Showing 641 - 660 results of 13,928 for search '(whole OR while) algorithm', query time: 0.16s Refine Results
  1. 641

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  2. 642

    An Energy-Efficient CKN Algorithm for Duty-Cycled Wireless Sensor Networks by Lei Wang, Zhuxiu Yuan, Lei Shu, Liang Shi, Zhenquan Qin

    Published 2012-05-01
    “…., duty cycles) using sleep scheduling algorithms. The connected K -neighborhood (CKN) algorithm is an efficient decentralized sleep scheduling algorithm for reducing the number of awake nodes while maintaining both network connectivity and an on-demand routing latency. …”
    Get full text
    Article
  3. 643

    Sigmoid-Function-Based Adaptive Pelican Optimization Algorithm for Global Optimization by A. F. S. Yussif, S. Adjei, B. E. Wilson

    Published 2025-03-01
    “… This paper introduces the Sigmoid-function-based Adaptive Pelican Optimization Algorithm (MPOA), an enhanced version of the traditional Pelican Optimization Algorithm (POA) aimed at improving the POA's performance. …”
    Get full text
    Article
  4. 644

    An interpolated quantized guard band algorithm for physical layer key generation by Yongli An, Kun Zha, Wenfeng Song, Zhanlin Ji

    Published 2025-03-01
    “…With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. …”
    Get full text
    Article
  5. 645

    A novel transcendental metaphor metaheuristic algorithm based on power method by Huiying Zhang, Hanshuo Wu, Yifei Gong, Xiao Pan, Qipeng Zhong

    Published 2025-07-01
    “…Abstract This paper proposes a novel metaheuristic algorithm-the Power Method Algorithm (PMA), which is inspired by the power iteration method to solve complex optimization problems. …”
    Get full text
    Article
  6. 646

    Artificial Intelligence and Algorithmic Approaches of Health Security Systems: A Review by Savina Mariettou, Constantinos Koutsojannis, Vassilios Triantafillou

    Published 2025-01-01
    “…According to our approach, the studies analyzed highlight the growing importance of advanced security frameworks, especially those incorporating artificial intelligence and algorithmic methodologies, in safeguarding healthcare systems while enhancing patient care quality. …”
    Get full text
    Article
  7. 647

    Multi-Objective Robust Optimization Reconstruction Algorithm for Electrical Capacitance Tomography by Xuejie Yang, Jing Lei, Qibin Liu

    Published 2025-04-01
    “…Qualitative and quantitative evaluation results demonstrate that the proposed method surpasses mainstream imaging algorithms, enhancing the automation level of the reconstruction process and image quality while exhibiting exceptional robustness. …”
    Get full text
    Article
  8. 648

    DATA DRIVEN RULE-BASED PEAK SHAVING ALGORITHM FOR SCHEDULING REFRIGERATORS by Daniel KWEGYIR, Francis Effah BOAFO, Daniel OPOKU, Emmanuel Asuming FRIMPONG

    Published 2024-12-01
    “…This approach aims to minimize energy consumption while maintaining thermal comfort. The algorithm’s performance was evaluated using real-world data from the Spanish Transmission Service Operators (TSO). …”
    Get full text
    Article
  9. 649

    Efficient Implementation of Matrix-Based Image Processing Algorithms for IoT Applications by Sorin Zoican, Roxana Zoican

    Published 2025-04-01
    “…The proposed method uses CNN in a different way, not for artificial intelligence algorithms, but for matrix calculations using CNN resources effectively while maintaining the accuracy of the calculations. …”
    Get full text
    Article
  10. 650

    Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty by Yanchen Wang, Lisa Singh

    Published 2025-03-01
    “…One solution is to infer the missing sensitive attribute information and apply an existing bias mitigation algorithm using this inferred knowledge. While researchers are beginning to explore this question, it is still unclear how robust existing bias mitigation algorithms are to different levels of inference accuracy. …”
    Get full text
    Article
  11. 651
  12. 652

    BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures by Nikiforos Paraskevopoulos, Carmen G. Almudever, Sebastian Feld

    Published 2024-01-01
    “…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. Our simulations demonstrate beSnake's advantage over an existing routing solution on random circuits and real quantum algorithms with up to 1000 qubits, showing an average improvement of up to 80% in gate overhead, 54% in depth overhead, and up to 8.33 times faster routing times.…”
    Get full text
    Article
  13. 653

    Cloud Data Security through BB84 Protocol and Genetic Algorithm by Jaydip Kumar, Vipin Saxena

    Published 2022-12-01
    “…It is a unique algorithm which may be used to minimize the security threats over the clouds. …”
    Get full text
    Article
  14. 654

    Comparison of algorithms for multi-objective optimization of radio technical device characteristics by A. V. Smirnov

    Published 2022-12-01
    “…One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.Results. …”
    Get full text
    Article
  15. 655

    An Enhanced Artificial Lemming Algorithm and Its Application in UAV Path Planning by Xuemei Zhu, Chaochuan Jia, Jiangdong Zhao, Chunyang Xia, Wei Peng, Ji Huang, Ling Li

    Published 2025-06-01
    “…When applied to UAV path planning in large- and medium-scale environments with realistic obstacle constraints, the EALA generates Pareto-optimal paths that minimize length, curvature, and computation time while guaranteeing collision avoidance. Benchmark tests and realistic simulations show that the EALA outperforms 10 algorithms. …”
    Get full text
    Article
  16. 656
  17. 657

    Lightweight remote sensing ship detection algorithm based on YOLOv5s by Haochen WANG, Yuelan XIN, Jiang GUO, Qingqing WANG

    Published 2024-10-01
    “…ObjectiveThis paper proposes a lightweight remote sensing ship target detection algorithm LR-YOLO based on improved YOLOv5s to meet the lightweight and fast inference requirements of ship target detection tasks involving remote sensing images. …”
    Get full text
    Article
  18. 658

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  19. 659

    PID CONTROLLER FOR SPEED CONTROL OF PMSM BASED ON MAYFLY OPTIMIZATION ALGORITHM by Fatimah F. Jaber

    Published 2025-02-01
    “…Nuptial dancing and random flight improve the ability of the algorithm to balance its features of exploitation and exploration while assisting in its escape from local optima. …”
    Get full text
    Article
  20. 660

    Hybrid strategy enhanced crayfish optimization algorithm for breast cancer prediction by Yu-Jiong Li

    Published 2025-08-01
    “…Second, an adaptive t-distributed feeding strategy was employed to define the connection between feeding behavior and temperature, increasing population variety and enhanced the algorithm’s local search effectiveness. Finally, an adaptive ternary optimization mechanism is introduced in the exploration phase: a curve growth acceleration factor is used to collaboratively guide global and individual optimal information, while a hybrid adaptive cosine exponential weigh dynamically adjusts the search intensity. …”
    Get full text
    Article