-
821
Spark-Based Label Diffusion and Label Selection Community Detection Algorithm for Metagenome Sequence Clustering
Published 2023-11-01“…In SpaRC, sequences are defined as nodes and clustered by a parallel label propagation algorithm (LPA). To address the randomness of label selection from the parallel LPA during clustering and improve the completeness of metagenome sequence clustering, Spark-based parallel label diffusion and label selection community detection algorithm is proposed in the paper to obtain more accurate clustering results. …”
Get full text
Article -
822
DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK
Published 2025-06-01Subjects: “…decision tree, cognitive radio network, hill climbing algorithm, spectrum hole detection, entropy, throughput.…”
Get full text
Article -
823
An Information Geometry-Based Track-Before-Detect Algorithm for Range-Azimuth Measurements in Radar Systems
Published 2025-06-01“…The detection of weak moving targets in heterogeneous clutter backgrounds is a significant challenge in radar systems. …”
Get full text
Article -
824
Infrared Small Target Detection Algorithm Based on Improved Dense Nested U-Net Network
Published 2025-01-01Get full text
Article -
825
Local outlier factor algorithm based on correction of bidirectional neighbor
Published 2020-08-01“…A local outlier factor algorithm based on bidirectional neighbor correction was proposed to solve the problems of existing outlier detection algorithms such as difficulty in parameter selection,poor efficiency and low accuracy.The bidirectional neighbor searching algorithm was used to reduce the neighbor search time.Then the bidirectional neighbor pruning algorithm was used to reduce the number of parameters and unnecessary calculations.And the correction factor based on bidirectional neighbors was used to improve the calculation accuracy.Experimental results show that the proposed algorithm has better performance in parameter selection and time efficiency than other outlier detection methods.The correction factor improves the accuracy of the algorithm,in the synthetic data set and UCI data set.…”
Get full text
Article -
826
Magnetic Moment Estimation Algorithm Based on Convolutional Neural Network
Published 2025-03-01“…The simulation results demonstrate that the proposed algorithm performs well in noise environments with a signal-to-noise ratio (SNR) greater than −5 dB. …”
Get full text
Article -
827
Enhancing breast cancer diagnosis through machine learning algorithms
Published 2025-07-01“…Some considerable volume of research work has been carried out on the use of Machine Learning algorithms for accurate diagnosis of breast cancer. …”
Get full text
Article -
828
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01Subjects: “…intrusion detection;Apriori algorithm;Boolean vector;fuzzy theory…”
Get full text
Article -
829
MST-YOLO: Small Object Detection Model for Autonomous Driving
Published 2024-11-01Subjects: Get full text
Article -
830
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01Subjects: Get full text
Article -
831
Straight Lines Detection Based on GA with New Modification on Baron's Method
Published 2010-12-01Subjects: “…genetic algorithm…”
Get full text
Article -
832
A New Background-Based Extraction Algorithm under Factor Space Theory
Published 2023-08-01Subjects: “…background-based anomaly detection…”
Get full text
Article -
833
Research Progress of Machine Learning Algorithms Applied in FSO Communication Systems
Published 2025-04-01“…In this article, the research progress of applying typical machine learning algorithms in FSO communication systems in signal detection, channel estimation, auxiliary optical compensation, and other aspects are reviewed. …”
Get full text
Article -
834
S₂Head: Small-Scale Human Head Detection Algorithm by Improved YOLOv8n Architecture
Published 2025-01-01Subjects: “…Head detection…”
Get full text
Article -
835
Research on an Echo-Signal-Detection Algorithm for Weak and Small Targets Based on GM-APD Remote Active Single-Photon Technology
Published 2024-12-01Subjects: Get full text
Article -
836
Decision support algorithm to prevent hardware failures
Published 2024-11-01“…The goal is achieved by developing an algorithm for detecting the beginning of a deviation in a time series consisting of sequentially recorded diagnostic parameters. …”
Get full text
Article -
837
Improved SOM algorithm for damage characterization based on visual sensing
Published 2025-06-01Subjects: Get full text
Article -
838
Video semantics-driven resource allocation algorithm in Internet of vehicles
Published 2021-07-01“…Aiming at the problem that traditional resource allocation methods will no longer be applicable, with the demand of intelligent computing services such as video semantic understanding in Internet of vehicles, the video semantic driven resource allocation algorithm was studied.First of all, taking the object detection task as an example, a semantic driven resource allocation guidance model for video was proposed and an algorithm for solving model parameters was given.Secondly, an optimization problem of resource allocation driven by video semantics in Internet of vehicles was constructed, which was transformed into a convex problem and solved by convex optimization algorithm.Furthermore, in order to reduce the complexity of the convex optimization algorithm, a resource allocation algorithm based on reinforcement Q learning was proposed.Finally, the performance advantages of the proposed algorithm are verified by simulations.…”
Get full text
Article -
839
Tennis Assistance Technology Based on Dynamic Time Warping Algorithm
Published 2025-01-01“…This technology combines components such as normalization, support vector machine, joint detection, sparse matrix, and second-order stepping mode to improve algorithm performance and reduce computational complexity. …”
Get full text
Article -
840
SPINEX-anomaly: similarity-based predictions with explainable neighbors exploration for anomaly and outlier detection
Published 2025-04-01Subjects: “…Algorithm…”
Get full text
Article