-
1661
Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization
Published 2025-01-01“…These algorithms are also often referred to as PSO strategies. …”
Get full text
Article -
1662
Effect of bit-size reduced half-precision floating-point format on image pixel characterization for AI applications
Published 2024-12-01“…The updated pixel values after applying the mantissa bit-size reduction are displayed in this study, along with a theoretical explanation of its inaccuracy. Since multipliers and adders are needed for the majority of mathematical equations in machine learning image algorithms, they are developed later in this work to process the image. …”
Get full text
Article -
1663
Comparative analysis of transfer learning performance on generalised EEG data for use in a depression diagnosis task
Published 2025-01-01“…In order to test the quality of contrastive learning, the dataset was augmented and the following algorithms were selected as the donor network: SimCLR, MoCo, NNCLR, BarlowTwins, DINO. …”
Get full text
Article -
1664
Joint Channel Assignment and Routing in Multiradio Multichannel Wireless Mesh Networks: Design Considerations and Approaches
Published 2016-01-01“…Furthermore, the set of reconfiguration algorithms to adapt the network traffic dynamics is also discussed. …”
Get full text
Article -
1665
An Efficient Global Optimization Approach for Reliability Maximization of Friction-Tuned Mass Damper-Controlled Structures
Published 2018-01-01“…In order to show the effectiveness of EGO, its results are compared to those of other algorithms from the literature. The results showed that EGO outperformed the competing algorithms, successfully providing the optimum solution of FTMD design under uncertainty within a reasonable computational effort.…”
Get full text
Article -
1666
UNS Geo: LiDAR Dataset for point cloud classification in urban areas
Published 2025-07-01“…Although in the last few years, different methodologies and algorithms have been proposed, precise and detailed point cloud labelling is still challenging. …”
Get full text
Article -
1667
Development of an Intelligent System for the Recommendation of the Most Suitable Routes for Pedestrians
Published 2025-07-01“…This data was then integrated into a web-based public participation system, emphasizing the crucial role of citizen input in urban planning. Routing algorithms, including A* and Dijkstra's algorithms, were employed to identify optimized pedestrian routes based on the community feedback. …”
Get full text
Article -
1668
Artificial Intelligence for Automatic Pain Assessment: Research Methods and Perspectives
Published 2023-01-01“…Concerning methods, early studies were conducted by machine learning algorithms such as support vector machine, decision tree, and random forest classifiers. …”
Get full text
Article -
1669
Software Methodology for Data Control and Collection for Autonomous Monitoring Systems with a Large Amount of Generated Information on the Example of Software for a Hydrological Ra...
Published 2023-05-01“…In some applications, such a flow is redundant and can be optimized through the use of various algorithms for the primary processing of information. …”
Get full text
Article -
1670
Architecture of the discrete sosine transformation processor for image compression systems on the losless-to-lossy circuit
Published 2021-08-01“…It is the inequality of the addition and multiplication operations when they are implemented on FPGAs that caused the search for DCT algorithms with the smallest number of factors. However, even this is not enough, since the structure of the multiplier is many times more complex than the structure of the adder, which made it necessary to look for ways to transform without using multiplications at all. …”
Get full text
Article -
1671
Emergence of Technology Driven Promotional Strategies for Commercialised Indian Cinema
Published 2024-12-01“…The findings of the current study are establishing Online Movie Recommendation System, Classified and Summarized Online Movie Review System and a Personalized Social Networking Marketing (SNM) System by using several ML algorithms such as classification and clustering, KM, SVM, RF, Colour Pair Clustering algorithms. …”
Get full text
Article -
1672
HarmonizR: blocking and singular feature data adjustment improve runtime efficiency and data preservation
Published 2025-02-01“…Due to the inherent presence of missing values by such methods and their additional introduction by means of data integration, renowned algorithms such as ComBat and limma are unable to perform batch effect adjustment. …”
Get full text
Article -
1673
The Prediction of Storm‐Time Thermospheric Mass Density by LSTM‐Based Ensemble Learning
Published 2022-03-01“…In this paper, an available prediction model is established by Long Short‐Term Memory (LSTM)‐based ensemble learning algorithms. However, the generalization ability of the deep learning model is often suspicious since training data and testing data are from the same data set in the conventional method. …”
Get full text
Article -
1674
Explainable AI-based suicidal and non-suicidal ideations detection from social media text with enhanced ensemble technique
Published 2025-01-01“…Our system is compared to cutting-edge methods on several social media datasets using experimental evaluations, demonstrating that it is superior, since it detects suicidal content more accurately than others. …”
Get full text
Article -
1675
MANS-Net: Multiple Attention-Based Nuclei Segmentation in Multi Organ Digital Cancer Histopathology Images
Published 2024-01-01“…We report that MANS-Net significantly outperforms state-of-the-art segmentation algorithms. We achieve F1 score of 0.8457 for PanNuke dataset and F1 score of 0.8137 for Kumar dataset. …”
Get full text
Article -
1676
Enhancing Geomagnetic Navigation with PPO-LSTM: Robust Navigation Utilizing Observed Geomagnetic Field Data
Published 2025-06-01“…The results demonstrate that PPO-LSTM outperforms baseline algorithms, achieving smoother trajectories and higher heading accuracy. …”
Get full text
Article -
1677
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
1678
A Novel Method for Community Detection in Bipartite Networks
Published 2025-05-01“…While several low-time complexity algorithms exist, their practical value in real-world applications is limited since they are typically non-deterministic. …”
Get full text
Article -
1679
A Review of Passenger Counting in Public Transport Concepts with Solution Proposal Based on Image Processing and Machine Learning
Published 2024-12-01“…The research explores various technologies and algorithms, like card swiping, infrared, weight and ultrasonic sensors, RFID, Wi-Fi, Bluetooth, LiDAR, thermos cameras, including CCTV cameras and traditional computer vision methods, and advanced deep learning approaches, highlighting their strengths and limitations. …”
Get full text
Article -
1680
Visible and near‐infrared image fusion based on information complementarity
Published 2025-02-01“…Unfortunately, current fusion algorithms produce artefacts and colour distortion since they cannot make use of spectrum properties and are lacking in information complementarity. …”
Get full text
Article