-
601
Analysing Threshold Value in Fire Detection Algorithm Using MODIS Data
Published 2012-08-01“…This paper describe the principle of fire investigation applied on MODIS data. The main used algorithm in this research is contextual algorithm which has been developed by NASA scientist team. …”
Get full text
Article -
602
Multi-Focus Image Fusion Using Energy Valley Optimization Algorithm
Published 2024-09-01“…The obtained experimental results are compared with the well-known Genetic Algorithm (GA), Differential Evolution Algorithm (DE), and Artificial Bee Colony Optimization Algorithm (ABC). …”
Get full text
Article -
603
An automated parallel genetic algorithm with parametric adaptation for distributed data analysis
Published 2025-03-01“…Abstract Unleashing the potential of large-scale data analysis requires advanced computational methods capable of managing the immense size and complexity of distributed data. Genetic algorithms (GAs), known for their adaptability, benefit significantly from parallelization, prompting ongoing enhancements to boost performance further. …”
Get full text
Article -
604
COMPUTATIONAL VISION FOR TOMATO CLASSIFICATION USING A DECISION TREE ALGORITHM
Published 2025-02-01“…Principal component analysis was employed to evaluate the influence of colorimetric characteristics within each class, and the decision tree algorithm was applied to classify the fruits into the respective categories. …”
Get full text
Article -
605
A Hybrid Optimization Algorithm for the Synthesis of Sparse Array Pattern Diagrams
Published 2025-06-01“…The algorithm enhances global search capability through the introduction of a quantum potential well model, while incorporating adaptive mutation operations to prevent premature convergence, thereby improving optimization accuracy during later iterations. …”
Get full text
Article -
606
N-Dimensional Reduction Algorithm for Learning from Demonstration Path Planning
Published 2025-03-01“…This paper presents an <i>n</i>-dimensional reduction algorithm for Learning from Demonstration (LfD) for robotic path planning, addressing the complexity of high-dimensional data. …”
Get full text
Article -
607
Calculating place-based transit accessibility: Methods, tools and algorithmic dependence
Published 2022-02-01“…With the growing emphasis on accessibility-based planning, analysts should approach the calculation of accessibility with care and recognize the potential for algorithmic dependence in their calculated accessibility results.…”
Get full text
Article -
608
From energy to cellular forces in the Cellular Potts Model: An algorithmic approach.
Published 2019-12-01“…Using the fact that a force field is easily derived from a scalar energy (F = -∇H), we develop a simple algorithm to associate effective forces with cell shapes in the CPM. …”
Get full text
Article -
609
Wrapped Up in the Cis-Tem: Trans Liveability in the Age of Algorithmic Violence
Published 2025-03-01“…Algorithms pervade our reality and promise to universally enhance our lives, but what happens when this promise is reserved for cisgender people while subjecting trans people to legacies of anti-trans violence that implicate trans liveability? …”
Get full text
Article -
610
Distributed K-Means algorithm based on a Spark optimization sample.
Published 2024-01-01“…To address the instability and performance issues of the classical K-Means algorithm when dealing with massive datasets, we propose SOSK-Means, an improved K-Means algorithm based on Spark optimization. …”
Get full text
Article -
611
Comparative Analysis of LiDAR Inertial Odometry Algorithms in Blueberry Crops
Published 2025-01-01“…In recent years, LiDAR Odometry (LO) and LiDAR Inertial Odometry (LIO) algorithms for robot localization have considerably improved, with significant advancements demonstrated in various benchmarks. …”
Get full text
Article -
612
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
613
THE ALGORITHM OF THE CASE FORMATION DURING THE DEVELOPMENT OF CLINICAL DISCIPLINES IN MEDICAL SCHOOL
Published 2016-04-01“…The aim of the study is to develop the algorithm of formation of the case on discipline «Clinical Medicine». …”
Get full text
Article -
614
Optimization of Deep Neural Networks Using a Micro Genetic Algorithm
Published 2024-12-01“…Our approach applies the paradigm of transfer learning, enabling training without the need for extensive datasets. A micro genetic algorithm requires fewer computational resources due to its reduced population size, while still preserving a substantial degree of the search capabilities found in algorithms with larger populations. …”
Get full text
Article -
615
Precise Retrieval of Sentinel-1 Data by Minimizing the Redundancy With Greedy Algorithm
Published 2024-01-01“…Aiming to address this issue, we present here an optimized retrieval method grounded in a greedy algorithm, which can substantially reduce redundant data by approximately 20–65% while ensuring comprehensive data coverage over the areas of interest. …”
Get full text
Article -
616
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures
Published 2025-07-01“…Experimental results show that the GABFT algorithm significantly improves system throughput and scalability while reducing latency and communication overhead, making it well-suited for large-scale networks.…”
Get full text
Article -
617
Development and application of piano accompanying system based on New Fingerprint algorithm
Published 2025-07-01“…To solve the audio retrieval when users are learning online piano, a New Fingerprint (NF) is designed based on the button behavior of users while playing the piano. Taking NF algorithm as the core, combined with music signal analysis technology, automatic piano transcription technology and alignment technology, an intelligent piano audio analysis module is constructed. …”
Get full text
Article -
618
CSA: Utility Optimization Scheduling Algorithm for IoT Blockchain Sharding Committees
Published 2025-03-01“…CSA dynamically adjusts the committee members to achieve near-optimal solutions while addressing operational constraints. Theoretical analysis demonstrates the convergence bounds of the algorithm and its robustness against Sybil and eclipse attacks, ensuring high entropy for committee selection. …”
Get full text
Article -
619
A Clustering Algorithm for Large Datasets Based on Detection of Density Variations
Published 2025-07-01“…However, while these algorithms can adapt to large datasets by building clusters with arbitrary shapes by identifying low-density regions, they usually struggle to identify density variations. …”
Get full text
Article -
620
Robust Crater Detection Algorithm Based on Maximum Entropy Threshold Segmentation
Published 2022-01-01“…The proposed method has the following advantages: (1) it has strong robustness and is capable of extracting complete craters under multiple illumination conditions, which makes it suitable for the extraction of large-scale planetary and lunar images; (2) the extracted crater edges are clear and complete and do not merge with the surrounding environment edge; and (3) it avoids the problem of parameter sensitivity that is present in a traditional CDA algorithm. The proposed method was verified using an image taken by the Chang’e-2 lunar probe, and a comparison with the traditional method based on morphology and adaptive Canny edge detection shows that the number of craters detected increases by more than 35%, while the computational efficiency is improved by more than 40%.…”
Get full text
Article