Showing 1,701 - 1,720 results of 14,154 for search '(improved OR improve) model algorithm', query time: 0.29s Refine Results
  1. 1701

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  2. 1702

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  3. 1703

    A Computationally Efficient Iterative Algorithm for Estimating the Parameter of Chirp Signal Model by Jiawen Bian, Jing Xing, Zhihui Liu, Lihua Fu, Hongwei Li

    Published 2014-01-01
    “…A novel iterative algorithm is proposed to estimate the frequency rate of the considered model by constructing the iterative statistics with one-lag and multilag differential signals. …”
    Get full text
    Article
  4. 1704
  5. 1705

    Construction of Graduate Behavior Dynamic Model Based on Dynamic Decision Tree Algorithm by Fen Yang

    Published 2022-01-01
    “…The results show that the big data integration system based on big data and dynamic decision tree algorithm has high adaptability. Incremental adaptive optimization of the traditional decision tree model can significantly improve the prediction effect and prediction time of dynamic data and provide theoretical support for the industrialization and social significance of big data technology. …”
    Get full text
    Article
  6. 1706
  7. 1707

    Multipath Branch Model-Aided Differential Evolution Algorithm Based on Regional Error by Yang Liu, Yi-Xuan Zhang, Zhong-Chao Lin, Yu-Jia Zou

    Published 2024-01-01
    “…In order to overcome the defect of a single model in the adaptive antenna optimization problem and improving the efficiency and accuracy of the model, a method called multipath branching model-aided differential evolution algorithm analysis (MMDEA-RE) is proposed. …”
    Get full text
    Article
  8. 1708

    ECAPM: An Enhanced Coverage Algorithm in Wireless Sensor Network Based on Probability Model by Sun Zeyu, Wang Huanzhao, Wu Weiguo, Xing Xiaofei

    Published 2015-06-01
    “…To address this problem, this paper proposes ECAPM, that is, Enhanced Coverage Algorithm Based on Probability Model. Given an area to monitor, ECAPM can calculate the minimum number of sensor nodes to cover that area. …”
    Get full text
    Article
  9. 1709

    An optimization model of computer network security based on GABP neural network algorithm by Jiangang Wang, Xiaoyan Wang

    Published 2025-04-01
    “…Conclusion The GA-BPNN model enhances network security by improving threat detection and incident response. …”
    Get full text
    Article
  10. 1710

    Integrating Artificial Intelligence and Computational Algorithms to Optimize the 15-Minute City Model by Marwa Abouhassan, Samah Elkhateeb, Raneem Anwar

    Published 2024-12-01
    “…Furthermore, it elaborates on how the integration of artificial intelligence (AI) and computational tools can be utilized in optimizing the 15-minute city model. We reveal how AI-driven algorithms, machine learning techniques, and advanced data analytics can enhance urban planning, improve accessibility, and foster social integration. …”
    Get full text
    Article
  11. 1711

    Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model by ZHANG Jingke, YANG Kai, LI Chao, WANG Hongyan

    Published 2024-12-01
    “…Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. …”
    Get full text
    Article
  12. 1712

    MODELLING FLUCTUATIONS OF GROUNDWATER LEVEL USING MACHINE LEARNING ALGORITHMS IN THE SOKOTO BASIN by Samson Alfa, Haruna Garba, Augustine Odeh

    Published 2025-05-01
    “…Among the models, the XGBoost algorithm demonstrated the highest performance, providing precise predictions that closely aligned with the actual groundwater levels. …”
    Get full text
    Article
  13. 1713

    Enhancing Performance of Credit Card Model by Utilizing LSTM Networks and XGBoost Algorithms by Kianeh Kandi, Antonio García-Dopico

    Published 2025-02-01
    “…This paper conducts an extensive literature review, comparing various machine learning methods, and proposes an innovative framework that compares LSTM with XGBoost to improve fraud detection accuracy. LSTM, a recurrent neural network renowned for its ability to capture temporal dependencies within sequences of transactions, is compared with XGBoost, a formidable ensemble learning algorithm that enhances feature-based classification. …”
    Get full text
    Article
  14. 1714

    Problems of Algorithms Development to Determine Quality of Topic Models Ensembles for Make Rubricators by A. P. Shiryaev, A. R. Fedorov, P. A. Fedorov, L. G. Gagarina, E. M. Portnov

    Published 2018-09-01
    “…They can significantly improve the accuracy of modeling results. The main purpose of this research is to increase the clustering effectiveness of textual information by using the ensemble thematic models. …”
    Get full text
    Article
  15. 1715

    Control algorithm for an elastic-viscoplastic model to study processes of shock interaction of bodies by V. L. Lapshin, Е. V. Zenkov

    Published 2021-09-01
    “…The research objective is to develop a more accurate shock simulation algorithm through the controlled transformation of the mechanorheological shock process model from elasticviscous to elastic-viscoplastic.Materials and Methods. …”
    Get full text
    Article
  16. 1716

    A comparative study of the performance of ten metaheuristic algorithms for parameter estimation of solar photovoltaic models by Adel Zga, Farouq Zitouni, Saad Harous, Karam Sallam, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2025-01-01
    “…This study conducts a comparative analysis of the performance of ten novel and well-performing metaheuristic algorithms for parameter estimation of solar photovoltaic models. …”
    Get full text
    Article
  17. 1717

    A Model For Optimization of Knowledge Management Outsourcing Decision Using Genetic Algorithm by Ameneh Khadivar, Fatemeh Abbasi, Sheyda Akbarian

    Published 2025-06-01
    “…Purpose: The purpose of this study is to develop an optimization model for knowledge management outsourcing using a genetic algorithm. …”
    Get full text
    Article
  18. 1718

    Research on obstacle avoidance for aerial work vehicle booms with light arrays based on an improved gradient projection method by Yi HUANG, Lei DENG, Kangyi DENG, Qin SHU, Guangan REN, Zhihong ZHOU

    Published 2025-04-01
    “…At the same time, the end position error reduction algorithm is added to reduce the end velocity and improve the trajectory tracking accuracy. …”
    Get full text
    Article
  19. 1719

    Learning‐based tracking control of AUV: Mixed policy improvement and game‐based disturbance rejection by Jun Ye, Hongbo Gao, Manjiang Hu, Yougang Bian, Qingjia Cui, Xiaohui Qin, Rongjun Ding

    Published 2025-04-01
    “…By combining prior dynamic knowledge and actual sampled data, the proposed approach effectively mitigates the defect caused by the inaccurate dynamic model and significantly improves the training speed of the ADP algorithm. …”
    Get full text
    Article
  20. 1720

    A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment by Joelle Kabdjou, Norihiko Shinomiya

    Published 2025-01-01
    “…Using a Long Short-Term Memory (LSTM) algorithm optimized by Super SAPSO (Simulated Annealing Particle Swarm Optimization), the model forecasts server failures with improved accuracy, reducing False Alarm Rates and improving Failure Detection Rates. …”
    Get full text
    Article