-
1921
The Morphological Classification of Galaxy Clusters: Algorithms for Applying the Numerical Criteria
Published 2025-07-01“…For the detailed study of the inner structure of galaxy clusters, algorithms were developed for detecting various types of regular substructures inside such objects automatically. …”
Get full text
Article -
1922
Palm Print Edge Extraction Using Fractional Differential Algorithm
Published 2014-01-01“…The experiment results showed that this algorithm can reduce noise and detect rich edge details and has higher SNR than traditional methods.…”
Get full text
Article -
1923
Logical derivation and integrating legal knowledge bases: basic algorithms
Published 1998-12-01“…In this article we present comparison and combining algorithms based on derivation by model generation. …”
Get full text
Article -
1924
Development of an algorithm for identifying signs of intraframe editing of video images
Published 2024-09-01“…This paper discusses an algorithm for detecting signs of intra-frame editing of video images when cutting or pasting into the source video stream. …”
Get full text
Article -
1925
NIR Spectroscopy with Application of Chemometric Algorithms in Forensic Wood Analysis
Published 2022-10-01Get full text
Article -
1926
A Novel Path Control Algorithm for Networked Underwater Robot
Published 2018-01-01Get full text
Article -
1927
Intelligent Collaborative Event Query Algorithm in Wireless Sensor Networks
Published 2011-09-01“…Event query processing is a very important issue in wireless sensor networks (WSNs). In order to detect event early and provide monitoring information and event query timely in WSNs, an efficient intelligent collaborative event query (ICEQ) algorithm is proposed, in which sensor nodes that are near to the boundary of events are selected to accomplish complex event monitoring and query processing through intelligent collaboration. …”
Get full text
Article -
1928
Collaborative Spectrum Sensing Optimisation Algorithms for Cognitive Radio Networks
Published 2010-01-01“…The main challenge for a cognitive radio is to detect the existence of primary users reliably in order to minimise the interference to licensed communications. …”
Get full text
Article -
1929
Improved Algorithm for Analysis of DNA Sequences Using Multiresolution Transformation
Published 2015-01-01Get full text
Article -
1930
APPLICATION OF THE WORD2VEC ALGORITHM FOR CLINICAL DIAGNOSIS DETERMINATION
Published 2025-02-01“…The article presents a Word2Vec algorithm-based approach for detecting diagnoses of cardiovascular diseases from collected patient histories, as well as refining existing diagnoses. …”
Get full text
Article -
1931
SMOTEHashBoost: Ensemble Algorithm for Imbalanced Dataset Pattern Classification
Published 2025-01-01“…The majority class is often favored by conventional classifiers, which can lead to biases from improper oversampling or subpar performance when detecting instances of the minority class. Consequently, there is growing concern about algorithmic fairness. …”
Get full text
Article -
1932
Algorithm for Generating Bifurcation Diagrams Using Poincaré Intersection Plane
Published 2025-05-01“…This paper presents a computational algorithm for studying bifurcations in dynamic systems, especially for systems with chaotic behavior that depends on parameter changes. …”
Get full text
Article -
1933
Research on High-Dynamic Tracking Algorithms for FH-BOC Signals
Published 2024-11-01“…Against this background, this paper proposes a comprehensive high-dynamic tracking algorithm for FH-BOC signals. (1) Based on the adaptive Kalman filter algorithm, high-precision carrier tracking was achieved in high-dynamic environments. (2) By leveraging the correlation between the ranging code and frequency-hopping offset carrier, a composite pseudo-code is generated through the XOR operation, and a corresponding composite code-tracking loop is introduced. (3) Based on code loop tracking results, the frequency-hopping moments of the subcarrier are detected, and a phase-locked loop for the frequency-hopping subcarrier is established. …”
Get full text
Article -
1934
Parallel clustering algorithm for large-scale biological data sets.
Published 2014-01-01“…The affinity propagation algorithm outperforms many other classical clustering algorithms and is widely applied into the biological researches. …”
Get full text
Article -
1935
Examining the Efficiency of Learning-Based Algorithms in the Process of Declaring Customs
Published 2022-12-01“…Regarding the K-Fold method, which assumes K to be equal to 10, similar success rates were obtained for the Decision Tree (75.84%) and Bagging (75.83%) algorithms. These results reveal the use of machine learning algorithms to be an effective method for detecting notification errors. …”
Get full text
Article -
1936
Benchmarking and improving algorithms for attributing satellite-observed contrails to flights
Published 2025-07-01“…In this work, we present a method for producing synthetic contrail detections with predetermined contrail-to-flight attributions that can be used to evaluate – or “benchmark” – and improve such attribution algorithms. …”
Get full text
Article -
1937
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
1938
Research on γ Spectrum Reconstruction Based on Mi-Gold Algorithm
Published 2025-05-01“…To address the challenges faced by the Gold algorithm in reconstructing the low-energy resolution γ spectrum, such as the high number of iterations and the low counting rate for weak peaks, an iterative algorithm framework based on the Gold reconstruction algorithm was presented and it was extended to three novel iterative algorithms. …”
Get full text
Article -
1939
An algorithm for automatic fitting and formula assignment in atmospheric mass spectra
Published 2025-04-01“…</p> <p>The main result of this study is the algorithm itself. While further improvements and tweaks are possible, the algorithm presented here is currently being implemented into the commonly used Tofware analysis software package to allow easy utilization by the broader community. …”
Get full text
Article -
1940
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01Subjects: Get full text
Article