-
1701
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
1702
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
1703
A Computationally Efficient Iterative Algorithm for Estimating the Parameter of Chirp Signal Model
Published 2014-01-01“…A novel iterative algorithm is proposed to estimate the frequency rate of the considered model by constructing the iterative statistics with one-lag and multilag differential signals. …”
Get full text
Article -
1704
-
1705
Construction of Graduate Behavior Dynamic Model Based on Dynamic Decision Tree Algorithm
Published 2022-01-01“…The results show that the big data integration system based on big data and dynamic decision tree algorithm has high adaptability. Incremental adaptive optimization of the traditional decision tree model can significantly improve the prediction effect and prediction time of dynamic data and provide theoretical support for the industrialization and social significance of big data technology. …”
Get full text
Article -
1706
Analysis of Internet Marketing Forecast Model Based on Parallel K-Means Algorithm
Published 2021-01-01Get full text
Article -
1707
Multipath Branch Model-Aided Differential Evolution Algorithm Based on Regional Error
Published 2024-01-01“…In order to overcome the defect of a single model in the adaptive antenna optimization problem and improving the efficiency and accuracy of the model, a method called multipath branching model-aided differential evolution algorithm analysis (MMDEA-RE) is proposed. …”
Get full text
Article -
1708
ECAPM: An Enhanced Coverage Algorithm in Wireless Sensor Network Based on Probability Model
Published 2015-06-01“…To address this problem, this paper proposes ECAPM, that is, Enhanced Coverage Algorithm Based on Probability Model. Given an area to monitor, ECAPM can calculate the minimum number of sensor nodes to cover that area. …”
Get full text
Article -
1709
An optimization model of computer network security based on GABP neural network algorithm
Published 2025-04-01“…Conclusion The GA-BPNN model enhances network security by improving threat detection and incident response. …”
Get full text
Article -
1710
Integrating Artificial Intelligence and Computational Algorithms to Optimize the 15-Minute City Model
Published 2024-12-01“…Furthermore, it elaborates on how the integration of artificial intelligence (AI) and computational tools can be utilized in optimizing the 15-minute city model. We reveal how AI-driven algorithms, machine learning techniques, and advanced data analytics can enhance urban planning, improve accessibility, and foster social integration. …”
Get full text
Article -
1711
Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model
Published 2024-12-01“…Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. …”
Get full text
Article -
1712
MODELLING FLUCTUATIONS OF GROUNDWATER LEVEL USING MACHINE LEARNING ALGORITHMS IN THE SOKOTO BASIN
Published 2025-05-01“…Among the models, the XGBoost algorithm demonstrated the highest performance, providing precise predictions that closely aligned with the actual groundwater levels. …”
Get full text
Article -
1713
Enhancing Performance of Credit Card Model by Utilizing LSTM Networks and XGBoost Algorithms
Published 2025-02-01“…This paper conducts an extensive literature review, comparing various machine learning methods, and proposes an innovative framework that compares LSTM with XGBoost to improve fraud detection accuracy. LSTM, a recurrent neural network renowned for its ability to capture temporal dependencies within sequences of transactions, is compared with XGBoost, a formidable ensemble learning algorithm that enhances feature-based classification. …”
Get full text
Article -
1714
Problems of Algorithms Development to Determine Quality of Topic Models Ensembles for Make Rubricators
Published 2018-09-01“…They can significantly improve the accuracy of modeling results. The main purpose of this research is to increase the clustering effectiveness of textual information by using the ensemble thematic models. …”
Get full text
Article -
1715
Control algorithm for an elastic-viscoplastic model to study processes of shock interaction of bodies
Published 2021-09-01“…The research objective is to develop a more accurate shock simulation algorithm through the controlled transformation of the mechanorheological shock process model from elasticviscous to elastic-viscoplastic.Materials and Methods. …”
Get full text
Article -
1716
A comparative study of the performance of ten metaheuristic algorithms for parameter estimation of solar photovoltaic models
Published 2025-01-01“…This study conducts a comparative analysis of the performance of ten novel and well-performing metaheuristic algorithms for parameter estimation of solar photovoltaic models. …”
Get full text
Article -
1717
A Model For Optimization of Knowledge Management Outsourcing Decision Using Genetic Algorithm
Published 2025-06-01“…Purpose: The purpose of this study is to develop an optimization model for knowledge management outsourcing using a genetic algorithm. …”
Get full text
Article -
1718
Research on obstacle avoidance for aerial work vehicle booms with light arrays based on an improved gradient projection method
Published 2025-04-01“…At the same time, the end position error reduction algorithm is added to reduce the end velocity and improve the trajectory tracking accuracy. …”
Get full text
Article -
1719
Learning‐based tracking control of AUV: Mixed policy improvement and game‐based disturbance rejection
Published 2025-04-01“…By combining prior dynamic knowledge and actual sampled data, the proposed approach effectively mitigates the defect caused by the inaccurate dynamic model and significantly improves the training speed of the ADP algorithm. …”
Get full text
Article -
1720
A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment
Published 2025-01-01“…Using a Long Short-Term Memory (LSTM) algorithm optimized by Super SAPSO (Simulated Annealing Particle Swarm Optimization), the model forecasts server failures with improved accuracy, reducing False Alarm Rates and improving Failure Detection Rates. …”
Get full text
Article