Search alternatives:
sift » shift (Expand Search)
Showing 761 - 780 results of 1,156 for search '(sift OR soft) algorithm', query time: 0.09s Refine Results
  1. 761

    Distributed variational sparse Bayesian compressed sensing based on factor graphs by Cui-tao ZHU, Fan YANG, Han-xin WANG, Zhong-jie LI

    Published 2014-01-01
    “…A distributed variational sparse Bayesian compressed spectrum sensing algorithm based on factor graph was proposed,which decomposed the global spectrum sensing problem into local problem based on factor and variation.Belief propagation was used for the statistical inference of the spectrum occupancy,to implement the “soft fusion”.The temporal and spatial correlation information providing two-dimensional redundancies was exchanged among cooperative cognitive users to improve the detection performance under low SNR.Meanwhile,the algorithm prunes the divergence of hyper-parameters and the corresponding basis functions for reducing the load of communication.The simulation results show that this method can effectively achieve performance of spectrum sensing under a low sampling rate and the low SNR.…”
    Get full text
    Article
  2. 762

    Virtual Surgical Training Methods for Spinal Surgery by Huang Guoyao

    Published 2025-01-01
    “…The main contributions include extracting key operative steps from real surgery videos to design a complete training process, reconstructing 3D human tissue models from medical imaging data using voxel segmentation and the Marching Cubes algorithm, developing a real-time interactive soft tissue deformation model with the XPBD algorithm ,incorporating AABB and spatial hashing for collision detection and GPU acceleration, and designing system modules to simulate procedures such as bone grinding, ligament exposure, and disc clamping.…”
    Get full text
    Article
  3. 763

    On Feasibility and Asymptotically Stability of Switched Systems Using Adaptive Multi-Model Predictive Control by Mohammad Fathi, Hossein Bolandi, Bahman Ghobrani Vaghei, Saeed Ebadollahi

    Published 2025-06-01
    “…The proposed control structure uses a supervisor algorithm along with a soft-switching technique. The supervisor algorithm is responsible for determining the suitable local model/controller pair, determining the operational mode of the control system, managing the soft switching, and specifying the control objectives in accordance with the defined set point. …”
    Get full text
    Article
  4. 764

    Machine Learning-Assisted Mitigation of Optical Multipath Interference in PAM4 IM-DD Transmission Systems by Wenxin Cui, Jiahao Huo, Jin Zhu, Jianlong Tao, Peng Qin, Xiaoying Zhang, Haolin Bai

    Published 2025-03-01
    “…In this scheme, KNN-aided SVM serves as a soft decision algorithm that adapts the decision threshold to signal amplitude fluctuations, improving the decision accuracy for MPI-affected PAM4 signals. …”
    Get full text
    Article
  5. 765
  6. 766

    A non‐convex ternary variational decomposition and its application for image denoising by Liming Tang, Liang Wu, Zhuang Fang, Chunyan Li

    Published 2022-05-01
    “…An alternating direction iteration algorithm combining with iteratively reweighted l1 algorithm, projection algorithm and wavelet soft threshold algorithm is introduced to effectively solve the proposed model. …”
    Get full text
    Article
  7. 767

    DAB unified ZVS control strategy with optimal current stress in full power range under TPS control by Shuai Cheng, Fusheng Wang, Zongfeng Han, Chuanqi Zhang

    Published 2024-11-01
    “…Based on three‐phase shift control, Karush–Kuhn–Tucker (KKT) algorithm is used to solve the optimal control strategy of current stress under soft switching conditions, and the interval construction method that KKT cannot solve is given. …”
    Get full text
    Article
  8. 768

    A novel transition protocol to post-quantum cryptocurrency blockchains by Sultan Almuhammadi, Sarah Alghamdi

    Published 2025-05-01
    “…The proposed algorithm requires a soft fork of the original blockchain, which makes it more desirable than other hard-fork solutions. …”
    Get full text
    Article
  9. 769

    An Automated Feature-Based Image Registration Strategy for Tool Condition Monitoring in CNC Machine Applications by Eden Lazar, Kristin S. Bennett, Andres Hurtado Carreon, Stephen C. Veldhuis

    Published 2024-11-01
    “…A comparison of feature detector-descriptor algorithms found SIFT, KAZE, and ORB to be the most suitable for MV-TCM registration, with KAZE presenting the highest accuracy and ORB being the most computationally efficient. …”
    Get full text
    Article
  10. 770
  11. 771

