-
2801
Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing
Published 2025-01-01“…We compare various KD algorithms to identify the technique that produces a smaller model with the modest accuracy drop. …”
Get full text
Article -
2802
Early Detection of Soil Salinization by Means of Spaceborne Hyperspectral Imagery
Published 2025-07-01“…Both datasets were pre-processed with multiple data transformation algorithms and 2D correlograms, PLSR and the Random Forest regressor were tested to identify the best model for salinity detection. …”
Get full text
Article -
2803
Integration of Machine Learning and Wavelet Algorithms for Processing Probing Signals: An Example of Oil Wells
Published 2025-01-01“…A key innovation of this study is the development of an algorithm that processes low-amplitude high-frequency signals, which are often difficult to detect with conventional methods. …”
Get full text
Article -
2804
Design of Jitter Compensation Algorithm for Robot Vision Based on Optical Flow and Kalman Filter
Published 2014-01-01Get full text
Article -
2805
Multibit image watermarking algorithm resistant to geometric attacks based on level set method
Published 2011-01-01“…A multibit watermarking algorithm based on level set method was proposed.First,the stable location of the unit disk was found using level set method.Then,pseudo-Zernike moments were calculated.At last,the watermark was embedded by modifying the pseudo-Zernike moments.In the extraction process,the root-mean-square-error method was employed to detect the watermark.Simulation results show that the algorithm overcomes the defect of the traditional al-gorithm based on pseudo-Zernike moments,while be robust against geometric attacks.…”
Get full text
Article -
2806
Health Monitoring of Carbon Fiber Reinforced Building Materials Based on Phase Unwrapping Algorithm
Published 2025-01-01“…The experimental results showed that the hybrid algorithm had higher computational accuracy and smaller errors compared with the discrete cosine transform algorithm, fast Fourier transform algorithm, and quality map guided method. …”
Get full text
Article -
2807
Novel algorithms for diagnosing heart failure with preserved ejection fraction in patients with hypertension and obesity
Published 2021-02-01“…Recently, new diagnostic algorithms (H2FPEF, HFA-PEFF) and biomarkers have appeared that allow detecting HFpEF at an early stage, taking into account the pathogenesis, which may contribute to development of new effective treatment methods.…”
Get full text
Article -
2808
W-LEACH Based Dynamic Adaptive Data Aggregation Algorithm for Wireless Sensor Networks
Published 2013-09-01“…Experimental results on real and synthetic data show that the algorithm performs well in terms of extending the lifetime of the network, maintaining the original distribution of the sensors as long as possible, maintaining the accuracy of the sensed data, and being able to detect and handle sudden bursts of data.…”
Get full text
Article -
2809
Fast Modelling Algorithm for Realistic Three-Dimensional Human Face for Film and Television Animation
Published 2021-01-01“…Aiming at the face photos of film and television animation, this paper proposes a new fast three-dimensional (3D) face modelling algorithm. First of all, based on the LBF algorithm, this paper proposes a multifeature selection idea to automatically detect multiple features of the face. …”
Get full text
Article -
2810
Image Reconstruction Algorithm Based on Spectral Projected Gradient Pursuit for Electrical Capacitance Tomography
Published 2018-08-01“…Accuracy and speed are important indicators to detect the image reconstruction algorithm for electrical capacitance tomography. …”
Get full text
Article -
2811
An Efficient Plot Fusion Method for High Resolution Radar Based on Contour Tracking Algorithm
Published 2016-01-01“…A plot fusion method based on contour tracking algorithm is proposed to detect extended targets in a radar image. …”
Get full text
Article -
2812
Threading Statistical Disclosure Attack with EM: An Algorithm for Revealing Identity in Anonymous Communication Networks
Published 2024-12-01“…This research introduces a new algorithm, Threading Statistical Disclosure Attack with EM (TSDA-EM), that employs real-world data to reveal communication’s behavior in an anonymous social network. …”
Get full text
Article -
2813
Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes
Published 2022-09-01“…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
Get full text
Article -
2814
A Special Points and Neural Network-Based Dynamic Multi-Objective Optimization Algorithm
Published 2025-01-01“…This paper introduces a special points and neural network- based dynamic multi-objective optimization algorithm (SPNN-DMOA) for solving dynamic multi-objective optimization problems (DMOPs) with an irregularly changing pareto set. …”
Get full text
Article -
2815
Optimization of the control system of BP-PID rice polishing unit based on WAO algorithm
Published 2024-11-01“…Then, the overall communication system of the unit was established, the working parameters of the unit were collected in real time, and the rice quality analyzer was introduced to detect the polishing quality indicators of the unit in real time. …”
Get full text
Article -
2816
Cooperative Scheduling of Imaging Observation Tasks for High-Altitude Airships Based on Propagation Algorithm
Published 2012-01-01“…Firstly, the task set is divided by using k-core neighborhood growth cluster algorithm (K-NGCA). Then, a novel swarm intelligence algorithm named propagation algorithm (PA) is combined with the key node search algorithm (KNSA) to optimize the cruising path of each airship and determine the execution time interval of each task. …”
Get full text
Article -
2817
Elevator Operation Health Diagnosis using Vibration Region Segmentation Algorithm via Internet
Published 2025-04-01“…While there are some machine learning algorithms that are used to diagnose elevator condition, their computational complexity still makes it difficult to translate into a real-world application. …”
Get full text
Article -
2818
An Energy-Efficient Routing Algorithm for Underwater Wireless Sensor Networks Inspired by Ultrasonic Frogs
Published 2014-02-01“…In this paper, we present an ultrasonic frog calling algorithm (UFCA) that aims to achieve energy-efficient routing under harsh underwater conditions of UWSNs. …”
Get full text
Article -
2819
Cache Contention Aware Virtual Machine Placement and Mitigation Using Adaptive ABC Algorithm
Published 2025-01-01“…Upon detecting a cache-based side-channel attack, the algorithm identifies the optimal PM for migration, ensuring minimal contention. …”
Get full text
Article -
2820
Optimization of Random Forest Algorithm with Backward Elimination Method in Classification of Academic Stress Levels
Published 2025-06-01“…Data mining is often used to detect diseases, one of which is the Random Forest algorithm. …”
Get full text
Article