Suggested Topics within your search.
Suggested Topics within your search.
-
1101
Collaborative filtering recommendation algorithm based on fine-grained mining and neighborhood awareness attention
Published 2025-07-01“…The proposed solution not only addresses the limitations of traditional algorithms but also offers a more robust and efficient approach for network information recommendations, thereby advancing the capability of recommendation systems to handle sparse data and cold start scenarios effectively.…”
Get full text
Article -
1102
Weaponizing the Workplace: How Algorithmic Management Shaped Amazon’s Antiunion Campaign in Bessemer, Alabama
Published 2025-02-01“…It also looks at how workers resist this control. But how does algorithmic management affect the ability of employers to respond to collective action? …”
Get full text
Article -
1103
-
1104
Pattern synthesis of linear array antennas based on Chaos Triangular Pelican Optimization Algorithm
Published 2025-04-01“…This article proposes an optimization algorithm called Chaos Triangular Pelican Optimization Algorithm (CTPOA), which combines Logistic chaotic mapping initialization and triangle walk strategy with original Pelican Optimization Algorithm (POA). …”
Get full text
Article -
1105
The iterated score regression estimation algorithm for PCA-based missing data with high correlation
Published 2025-03-01“…To compare some existing algorithms, we suggest the modifications of three popularly used algorithms that are also used to deal with missing data but are not highly correlated. …”
Get full text
Article -
1106
A lithofacies modeling method based on a new integrated algorithm and its application
Published 2023-04-01“…An alternative combination algorithm, model τ, is proposed which is not only simple, but also can ensure consistency of results in the presence of complex data interdependencies. …”
Get full text
Article -
1107
Research on Target Detection Algorithm for Solder Joint Defects Based on the Improved YOLOv8
Published 2025-01-01“…Finally, the improved algorithm was experimentally validated on the target detection dataset of solder joint defect, and its generalization ability was also verified. …”
Get full text
Article -
1108
Exact algorithm for the problem of the minimum complete spanning tree of a divisible multiple graph
Published 2025-06-01“…Also we define a subclass of divisible graphs, for which the algorithm runs in polynomial time.…”
Get full text
Article -
1109
Metaheuristic Algorithm and Laser Projection for Adjusting the Model of the Last Lower Surface to a Footprint
Published 2024-11-01“…Also, the last lower-surface model has been adjusted through the computational algorithms to perform custom shoe lasts. …”
Get full text
Article -
1110
Spline adaptive filtering algorithm based on different iterative gradients: Performance analysis and comparison
Published 2023-02-01“…Detailed convergence performance and computational complexity analyses are carried out also. Furthermore, compared with existing SAF algorithms, the influence of step-size and noise types on SAF algorithms are explored for nonlinear system identification under artificial datasets. …”
Get full text
Article -
1111
Cold Chain Logistics Path Optimization with Adaptive Speed and Hybrid Genetic Algorithm Solution
Published 2025-06-01“…Through comparison to other algorithms in the literature, the results show that the hybrid genetic algorithm not only improves customer satisfaction, but also maintains a lower total cost, which is obviously superior when solving the complex cold chain distribution path optimization problem; further comparison and analysis of the mathematical model in this paper with the single-dimension satisfaction model reveals that under the same satisfaction constraint threshold, the model in this paper can significantly reduce the system operating cost; we also deeply discuss the influence mechanism of vehicle traveling mode and customer point sparsity radius on distribution path planning.…”
Get full text
Article -
1112
Design of Enterprise Economic Information Management System Based on Big Data Integration Algorithm
Published 2022-01-01“…The main focus of this research includes the mode, framework, and function of the whole system software. Moreover, it also comprises of the use of Internet platform big data technology to realize the practicality, stability, and security of the system database algorithm, which has been practically used by enterprises to improve office efficiency and meet the needs of daily management of enterprises. …”
Get full text
Article -
1113
Optimization Design of Fast Neutron Target Station Beam Extraction Based on Genetic Algorithm
Published 2025-03-01“…During calibration, the intensity of neutrons will also affect the overall efficiency, so the value of the uncollided neutron flux is also an important design indicator. …”
Get full text
Article -
1114
A GD-PSO Algorithm for Smart Transportation Supply Chain ABS Portfolio Optimization
Published 2021-01-01“…Experiments also showed that the GD-PSO algorithm solved the problem of portfolio optimization in smart transportation supply chain ABS effectively.…”
Get full text
Article -
1115
A Convergent Algorithm for Energy-Balanced Cluster-Heads Selection in Wireless Sensor Networks
Published 2014-04-01“…Thus, the large deviation of network lifetime makes these algorithms impractical. This paper proposes a new clustering algorithm which not only reduces the average energy consumption rate, but also converges the residual energies of all nodes on a small interval. …”
Get full text
Article -
1116
A Fast Algorithm of Generalized Radon-Fourier Transform for Weak Maneuvering Target Detection
Published 2016-01-01“…Several numerical experiments are also provided to demonstrate the effectiveness of the proposed method.…”
Get full text
Article -
1117
Grading Traditional Exams Using Image Processing Techniques and the Word Similarity Weights Algorithm
Published 2022-06-01“…The rapid developments in technology have also been reflected in education. Educational institutions have started to support their computer-aided trainings with online and offline platforms. …”
Get full text
Article -
1118
Social Bot Detection using Machine Learning Algorithms: A Survey and Research Challenges
Published 2023-09-01Get full text
Article -
1119
Lightweight detection model for safe wear at worksites using GPD-YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
1120
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article