-
941
Methods to Quantitatively Evaluate the Effect of Shale Gas Fracturing Stimulation Based on Least Squares
Published 2025-07-01“…Advanced optimization algorithms were employed to efficiently address both the fitting and calculation tasks. …”
Get full text
Article -
942
A Fast Proximal Alternating Method for Robust Matrix Factorization of Matrix Recovery with Outliers
Published 2025-04-01“…This paper concerns a class of robust factorization models of low-rank matrix recovery, which have been widely applied in various fields such as machine learning and imaging sciences. …”
Get full text
Article -
943
Method of anti-confusion texture feature descriptor for malware images
Published 2018-11-01“…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
Get full text
Article -
944
-
945
Diurnal Variations of Infrared Land Surface Emissivity in the Taklimakan Desert: An Observational Analysis
Published 2025-04-01“…This study’s high-temporal-resolution FTIR field observations systematically reveal the diurnal dynamics of infrared surface emissivity in the desert for the first time, challenging existing satellite-based inversion products and highlighting the limitations of traditional temperature–emissivity separation algorithms in arid regions. …”
Get full text
Article -
946
Evaluation of Machine Learning Models for Estimating Grassland Pasture Yield Using Landsat-8 Imagery
Published 2024-12-01“…Utilizing Landsat-8 data, band reflectances, vegetation indexes (VIs), and soil water index (SWI) were extracted from 1000 field samples across Xilingol. These data, combined with field-measured pasture yields, were employed to construct models using four machine learning algorithms: elastic net regression (Enet), Random Forest (RF), Extreme Gradient Boosting (XGBoost), and Support Vector Machine (SVM). …”
Get full text
Article -
947
Horizontal Control System for Maglev Ruler Based on Improved Active Disturbance Rejection Controller
Published 2025-04-01“…This research paves the way for the practical application of the maglev ruler system in fields such as coordinate survey.…”
Get full text
Article -
948
Multi-View Robust Tensor-Based Subspace Clustering
Published 2022-01-01“…In this paper, a new robust clustering algorithm is proposed to detect the community structure in multi-view networks. …”
Get full text
Article -
949
Ecological Identity and Social Representation of Green MSMEs: Ergo-Iconic Value, Performativity, and Representational Resistance in the Platform Economy
Published 2025-05-01“…They reflect a complex interplay between local values, global consumer expectations, and the algorithmic logic embedded within digital platforms. …”
Get full text
Article -
950
An Axial Compression Transformer for Efficient Human Pose Estimation
Published 2025-04-01“…An axial compression pose transformer (ACPose) method is proposed to reduce part of the computational cost of Transformer by the axial compression of the input matrix, while maintaining the global receptive field by feature fusion. A Local Enhancement Module is constructed to avoid the loss of too much feature information in the compression process. …”
Get full text
Article -
951
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…This article aims to improve cryptographic security through unique S-box construction methodologies. The proposed S-boxes improve the security features by employing chaotic maps and Galois fields, which go beyond traditional design approaches. …”
Get full text
Article -
952
Artificial molecular communication network based on DNA nanostructures recognition
Published 2025-01-01“…By the establishment of a node partition algorithm for path traversal based on DR-AMCN, the computational complexity of the seven-node Hamiltonian path problem is reduced with the final solution directly obtained through the rate-zonal centrifugation method, and scalability of this approach is also demonstrated. …”
Get full text
Article -
953
Artificial intelligence and anti-cancer drugs' response
Published 2025-07-01“…It provides a detailed exposition of the processes involved in data processing and model construction, examines the current challenges faced in this field and future development directions, with the aim of better advancing the progress of precision medicine.…”
Get full text
Article -
954
Machine Learning in Maritime Safety for Autonomous Shipping: A Bibliometric Review and Future Trends
Published 2025-04-01“…However, there has been no review grounded in bibliometric analysis in this field. To explore the research evolution and knowledge frontier in the field of maritime safety for autonomous shipping, a bibliometric analysis was conducted using 719 publications from the Web of Science database, covering the period from 2000 up to May 2024. …”
Get full text
Article -
955
A Self-Supervised Adversarial Deblurring Face Recognition Network for Edge Devices
Published 2025-07-01“…With the advancement of information technology, human activity recognition (HAR) has been widely applied in fields such as intelligent surveillance, health monitoring, and human–computer interaction. …”
Get full text
Article -
956
Distribution Ratio Prediction of Major Components in 30%TBP/kerosene-HNO3 System Based on Machine Learning
Published 2025-06-01“…Spent fuel reprocessing is an important nuclear energy process which aimed at recovering resources and managing radioactive materials to control potential hazards. In this field, Purex technology is widely used for its high efficiency, scalability, and wide applicability. …”
Article -
957
Economic burden of the novel coronavirus infection: a systematic review
Published 2022-10-01“…Predominantly, the estimates involve the calculation of quality-adjusted life years lost (QALY) (66.3%), 37.6% of the studies are based on the results of constructing scenario models, 28.8% consume algorithms of epidemiological SIR (susceptible, infected, or recovered) models, and 66.3% provide for cost assessment. …”
Get full text
Article -
958
Interactive map «Patient Enquiry» as a teaching method for medical students
Published 2023-09-01“…Medical students must structure, present and remember the algorithm for questioning the patient. The creation of such texts provides favorable conditions for the implementation of the principles of visibility and communication. …”
Get full text
Article -
959
Parallelizing Quantum Simulation With Decision Diagrams
Published 2024-01-01“…Qubits are mathematically constructed in the Hilbert space whose size grows exponentially. …”
Get full text
Article -
960
Reversible data hiding scheme based on enhanced image smoothness
Published 2022-06-01“…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
Get full text
Article