-
161
Influence maximization algorithm based on social network
Published 2022-08-01“…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
Get full text
Article -
162
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01“…Moreover the mechanism of JND(just-noticeable distortion) was used to adjust the embedding strength of proposed algorithm. These components may be then used as building blocks to construct a self-adaptive content dependent spread spectrum watermark solution. …”
Get full text
Article -
163
Exploring ischemic stroke based on the ferroptosis perspective: ECH1 may serve as a new biomarker and therapeutic target
Published 2025-08-01“…Using differential expression analysis and machine learning algorithms, 12 potential hub genes were successfully screened. …”
Get full text
Article -
164
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01“…Moreover the mechanism of JND(just-noticeable distortion) was used to adjust the embedding strength of proposed algorithm. These components may be then used as building blocks to construct a self-adaptive content dependent spread spectrum watermark solution. …”
Get full text
Article -
165
On routing algorithms in the internet of vehicles: a survey
Published 2023-12-01“…Our study comprehensively reviews diverse routing algorithms and their associated assessment methodologies. …”
Get full text
Article -
166
Exact Algorithms for the Satellite Image Selection Problem
Published 2025-06-01“…These algorithms show quality and efficiency compared with existing approaches and are expected to benefit various industrial applications.…”
Get full text
Article -
167
A Calibration Algorithm for Microelectromechanical Inertial Sensors
Published 2022-09-01“…Systematic errors of microelectromechanical (MEMS) inertial sensors, such as those related to zero drift, scale factor, and nonorthogonality of sensitive axes, are the main sources of errors in strapdown inertial navigation systems (SINS). …”
Get full text
Article -
168
Utilization in Microgrids through Advanced Predictive Algorithms
Published 2025-01-01Get full text
Article -
169
Pharmacotherapy algorithm for post-traumatic stress disorder
Published 2023-10-01“…Improvement of existing and development of new pharmacotherapy algorithms is an important component of care provided to patients with PTSD. …”
Get full text
Article -
170
A New MDL-based Clustering Algorithm
Published 2025-05-01“…The Minimum Description Length (MDL) principle is commonly used to evaluate machine learning models. In clustering, it may be used to assess the overall quality of data clustering or in the implementation of clustering algorithms for guiding the search for possible clusterings. …”
Get full text
Article -
171
Stable and efficient differentiation of tensor network algorithms
Published 2025-03-01Get full text
Article -
172
Classical and Quantum Algorithms for Characters of the Symmetric Group
Published 2025-08-01“…Here we describe a matrix product state (MPS) algorithm for characters of S_{n}. The algorithm computes an MPS encoding all irreducible characters of a given permutation. …”
Get full text
Article -
173
Personalized-Template-Guided Intelligent Evolutionary Algorithm
Published 2025-08-01“…Existing heuristic algorithms are based on inspiration sources and have not yet done a good job of basing themselves on optimization principles to minimize and utilize historical information, which may lead to low efficiency, accuracy, and stability of the algorithm. …”
Get full text
Article -
174
Improving Quantum Optimization Algorithms by Constraint Relaxation
Published 2024-09-01“…Current quantum optimization algorithms, most of which are hybrid variational-Hamiltonian-based algorithms, struggle to present quantum devices due to noise and decoherence. …”
Get full text
Article -
175
Elite leader dwarf mongoose optimization algorithm
Published 2025-07-01“…Abstract Dwarf mongoose optimization algorithm (DMOA) is a recently proposed meta-heuristics, it attracts widely attention due to its effectiveness in solving complex optimization. …”
Get full text
Article -
176
Review on algorithms of dealing with depressions in grid DEM
Published 2019-04-01“…Lastly, we discuss a possible design for an optimal depression-processing algorithm which may be developed in the future.…”
Get full text
Article -
177
Algorithms for Making Managerial Decisions in the Digital Economy
Published 2022-04-01“…Such decisions could become an algorithm for artificial intelligence of digital technologies, which determines the relevance of the study. …”
Get full text
Article -
178
EVALUATION OF ITERATIVE ALGORITHMS FOR TOMOGRAPHY IMAGE RECONSTRUCTION
Published 2019-02-01“…Thus, the algorithm to reconstruct the images has to meet these requirements. …”
Get full text
Article -
179
Big data technology for teaching quality monitoring and improvement in higher education - joint K-means clustering algorithm and Apriori algorithm
Published 2024-12-01“…In order to cope with these challenges, the study proposes a research method of big data technology based on joint K-mean clustering algorithm and association rule mining algorithm. The study first analyzes the teaching quality monitoring and evaluation indexes using the K-mean algorithm. …”
Get full text
Article -
180
Differential Protection of Main Transformer of Doubly-Fed Wind Farm Based on Current Synthesized Vector Trajectory Characteristics
Published 2025-02-01“…During the fault ride-through process of the doubly-fed wind farms, the short-circuit current provided by the wind farm side exhibits frequency deviation, which leads to errors in the Fourier algorithm based phasor extraction. Additionally, the second harmonic restraint element may act incorrectly, leading to longterm blockage of the differential protection. …”
Get full text
Article