-
421
Unsupervised feature selection in binarization of real attributes for conceptual clustering
Published 2025-01-01Get full text
Article -
422
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01“…., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
Get full text
Article -
423
Vector Ising spin annealer for minimizing Ising Hamiltonians
Published 2025-05-01“…Abstract Complex optimization problems can be solved via dedicated machines which encode the problem in the couplings of spin Hamiltonians. …”
Get full text
Article -
424
HGTFM: Hierarchical Gating-Driven Transformer Fusion Model for Robust Multimodal Sentiment Analysis
Published 2025-01-01“…This enables HGFM to more accurately identify the contributions of samples with significant modal variations, thus optimizing the module potential. The experimental results on several established benchmark datasets demonstrate that HGTFM achieves comparable performance improvements in multimodal sentiment analysis tasks.…”
Get full text
Article -
425
Multi-USV Task Assignment Based on NSGA II-MC
Published 2025-01-01“…To address the multi-USV task allocation optimization problem, an allocation optimization model for USV clusters has been constructed, which aims to maximize the probability of target detection and minimize the collaborative time of USV clusters. …”
Get full text
Article -
426
Modification of Glucose Metabolic Pathway to Enhance Polyhydroxyalkanoate Synthesis in <i>Pseudomonas putida</i>
Published 2024-11-01“…The final mcl-PHA content and titers of QSRZ609 reached 57.3 wt% and 2.5 g/L, an increase of and 20.9% and 27.3% over that of the parent strain QSRZ605 and an increase of 110.4% and 159.9% higher as compared to QSRZ6, respectively. The fermentation was optimized with a feeding medium in shaker flacks; then, the mcl-PHA contents and titer of QSRZ609 were 59.1 wt% and 6.8 g/L, respectively. …”
Get full text
Article -
427
A byte-size multi-variable-length-code based string matching algorithm for Alpha image coding
Published 2018-11-01“…According to the characteristics of Alpha image and the statistical characteristics of coding parameters of string matching algorithm,an Alpha image coding algorithm based on byte-size multi-variable long-length string matching was proposed.The algorithm firstly used a byte-type multi-variable long-code scheme for joint optimization coding of multiple string matching coding parameters,the offset parameter was then encoded using a segmentation mapping scheme with proximity offset prioritization.Finally,the matching string length parameter was matched with a segmentation coding scheme.The experimental results show that compared with LZ4HC,zlib,PNG and HEVC (x265),the proposed algorithm has the advantages of ultra-low complexity and high coding efficiency.…”
Get full text
Article -
428
HVS-based rate-control scheme for object-based embedded image coding
Published 2012-04-01“…A new rate control algorithm for object-based embedded coding was proposed by incorporating the characteristics of human visual systems (HVS).Firstly,the importance and coding priority of each visual object were estimated.Then,bit-plane modeling and entropy coding were implemented for each object based on the coding priority and its corresponding bit stream was outputted.Finally,bit streams of visual objects were truncated and reassembled based on the rate-distortion optimization principle under the given bit rate.Experimental results reveal that the proposed algorithm can encode and transmit different important objects with different strategies.Compared with the PCRD algorithm,the proposed algorithm can improve the overall visual quality of the reconstructed image.…”
Get full text
Article -
429
Robust and Efficient Phase Estimation in Legged Robots via Signal Imaging and Deep Neural Networks
Published 2025-01-01“…Extensive experiments on a 3-DoF hopping robot leg, with contact sensor data as ground truth, show that EfficientNet-B0 deep model achieves 98.97% accuracy with RP imaging and an optimized inference time of 2 milliseconds. Comparative validation on an independent dataset from the MIT Mini Cheetah traversing eight terrains demonstrates our model’s generalizability. …”
Get full text
Article -
430
Genetic adjuvants: A paradigm shift in vaccine development and immune modulation
Published 2025-06-01“…This review explores the potential of genetically encoded adjuvants, including cytokines, chemokines, and other immune modulators. …”
Get full text
Article -
431
Time-varying stimuli that prolong IKK activation promote nuclear remodeling and mechanistic switching of NF-κB dynamics
Published 2025-08-01“…Abstract Temporal properties of molecules within signaling networks, such as sub-cellular changes in protein abundance, encode information that mediate cellular responses to stimuli. …”
Get full text
Article -
432
A Novel Raster Map Exchange Scheme Based on Visual Cryptography
Published 2021-01-01“…At last, by optimizing the selection of encrypted blocks, we achieve a high-quality secret recovery from generated multiple equal-sized shares. …”
Get full text
Article -
433
AttenhERG: a reliable and interpretable graph neural network framework for predicting hERG channel blockers
Published 2024-12-01“…By integrating uncertainty estimation, AttenhERG demonstrates superior reliability compared to benchmark models. Two case studies, involving APH1A and NMT1 inhibitors, further emphasize AttenhERG's practical application in compound optimization.…”
Get full text
Article -
434
Stroke Risk Classification Using the Ensemble Learning Method of XGBoost and Random Forest
Published 2025-06-01“…The dataset was split into 80% training and 20% testing data (hold-out test) to ensure objective evaluation. Hyperparameter optimization was performed using Bayesian optimization, while model evaluation employed stratified K-fold cross-validation to prevent overfitting. …”
Get full text
Article -
435
Low-Overhead Magic State Distillation with Color Codes
Published 2025-07-01“…In this work, we perform such optimization for two-dimensional color codes, which are promising due to their higher encoding rates compared to surface codes, transversal implementation of Clifford gates, and efficient lattice surgery. …”
Get full text
Article -
436
Utilizing statistical analysis for motion imagination classification in brain-computer interface systems.
Published 2025-01-01“…EEG-based BCI technology encodes human brain intentions into cortical potentials, which are recorded and decoded into control commands. …”
Get full text
Article -
437
Sensitive and precise quantification of insulin-like mRNA expression in Caenorhabditis elegans.
Published 2011-03-01“…For this set of genes and the standard nCounter protocol, sensitivity and precision were comparable between the two platforms. We optimized conditions of the nCounter assay by varying the mass of total RNA used for hybridization, thereby increasing sensitivity up to 50-fold and reducing the median coefficient of variation as much as 4-fold. …”
Get full text
Article -
438
Recent advances in the inverse design of silicon photonic devices and related platforms using deep generative models
Published 2025-06-01“…The increasing complexity of modern optical devices necessitates advanced design methodologies that can efficiently navigate vast parameter spaces and generate novel, high-performance structures. Established optimization methods, such as adjoint and topology optimization, have successfully addressed many design challenges. …”
Get full text
Article -
439
Computational methods and technical means of processing signals of side electromagnetic emanation
Published 2024-11-01“…This indicator has been reduced by more than 60% compared to image restoration without post-processing. …”
Get full text
Article -
440
Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY
Published 2025-06-01“…As an alternative to the simple (e.g., additive) encoding function of Boolean masking, a collection of more algebraically complex masking types has emerged. …”
Get full text
Article