small values due to quadratic scaling in the horizontal mesh size. In this paper, we write the SIA model in weak form and add in the free-surface stabilization algorithm (FSSA) terms. …”
Get full text
Article -
204
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid
Published 2025-08-01“…The improved bidirectional planner combines the bisection optimization process, significantly improves the topological structure of the random tree, and accelerates the convergence to the optimal path solution. Since the algorithm relies on the tree expansion framework, it is compatible with various samplers and graph pruning strategies. …”
Get full text
Article -
205
Reconceptualizing Gatekeeping in the Age of Artificial Intelligence: A Theoretical Exploration of Artificial Intelligence-Driven News Curation and Automated Journalism
Published 2025-05-01“…We integrate classic media theories—gatekeeping, agenda-setting, and framing—with contemporary insights from algorithmic news recommender systems, large language model (LLM)–based news writing, and platform studies. …”
Get full text
Article -
206
-
207
SPL-YOLOv8: A Lightweight Method for Rape Flower Cluster Detection and Counting Based on YOLOv8n
Published 2025-07-01Get full text
Article -
208
Advancing natural language processing for Persian movie review analysis: roadmap and opportunities
Published 2025-03-01Get full text
Article -
209
Fast Single Pbase Algoritbm for Utility Mining in Big Data
Published 2015-04-01“…Most of the latest works on utility mining generates a huge number of candidates in dealing with big data,which suffers from the scalability issue.Some work does not generate candidates,but suffers from the efficiency issue due to lack of strong pruning and high computation overhead.A novel algorithm that finds high utility patterns in a single phase without generating candidates was proposed.The novelties lie in a prefix growth strategy with strong pruning,and a sparse matrix based representation of transactions with pseudo projection.The proposed algorithm works in a depth first manner and does not materialize high utility patterns in memory,which further improves the scalability.Extensive experiments on synthetic and rea1-world data show that the proposed algorithm outperforms the latest works in terms of running time,memory overhead,and scalability.…”
Get full text
Article -
210
Policy-Based Reinforcement Learning Approach in Imperfect Information Card Game
Published 2025-02-01“…Comparisons were made against two benchmark strategies: a random strategy agent and an alpha-beta pruning tree search with varying search depths. The proposed algorithm achieved win rates exceeding 65% against the random agent, nearly 60% against alpha-beta pruning at a search depth of 6, and 55% against alpha-beta pruning at the maximum possible depth.…”
Get full text
Article -
211
The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods
Published 2021-08-01“…We then discuss how upper and lower bounds can be computed during the enumeration to design a branch-and-bound algorithm. Finally, we validate our branch-and-bound algorithm by conducting a large set of computational experiments on instances coming from various real-life applications. …”
Get full text
Article -
212
Assigning Priorities for Fixed Priority Preemption Threshold Scheduling
Published 2015-01-01“…This paper analyzes the inefficiency or nonoptimality of the previously proposed optimal priority assignment algorithms for PTS. We develop theorems for exhaustively but safely pruning infeasible priority orderings while assigning priorities to tasks for PTS. …”
Get full text
Article -
213
Research on autonomous obstacle avoidance of mountainous tractors based on semantic neural network and laser SLAM.
Published 2025-01-01“…Then, the observed data is input into the lightweight convolutional neural network, and obstacles in the mountain environment are detected and semantic information is extracted through layer pruning and channel pruning strategies, and key information such as the type, size, and location of obstacles is output. …”
Get full text
Article -
214
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management
Published 2022-01-01“…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
Get full text
Article -
215
Multi-Energy Microgrid Data-Driven Distributionally Robust Optimization Dispatch Considering Uncertainty Correlation
Published 2025-08-01“…This transforms the distributionally robust model into a linear deterministic model,thereby enabling an efficient solution using optimization solvers. Finally,a sample-pruning algorithm is proposed,which iteratively generates subsamples from the original dataset by removing the outliers and extreme data points. …”
Get full text
Article -
216
Morphological Estimation of Primary Branch Inclination Angles in Jujube Trees Based on Improved PointNet++
Published 2025-05-01“…The segmentation of jujube tree branches and the estimation of primary branch inclination angles (IAs) are crucial for achieving intelligent pruning. This study presents a primary branch IA estimation algorithm for jujube trees based on an improved PointNet++ network. …”
Get full text
Article -
217
Application of selective ensemble learning soft sensor modeling based on GPR in the solar thermal power collection system
Published 2025-03-01“…Secondly, the local domain (LTs) was identified by Gaussian mixture model (GMM) clustering, and the local GPR model was established for each LT to obtain the base model (MGPR). Finally, the set pruning strategy based on a genetic algorithm (GA) was used to select the MGPR model with high estimation performance, and the base models were fused by the Stacking algorithm to obtain the SESMGPR model. …”
Get full text
Article -
218
Unbalanced Threshold Based Distributed Data Collection Scheme in Multisink Wireless Sensor Networks
Published 2016-01-01“…By computing unbalanced thresholds and pruning unnecessary element exchanging, each sink can synchronize the top- K aggregated values efficiently via the unbalanced threshold based distributed top- K query algorithm. …”
Get full text
Article -
219
A visual SLAM loop closure detection method based on lightweight siamese capsule network
Published 2025-03-01“…The algorithm was tested on the CityCentre dataset and the New College dataset. …”
Get full text
Article -
220
A graph-based sensor recommendation model in semantic sensor network
Published 2022-05-01“…In addition to using the traditional graph matching algorithm, we propose a threshold pruning algorithm to narrow the matching scope and improve the matching efficiency. (2) Recommending top- k sensors. …”
Get full text
Article