Suggested Topics within your search.
Suggested Topics within your search.
-
601
Machine learning for Parkinson’s disease: a comprehensive review of datasets, algorithms, and challenges
Published 2025-07-01“…Abstract Parkinson’s disease (PD) is a devastating neurological ailment affecting both mobility and cognitive function, posing considerable problems to the health of the elderly across the world. …”
Get full text
Article -
602
Hybrid genetic algorithm and deep learning techniques for advanced side-channel attacks
Published 2025-07-01“…These findings validate genetic algorithms as a robust alternative for optimizing side-channel attack models, offering both scalability and consistent performance across diverse attack scenarios while advancing the state of cryptographic security assessment.…”
Get full text
Article -
603
A Novel Fuzzy Kernel Extreme Learning Machine Algorithm in Classification Problems
Published 2025-04-01“…On the JAFFE dataset, the algorithm achieved an average classification accuracy of 94.55% when supported with local binary patterns and 94.27% with a histogram of oriented gradients. …”
Get full text
Article -
604
Cloud computing virtualization technology based on bandwidth resource-aware migration algorithm
Published 2025-07-01“…The algorithm monitors bandwidth usage in real-time, identifying potential bottlenecks and considering both resource utilization and bandwidth availability when determining whether to migrate virtual machines. …”
Get full text
Article -
605
Active collision avoidance method for automated vehicles based on fuzzy PID algorithm
Published 2025-07-01“…Compared to conventional PID controllers, the fuzzy PID algorithm enhances responsiveness and accuracy across various scenarios. …”
Get full text
Article -
606
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
607
Constraint Consensus Based Artificial Bee Colony Algorithm for Constrained Optimization Problems
Published 2019-01-01“…Experimental results demonstrate the promising performance of the proposed algorithm, in terms of both optimization quality and convergence speed.…”
Get full text
Article -
608
A Review on Path Planning and Obstacle Avoidance Algorithms for Autonomous Mobile Robots
Published 2022-01-01“…A mobile robot could autonomously navigate in any environment, both static and dynamic. As a result, researchers in the robotics field have offered a variety of techniques. …”
Get full text
Article -
609
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
610
Community detection algorithm of hybrid node analysis and edge analysis in complex networks
Published 2023-04-01“…The community detection of hybrid node analysis and edge analysis in complex networks (CDHNE), a novel community detection algorithm, was proposed aiming at the problem that both edge community detection and node-based community detection algorithms had corresponding shortcomings in the process of detecting communities, which affected the quality of complex network community detection.The relatively stable characteristics of the edge in the networks were firstly used by the algorithm to construct a more accurate community structure through edge community detection at the early stage of algorithm execution.Then, after the formation of the edge communities, the flexible characteristics of the node were used to accurately detect the boundary of edge communities, so as to more accurately detect the community structure in the complex networks.In the computer-generated network experiments, when the community structure of the network gradually became fuzzy, the number of overlapping nodes and the number of communities to which the overlapping nodes belonged kept increasing.Compared to traditional algorithms, the accuracy of community detection and overlapping nodes detection were improved by an average of 10% and 15%, respectively, by the CDHNE algorithm.In the real network experiments, the tightness of the community structure detected by the CDHNE algorithm was better.Especially when facing large-scale networks with more than 100 000 nodes, the detection task was completed by the CDHNE algorithm with high quality, and the EQ value reached 0.412 1.The experimental results show that the CDHNE algorithm has advantages in operational stability and handling large-scale networks.…”
Get full text
Article -
611
Research on Local Obstacle Avoidance Path Planning Algorithm for Autonomous Mining Trucks
Published 2024-12-01Get full text
Article -
612
Research on Adaptive Optics Image Restoration Algorithm by Improved Expectation Maximization Method
Published 2014-01-01“…Lastly, the image-restoration experiments on both analog images and the real AO are performed to verify the recovery effect of our algorithm. …”
Get full text
Article -
613
Automated identification of sedimentary structures in core images using object detection algorithms.
Published 2025-01-01Get full text
Article -
614
A novel pedestrian detection algorithm based on data fusion of face images
Published 2019-05-01“…The experimental result proves that our algorithm achieves better performance when compared with other state-of-the-art methodologies, both numerically and visually.…”
Get full text
Article -
615
Optimization of social security patrol strategy based on graph theory and GGC algorithm
Published 2025-07-01“…The policy set and payoff function are defined, and a generalized geometric coverage algorithm is designed to solve the policy set of both parties in the model, thereby obtaining the optimal patrol strategy for intelligent patrol agents. …”
Get full text
Article -
616
Accelerating Bayesian hierarchical clustering of time series data with a randomised algorithm.
Published 2013-01-01“…We define and analyse the randomised algorithm, before presenting results on both synthetic and real biological data sets. …”
Get full text
Article -
617
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Published 2025-04-01“…Special emphasis is placed on the performance of algorithms within both symmetric and asymmetric frameworks. …”
Get full text
Article -
618
Path Planning for Wall-Climbing Robots Using an Improved Sparrow Search Algorithm
Published 2024-09-01“…Second, improvements are made to the position updating formulas of both discoverers and followers. Finally, the differential evolution algorithm is introduced to enhance the global search capability of the algorithm, thereby reducing the robot’s energy consumption. …”
Get full text
Article -
619
A Node Influence Based Label Propagation Algorithm for Community Detection in Networks
Published 2014-01-01“…The experimental results on both synthetic and real networks demonstrate that NIBLPA maintains the efficiency of the traditional LPA algorithm, and, at the same time, it has a superior performance to some representative methods.…”
Get full text
Article -
620
Integrating evolutionary algorithms and enhanced-YOLOv8 + for comprehensive apple ripeness prediction
Published 2025-03-01“…This paper proposes an approach for assessing apple ripeness from both structured and unstructured observation data, i.e., text and images. …”
Get full text
Article