-
81
Parallel Computing for Sorting Algorithms
Published 2014-06-01“…Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. …”
Get full text
Article -
82
YOLOv8n-SMMP: A Lightweight YOLO Forest Fire Detection Model
Published 2025-05-01“…Existing forest fire detection algorithms face limitations in capturing flame and smoke features in complex natural environments, coupled with high computational complexity and inadequate lightweight design for practical deployment. …”
Get full text
Article -
83
D-Band 4.6 km 2 × 2 MIMO Photonic-Assisted Terahertz Wireless Communication Utilizing Iterative Pruning Deep Neural Network-Based Nonlinear Equalization
Published 2024-10-01“…The system employs advanced digital signal processing (DSP) methods, including down-conversion, resampling, matched filtering, and various equalization algorithms to combat signal distortions. We demonstrate the effectiveness of DNN and iterative pruning techniques in significantly reducing bit error rates (BERs) across a range of symbol rates (10 Gbaud to 30 Gbaud) and polarization states (vertical and horizontal). …”
Get full text
Article -
84
A Comparative Study of YOLO, SSD, Faster R-CNN, and More for Optimized Eye-Gaze Writing
Published 2025-04-01“…Eye-gaze writing technology holds significant promise but faces several limitations. …”
Get full text
Article -
85
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01“…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
Get full text
Article -
86
FPGA-oriented lightweight multi-modal free-space detection network
Published 2023-12-01“…With the development of multi-modal convolutional neural networks (CNNs) in recent years, the performance of driving scene semantic segmentation algorithms has been dramatically improved. Therefore most free-space detection algorithms are developed based on multiple sensors. …”
Get full text
Article -
87
Ultimate Compression: Joint Method of Quantization and Tensor Decomposition for Compact Models on the Edge
Published 2024-10-01Get full text
Article -
88
<italic>WhiteDwarf</italic>: A Holistic Co-Design Approach to Ultra-Compact Neural Inference Acceleration
Published 2025-01-01“…Recent work on the Strong Lottery Ticket Hypothesis has upgraded the role of sparsity, commonly exploited by algorithms and sparse architectures as an advantageous by-product of training overparameterized models, to the main driver of neural training, opening new co-design opportunities for efficient neural execution. …”
Get full text
Article -
89
TARNet: An Efficient and Lightweight Trajectory-Based Air-Writing Recognition Model Using a CNN and LSTM Network
Published 2022-01-01“…This research proposes a unified, lightweight, and general-purpose deep learning algorithm for a trajectory-based air-writing recognition network (TARNet). …”
Get full text
Article -
90
An efficient method for mining frequent weighted subgraphs based on weighted edges
Published 2025-05-01“…In this paper, we introduce two new contributions to further improve the OWGraMi algorithm: calculating weights for subgraphs based on their edge weights, and using these edge weights to prune the search space to increase the performance of the new weighted graph mining algorithm, named WEGM (Weighted Edge GraMi). …”
Get full text
Article -
91
An effective and efficient hierarchical -means clustering algorithm
Published 2017-08-01“…Experiments performed on real UCI and synthetic datasets verify the efficiency and effectiveness of our proposed algorithm.…”
Get full text
Article -
92
An improved BKW algorithm on the learning with rounding problem
Published 2025-06-01“…In this paper, we propose an improved LWR-solving BKW algorithm. For the reduction phase, we design a novel coding method with relaxed collision conditions and introduce a post-processing stage and for the solving phase, we switch to a more efficient Fast Fourier Transform (FFT) distinguisher with pruning. …”
Get full text
Article -
93
Improving Quantum Optimization Algorithms by Constraint Relaxation
Published 2024-09-01“…Current quantum optimization algorithms, most of which are hybrid variational-Hamiltonian-based algorithms, struggle to present quantum devices due to noise and decoherence. …”
Get full text
Article -
94
Detection of Critical Parts of River Crab Based on Lightweight YOLOv7-SPSD
Published 2024-11-01“…Furthermore, we optimize the model by removing redundant parameters using the DepGraph pruning algorithm, which facilitates its application on edge devices. …”
Get full text
Article -
95
ITD-YOLO: An Improved YOLO Model for Impurities in Premium Green Tea Detection
Published 2025-04-01“…To solve this technical problem in the industry, this article proposes a lightweight algorithm for detecting and sorting impurities in premium green tea in order to improve sorting efficiency and reduce labor intensity. …”
Get full text
Article -
96
Information Hiding Based on Chan-Vese Algorithm
Published 2011-12-01“…In addition the algorithm of this technique is implemented in Matlab.…”
Get full text
Article -
97
The Algorithm to Automatically Extract Body Sizes and Shapes
Published 2022-02-01“…In addition, the rotation matrix and the optimal function are used to write an algorithm to estimate the neck girth and inseam measurements. …”
Get full text
Article -
98
Algorithmic Literacy and the Role of Librarians in Its Education
Published 2025-02-01“…Objective: Considering the increasing spread of artificial intelligence and its algorithm-oriented nature and the increasing interaction of users with these algorithms in various platforms such as social networks, online stores, and search engines, the present study intends to examine the concept and necessity of algorithmic literacy and, in the following, the role of librarians who are actually specialists in information science in the education and development of this literacy. …”
Get full text
Article -
99
YOLOv8 forestry pest recognition based on improved re-parametric convolution
Published 2025-03-01“…Further optimization was achieved through model pruning, which contributed to additional lightweighting of the model. …”
Get full text
Article -
100
Magnetic Coil’s Performance Optimization with Nonsmooth Search Algorithms
Published 2025-08-01“…Numerical tests using non-gradient search algorithms show the difference in optimal designs provided by these methods. …”
Get full text
Article