    Method of anti-confusion texture feature descriptor for malware images by Yashu LIU, Zhihai WANG, Hanbing YAN, Yueran HOU, Yukun LAI

    Published 2018-11-01
    “…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
    Get full text
    Article
  12. 772

    AI-BASED RESUME SKILLS EXTRACTOR AND RECOMMENDER MODULES FOR STATE UNIVERSITY HUMAN RESOURCE ANALYTICS SYSTEM by Paul Nigel S. Abalos, Thelma D. Palaoag

    Published 2024-12-01
    “…The researchers explored and compared Apriori data mining association rule algorithm and content-based filtering (CBF) approach to match extracted words and phrases from a resumé to skills banks and job posts and generate list of soft and hard skills using support, confidence, and lift metrics for the Apriori algorithm and cosine similarity score for the CBF algorithm, and from there generate job or applicant recommendations. …”
    Get full text
    Article
  13. 773

    Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs by Adel Issa

    Published 2011-07-01
    “…The purpose of this paper is to use ID3 algorithm for IDS and extend it to deal not only with discreet values, but also with continuous ones, by using K_mean algorithm to partition each continuous attribute values to three clusters. …”
    Get full text
    Article
  14. 774

    MANAGEMENT AND VALORIZATION OF AGRICULTURAL WASTES FROM WINE PRODUCTION USING STATISTICAL ANALYSIS TO OBTAIN NOVEL FOOD by Gjore NAKOV, Zlatin ZLATEV, Iliana LAZOVA-BORISOVA, Jasmina LUKINAC

    Published 2021-01-01
    “…An analysis of the residuals is made, which are determined by the difference between the values of the model and the actually measured ones. Stat Soft Statistica 12 (Stat Soft Inc.) software was used to create these models. …”
    Get full text
    Article
  15. 775
  16. 776

    Research on Path Optimization of Vehicle-Drone Joint Distribution considering Customer Priority by Xiaoye Zhou, Yuhao Feng

    Published 2024-01-01
    “…Compared with the three algorithms and error analysis, the effectiveness of the model and the two-stage algorithm was verified. …”
    Get full text
    Article
  17. 777

    Large-scale post-disaster user distributed coverage optimization based on multi-agent reinforcement learning by Wenjun XU, Silei WU, Fengyu WANG, Lan LIN, Guojun LI, Zhi ZHANG

    Published 2022-08-01
    “…In order to quickly restore emergency communication services for large-scale post-disaster users, a distributed intellicise coverage optimization architecture based on multi-agent reinforcement learning (RL) was proposed, which could address the significant differences and dynamics of communication services caused by a large number of access users, and the difficulty of expansion caused by centralized algorithms.Specifically, a distributed k-sums clustering algorithm considering service differences of users was designed in the network characterization layer, which could make each unmanned aerial vehicle base station (UAV-BS) adjust the local networking natively and simply, and obtain states of cluster center for multi-agent RL.In the trajectory control layer, multi-agent soft actor critic (MASAC) with distributed-training-distributed-execution structure was designed for UAV-BS to control trajectory as intelligent nodes.Furthermore, ensemble learning and curriculum learning were integrated to improve the stability and convergence speed of training process.The simulation results show that the proposed distributed k-sums algorithm is superior to the k-means in terms of average load efficiency and clustering balance, and MASAC based trajectory control algorithm can effectively reduce communication interruptions and improve the spectrum efficiency, which outperforms the existing RL algorithms.…”
    Get full text
    Article
  18. 778

    Predicting future morphological changes of lesions from radiotracer uptake in 18F-FDG-PET images. by Ulas Bagci, Jianhua Yao, Kirsten Miller-Jaster, Xinjian Chen, Daniel J Mollura

    Published 2013-01-01
    “…Evaluation of segmentation results indicates that our proposed segmentation algorithm has a mean dice similarity coefficient of 85.75 ± 1.75%. …”
    Get full text
    Article
  19. 779

    CSDK: A Chi-square distribution-Kernel method for image de-noising under the Internet of things big data environment by Lin Teng, Hang Li

    Published 2019-05-01
    “…It also shows a consistent accuracy, edge preservation, and detailed retention improvement compared to the classic de-noising algorithms.…”
    Get full text
    Article
  20. 780

    Research on axial compensation precision puncture control method of prostate puncture robot by Li Bing, Zhu Junwu, Yuan Lipeng

    Published 2025-03-01
    “…Then, an improved adaptive particle swarm optimization (PSO) algorithm based on Levy Flight is proposed to identify parameters of this control model for puncture prostate in this article. …”
    Get full text
    Article