Showing 17,001 - 17,020 results of 25,328 for search 'research algorithm', query time: 0.20s Refine Results
  1. 17001

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  2. 17002

    Design and Improvement of Routing Protocol for Field Observation Instrument Networking Based on LEACH Protocol by Jiuyuan Huo, Xingyue Deng, Hamzah Murad Mohammed Al-Neshmi

    Published 2020-01-01
    “…The results showed that the improved algorithm FOI-LEACH balances the network energy consumption and alleviates the “hot spot” problem, to extend the lifetime of network nodes.…”
    Get full text
    Article
  3. 17003

    Improvement of crack tip position estimation in DIC images by image processing methods by Najat Zekriti, Fatima Majid, Hachimi Taoufik, Yassine Tounsi, Rajaa Rhanim, Ibrahim Mrani, Hassan Rhanim

    Published 2022-12-01
    “…However, the second procedure involves a developed algorithm detecting the discontinuity using digital image correlation (DIC) measurement. …”
    Get full text
    Article
  4. 17004
  5. 17005

    Predicting hydrocarbon reservoir quality in deepwater sedimentary systems using sequential deep learning techniques by Xiao Hu, Jun Xie, Xiwei Li, Junzheng Han, Zhengquan Zhao, Hamzeh Ghorbani

    Published 2025-07-01
    “…Three sequential deep learning models—Recurrent Neural Network and Gated Recurrent Unit—were developed and optimized using the Adam algorithm. The Adam-LSTM model outperformed the others, achieving a Root Mean Square Error of 0.009 and a correlation coefficient (R2) of 0.9995, indicating excellent predictive performance. …”
    Get full text
    Article
  6. 17006

    An Improved UNet-Based Path Recognition Method in Low-Light Environments by Wei Zhong, Wanting Yang, Junhuan Zhu, Weidong Jia, Xiang Dong, Mingxiong Ou

    Published 2024-11-01
    “…Compared to the FCN and SegNet algorithms, this method provides higher detection accuracy and offers a new theoretical foundation and research approach for path recognition in low-light environments.…”
    Get full text
    Article
  7. 17007

    Visual information perception system of coal mine comprehensive excavation working face for edge computing terminal by Dongyang Zhao, Guoyong Su, Pengyu Wang

    Published 2024-10-01
    “…Secondly, the pruning and distillation algorithm is used to lighten the FSBD‐YOLOv5s model, and the model complexity is greatly reduced while maintaining the model detection accuracy. …”
    Get full text
    Article
  8. 17008

    Analysis of Solar Radiation Shielding in Space for Climate Mitigations of the Earth by Kyung Bae Jang, Tae Ho Woo

    Published 2025-04-01
    “…The effectiveness of space solar shielding is evaluated using a complex algorithm that considers various parameters of the shielding satellite, such as its size, orbit, and deployment mechanism. …”
    Get full text
    Article
  9. 17009

    The canyon of Haidamatskyi Iar in the village of Busha: Geotourism assessment by Yulian Braychevskyy, Volodymyr Korinnyi, Olga Kovtoniuk, Nataliia Pohorilchuk

    Published 2025-09-01
    “…For each algorithm, we presented results as a percentage of the maximum for easier comparison. …”
    Get full text
    Article
  10. 17010

    Thermal, solutal, and radiative oscillatory behavior in vibrating inclined chambers with Non-Darcy porous media by Z.Z. Rashed, Sameh E. Ahmed

    Published 2025-09-01
    “…Vibrational double diffusion has emerged as a captivating topic in modern research due to its crucial role in improving mixing, disrupting thermal boundary layers, and stabilizing convection structures, particularly in nanofluids and porous media. …”
    Get full text
    Article
  11. 17011
  12. 17012

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. …”
    Get full text
    Article
  13. 17013

    Advanced Text Summarization Model Incorporating NLP Techniques and Feature-Based Scoring by Estabraq Abdulreda Kadhim, Mohammad-Reza Feizi-Derakhshi, Hadi S. Aghdasi

    Published 2025-01-01
    “…It thus suggests that the approach is applicable in real-life situations and deserves further research.…”
    Get full text
    Article
  14. 17014

    On the Combination of Harmonics and Polynoms in Econometric Modeling of RUB/AZN Exchange Rate by L. M. Mamedova

    Published 2022-11-01
    “…Conducting a combinational polynomial and spectral analysis of time series formed on the basis of daily observations of changes in the RUB/AZN exchange rate with pronounced fluctuations for the period 11.05.2017- 02.11.2018 based on computer econometric modeling.The purpose of the research. The possibility of describing the global rate dynamics by approximation with a combination of a nonlinear polynomial trend and harmonic oscillations of various frequencies relative to this curve; the ability to calculate amplitudes and phases, which can be used to estimate the power spectrum of the Fourier approximation; the ability to develop a high-precision algorithm for predicting exchange rate changes in RUB/AZN.Materials and methodology. …”
    Get full text
    Article
  15. 17015

    Identification and application of shale lithofacies based on conventional logging curves: A case study of the second member of Funing Formation in Qintong Sag, Subei Basin by WANG Xinqian, YU Wenduan, MA Xiaodong, ZHOU Tao, TAI Hao, CUI Qinyu, DENG Kong, LU Yongchao, LIU Zhanhong

    Published 2024-10-01
    “…Additionally, a BP neural network method optimized by the ASO(Atom Search Optimization) algorithm was utilized to perform data mining on logging information. …”
    Get full text
    Article
  16. 17016
  17. 17017

    Optimizing relay node selection in cooperative wireless body area networks with modified POA by A. Hena Rubavathy, S. Sundar

    Published 2024-12-01
    “…In the realm of Wireless Body Area Networks (WBANs), cooperative communications emerge as a crucial research focus, lauded for their capacity to mitigate fading and optimize spectral efficiency. …”
    Get full text
    Article
  18. 17018
  19. 17019

    ISCCO: a deep learning feature extraction-based strategy framework for dynamic minimization of supply chain transportation cost losses by Yangyan Li, Tingting Chen

    Published 2024-12-01
    “…Additionally, ISCCO optimized goods allocation using a genetic algorithm enhanced integer linear programming model. …”
    Get full text
    Article
  20. 17020

    Machine tool FEM model correction assisted by dynamic evolution sequence by Weihao Lin, Peng Zhong, Xindi Wei, Li Zhu, Xuanlong Wu

    Published 2025-05-01
    “…Abstract In the simulation analysis of large-scale industrial instruments such as machine tools, in order to ensure simulation accuracy, model parameter correction is necessary. This research presents a machine tool model correction method assisted by the dynamic evolution sequence (DES). …”
    Get full text
    Article