-
1481
N-Dimensional Reduction Algorithm for Learning from Demonstration Path Planning
Published 2025-03-01“…The results show that incorporating additional dimensions significantly enhances trajectory simplification while preserving key information. Additionally, the study highlights the importance of selecting appropriate encoding parameters to achieve optimal resolution. …”
Get full text
Article -
1482
Comparisons of performances of structural variants detection algorithms in solitary or combination strategy.
Published 2025-01-01“…Numerous algorithms for short-read SV detection exist, but none are universally optimal, each having limitations for specific SV sizes and types. …”
Get full text
Article -
1483
Optimization of costs in the enterprise. Effective strategies for business
Published 2021-04-01“…«The process of cost optimization cannot be started for a while and then stopped. …”
Get full text
Article -
1484
EGNAS: Efficient Graph Neural Architecture Search Through Evolutionary Algorithm
Published 2024-12-01Get full text
Article -
1485
Game and Application Purchasing Patterns on Steam using K-Means Algorithm
Published 2024-11-01“…The elbow method determines the optimal number of clusters, resulting in three clusters from the k-means algorithm. …”
Get full text
Article -
1486
Development and Evaluation of a Multi-Robot Path Planning Graph Algorithm
Published 2025-05-01“…The algorithm is suitable for identifying optimal and complete collision-free paths. …”
Get full text
Article -
1487
Precise Retrieval of Sentinel-1 Data by Minimizing the Redundancy With Greedy Algorithm
Published 2024-01-01“…Aiming to address this issue, we present here an optimized retrieval method grounded in a greedy algorithm, which can substantially reduce redundant data by approximately 20–65% while ensuring comprehensive data coverage over the areas of interest. …”
Get full text
Article -
1488
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures
Published 2025-07-01“…Experimental results show that the GABFT algorithm significantly improves system throughput and scalability while reducing latency and communication overhead, making it well-suited for large-scale networks.…”
Get full text
Article -
1489
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1490
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. …”
Get full text
Article -
1491
Key frame extraction algorithm for surveillance videos using an evolutionary approach
Published 2025-01-01“…Existing methods include the Adaptive Key Frame Extraction Algorithm, which reduces redundancy while ensuring maximum content coverage; the Optimal Key Frame Extraction Algorithm, which utilizes a Genetic Algorithm (GA) to select key frames optimally; and the Rapid Key Frame Extraction Algorithm, which employs clustering techniques to identify typical key frames. …”
Get full text
Article -
1492
Road Event Detection and Classification Algorithm Using Vibration and Acceleration Data
Published 2025-02-01“…In this work, we propose a Random Forest-based event classification algorithm designed to handle the unique patterns of vibration and acceleration data in road event detection for an urban traffic scenario. …”
Get full text
Article -
1493
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1494
A Systematic Review and Evaluation of Sustainable AI Algorithms and Techniques in Healthcare
Published 2025-01-01“…This systematic review paper categorizes and classifies AI algorithms and tools in the healthcare sector to support more sustainable practices, focusing on reducing energy use while maintaining high standards in diagnostic accuracy and patient outcomes. …”
Get full text
Article -
1495
Comparative Analysis of Supervised Classification Algorithms for Residential Water End Uses
Published 2024-06-01Get full text
Article -
1496
Algorithm and mathematical model for geometric positioning of segments on aspherical composite mirror
Published 2018-09-01“…This approach allows: to expand the spectral operating range from 0.2 to 11.0 μm and to increase the diameter of the entrance pupil of the receiving optical system, while maintaining the optimal value of the exponent mS– mass per unit area.Two variants of adjusting the position of mirror segments are considered when forming an aspherical surface of the second order, with respect to the base surface of the nearest sphere, including geometrical and opto-technical positioning.The purpose of the research was to develop an algorithm for solving the problem of geometric positioning of hexagonal segments of a mirror telescope, constructing an optimal circuit for traversing elements when aligning to the nearest radius to an aspherical surface, and also to program the output calculation parameters to verify the adequacy of the results obtained.Various methods for forming arrays from regular hexagonal segments with equal air gaps between them are considered. …”
Get full text
Article -
1497
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
1498
Precise wind allocation scheme decision based on attraction-repulsion algorithm
Published 2025-04-01“…To address the issue of fluctuating branch airflow in the ventilation system caused by changes in mine ventilation facilities and air network structure during underground production operations, which in turn leads to insufficient airflow at consumption points, a precise wind allocation algorithm based on the Attraction-Repulsion Optimization Algorithm (AROA) is proposed. …”
Get full text
Article -
1499
Pulmonary Nodules Detection Algorithm Combining Multi-view and Attention Mechanism
Published 2022-12-01Get full text
Article -
1500
Advancing Rice Disease Detection in Farmland with an Enhanced YOLOv11 Algorithm
Published 2025-05-01“…The algorithm offers significant advantages in lightweight design and real-time performance, outperforming other classical object detection algorithms and providing an optimal solution for real-time field diagnosis.…”
Get full text
Article