-
321
Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System
Published 2025-05-01“…In this work, an encryption algorithm for multiple images is introduced. In the first step of the proposed algorithm, a key generation algorithm based on a chaotic system and wavelet transform is introduced, and in the next step, the encryption algorithm is developed by introducing rearrange and shift functions based on a chaotic system. …”
Get full text
Article -
322
High resolution remote sensing image object detection algorithm based on improved YOLOv8
Published 2025-01-01“…Firstly, dynamic snake convolution was incorporated to make the algorithm detect objects with different scales and directions better; Secondly, in order to enable the algorithm to capture the global context information in the image with complex background, inverted residual mobile block was combined with Shift-Wise convolution . …”
Get full text
Article -
323
Predictive modeling of adolescent suicidal behavior using machine learning: Key features and algorithmic insights
Published 2025-12-01“…Among these, Random Forest and SVM emerged as the most commonly used algorithms, featured in 35 % and 27 % of studies respectively. …”
Get full text
Article -
324
Curation, Algorithmic 'Caregiving' and Collective Archival Practices. Rethinking the Archival Work of Culture in Streaming Media
Published 2024-12-01“…This paper is structured around the central themes of archive, network, and algorithmic personalisation, moving from the historical context of digital media and the metaphors of the archive, to the specific case of streaming television. …”
Get full text
Article -
325
Personalization of Content in Video-on-Demand Services: Insights from Satisfaction over Social Media Algorithms
Published 2024-12-01“…The rapid evolution of algorithmic personalization has reshaped user experiences on social media and video-on-demand (VOD) platforms, tailoring content recommendations to individual preferences. …”
Get full text
Article -
326
The Deep Deterministic Policy Gradient Algorithm Based on RIS Technology in a Coal Mine Tunnel
Published 2024-12-01“…This paper proposes a channel propagation optimization scheme for coal mine RIS communication systems, using the Deep Deterministic Policy Gradient (DDPG) algorithm. By jointly optimizing base station power allocation and RIS phase shift, this paper comparatively analyzes RIS reflection performance under ideal and non-ideal conditions, focusing on its impact on system propagation rates. …”
Get full text
Article -
327
A Fast and Low-Impact Embedded Orientation Correction Algorithm for Hand Gesture Recognition Armbands
Published 2025-03-01“…These results highlight the algorithm’s efficacy, general applicability, and efficiency, presenting it as a promising solution to the electrode-shift issue in sEMG-based HMI applications.…”
Get full text
Article -
328
State-of-the-Art Review: Models and Algorithms for Optimal Power System Design, Stabilization, and Reliability Enhancement
Published 2024-01-01“…The trends analysis further shows a notable shift towards learning algorithms, indicating an increasing interest in data-driven approaches to improve system performance. …”
Get full text
Article -
329
Resource allocation strategies and task scheduling algorithms for cloud computing: A systematic literature review
Published 2025-05-01“…While this technological shift offers unparalleled flexibility, it also brings considerable challenges, especially in scheduling and resource allocation, particularly when optimizing multiple objectives in a dynamic environment. …”
Get full text
Article -
330
-
331
Explicit collocation algorithm for the nonlinear fractional Duffing equation via third-kind Chebyshev polynomials
Published 2025-06-01“…The algorithm is based on using shifted Chebyshev polynomials of the third-kind as basis functions and the spectral collocation method as a solver. …”
Get full text
Article -
332
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
Published 2023-08-01“…It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. …”
Get full text
Article -
333
MetaboLINK is a novel algorithm for unveiling cell-specific metabolic pathways in longitudinal datasets
Published 2025-01-01“…For the first time, we applied the PCA-GLASSO algorithm (i.e., MetaboLINK) to metabolomics data derived from Nuclear Magnetic Resonance (NMR) spectroscopy performed on neural cells at various developmental stages, from human embryonic stem cells to neurons.ResultsThe MetaboLINK analysis of longitudinal metabolomics data has revealed distinct pathways related to amino acids, lipids, and energy metabolism, uniquely associated with specific cell progenies. …”
Get full text
Article -
334
Beyond accuracy: a framework for evaluating algorithmic bias and performance, applied to automated sleep scoring
Published 2025-07-01“…Applying it to the widely recognized U-Sleep and YASA sleep-scoring algorithms, we identify biases—such as age-related shifts—indicating missing input information or imbalances in training data. …”
Get full text
Article -
335
An Open-Source Algorithm for Correcting Stress Wave Dispersion in Split-Hopkinson Pressure Bar Experiments
Published 2025-01-01“…To do this, an innovative computational algorithm, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="monospace">SHPB</mi><mtext>_</mtext><mi mathvariant="monospace">Processing</mi><mo>.…”
Get full text
Article -
336
Multiscale Modeling and Reconstruction of Joint Motion: Finite Element Optimization Based on Particle Swarm Algorithm
Published 2025-01-01“…The optimization process facilitated by the particle swarm algorithm revealed that most particles achieved high fitness levels after the initial iteration, and a considerable proportion shifted to the foreground region during the second iteration once fitness values dropped below 0.2. …”
Get full text
Article -
337
A Novel Geometric-Descriptor Based Algorithm for Individual-Level Crop Monitoring using UAVs
Published 2025-07-01“…Traditional feature-matching algorithms fail here due to the significant visual changes caused by crop growth, weather, and farm activities. …”
Get full text
Article -
338
Improved SURF−FLANN feature extraction and matching algorithm for video stitching of fully-mechanized working face
Published 2025-06-01“…Comparison experiments of feature point extraction and matching are carried out by the proposed method with SIFT+FLANN, Hairrs and SURF+FLANN feature extraction and matching algorithms, and the results indicate that the proposed method has the highest feature extraction and matching accuracy and matching speed, with the accuracy and matching speed reaching 81.47% and 51.47fps.Video image stitching comparison experiments are carried out by the proposed method with SIFT+FLANN, Hairrs and SURF+FLANN feature extraction and matching algorithms, the results indicate the proposed method has the best stitching performance in terms of clarity, contrast, entropy, and stitching speed.The best results are obtained.…”
Get full text
Article -
339
Spatio-Temporal Habitat Dynamics of Migratory Small Yellow Croaker (<i>Larimichthys polyactis</i>) in Hangzhou Bay, China
Published 2025-06-01“…We evaluated the performance of eleven modeling algorithms to identify the most accurate model for predicting small yellow croaker distributions. …”
Get full text
Article -
340
Multiscale Structural Information-Based Laplacian Generative Adversarial Network Representation Learning
Published 2025-01-01“…This algorithm consists of two components: 1) multiscale structural information preserving component, where a shift positive pointwise mutual information matrix (SPPMI) is calculated for storing multiscale structural information; 2) Laplacian generative adversarial learning component, where the ideas of Laplacian pyramid and generative adversarial networks are leveraged to generate robust and meaningful representations. …”
Get full text
Article