Showing 941 - 960 results of 1,087 for search 'field construction algorithm', query time: 0.12s Refine Results
  1. 941

    Methods to Quantitatively Evaluate the Effect of Shale Gas Fracturing Stimulation Based on Least Squares by DENG Cai, SUN Kexin, WEN Huan, HU Chaolang

    Published 2025-07-01
    “…Advanced optimization algorithms were employed to efficiently address both the fitting and calculation tasks. …”
    Get full text
    Article
  2. 942

    A Fast Proximal Alternating Method for Robust Matrix Factorization of Matrix Recovery with Outliers by Ting Tao, Lianghai Xiao, Jiayuan Zhong

    Published 2025-04-01
    “…This paper concerns a class of robust factorization models of low-rank matrix recovery, which have been widely applied in various fields such as machine learning and imaging sciences. …”
    Get full text
    Article
  3. 943

    Method of anti-confusion texture feature descriptor for malware images by Yashu LIU, Zhihai WANG, Hanbing YAN, Yueran HOU, Yukun LAI

    Published 2018-11-01
    “…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
    Get full text
    Article
  4. 944
  5. 945

    Diurnal Variations of Infrared Land Surface Emissivity in the Taklimakan Desert: An Observational Analysis by Yufen Ma, Kang Zeng, Ailiyaer Aihaiti, Junjian Liu, Zonghui Liu, Ali Mamtimin

    Published 2025-04-01
    “…This study’s high-temporal-resolution FTIR field observations systematically reveal the diurnal dynamics of infrared surface emissivity in the desert for the first time, challenging existing satellite-based inversion products and highlighting the limitations of traditional temperature–emissivity separation algorithms in arid regions. …”
    Get full text
    Article
  6. 946

    Evaluation of Machine Learning Models for Estimating Grassland Pasture Yield Using Landsat-8 Imagery by Linming Huang, Fen Zhao, Guozheng Hu, Hasbagan Ganjurjav, Rihan Wu, Qingzhu Gao

    Published 2024-12-01
    “…Utilizing Landsat-8 data, band reflectances, vegetation indexes (VIs), and soil water index (SWI) were extracted from 1000 field samples across Xilingol. These data, combined with field-measured pasture yields, were employed to construct models using four machine learning algorithms: elastic net regression (Enet), Random Forest (RF), Extreme Gradient Boosting (XGBoost), and Support Vector Machine (SVM). …”
    Get full text
    Article
  7. 947

    Horizontal Control System for Maglev Ruler Based on Improved Active Disturbance Rejection Controller by Gengyun Tian, Chunlin Tian, Jiyuan Sun, Shusen Diao

    Published 2025-04-01
    “…This research paves the way for the practical application of the maglev ruler system in fields such as coordinate survey.…”
    Get full text
    Article
  8. 948

    Multi-View Robust Tensor-Based Subspace Clustering by Esraa M. Al-Sharoa, Mohammad A. Al-Wardat

    Published 2022-01-01
    “…In this paper, a new robust clustering algorithm is proposed to detect the community structure in multi-view networks. …”
    Get full text
    Article
  9. 949

    Ecological Identity and Social Representation of Green MSMEs: Ergo-Iconic Value, Performativity, and Representational Resistance in the Platform Economy by Andriyansah Andriyansah

    Published 2025-05-01
    “…They reflect a complex interplay between local values, global consumer expectations, and the algorithmic logic embedded within digital platforms. …”
    Get full text
    Article
  10. 950

    An Axial Compression Transformer for Efficient Human Pose Estimation by Wen Tan, Haixiang Zhang, Xinyi Song

    Published 2025-04-01
    “…An axial compression pose transformer (ACPose) method is proposed to reduce part of the computational cost of Transformer by the axial compression of the input matrix, while maintaining the global receptive field by feature fusion. A Local Enhancement Module is constructed to avoid the loss of too much feature information in the compression process. …”
    Get full text
    Article
  11. 951

    Cryptanalysis of hyperchaotic S-box generation and image encryption by Mohammad Mazyad Hazzazi, Gulraiz, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai

    Published 2024-12-01
    “…This article aims to improve cryptographic security through unique S-box construction methodologies. The proposed S-boxes improve the security features by employing chaotic maps and Galois fields, which go beyond traditional design approaches. …”
    Get full text
    Article
  12. 952

    Artificial molecular communication network based on DNA nanostructures recognition by Junke Wang, Mo Xie, Lilin Ouyang, Jinggang Li, Lianhui Wang, Chunhai Fan, Jie Chao

    Published 2025-01-01
    “…By the establishment of a node partition algorithm for path traversal based on DR-AMCN, the computational complexity of the seven-node Hamiltonian path problem is reduced with the final solution directly obtained through the rate-zonal centrifugation method, and scalability of this approach is also demonstrated. …”
    Get full text
    Article
  13. 953

    Artificial intelligence and anti-cancer drugs' response by Xinrui Long, Kai Sun, Sicen Lai, Yuancheng Liu, Juan Su, Wangqing Chen, Ruhan Liu, Xiaoyu He, Shuang Zhao, Kai Huang

    Published 2025-07-01
    “…It provides a detailed exposition of the processes involved in data processing and model construction, examines the current challenges faced in this field and future development directions, with the aim of better advancing the progress of precision medicine.…”
    Get full text
    Article
  14. 954

    Machine Learning in Maritime Safety for Autonomous Shipping: A Bibliometric Review and Future Trends by Jie Xue, Peijie Yang, Qianbing Li, Yuanming Song, P. H. A. J. M. van Gelder, Eleonora Papadimitriou, Hao Hu

    Published 2025-04-01
    “…However, there has been no review grounded in bibliometric analysis in this field. To explore the research evolution and knowledge frontier in the field of maritime safety for autonomous shipping, a bibliometric analysis was conducted using 719 publications from the Web of Science database, covering the period from 2000 up to May 2024. …”
    Get full text
    Article
  15. 955

    A Self-Supervised Adversarial Deblurring Face Recognition Network for Edge Devices by Hanwen Zhang, Myun Kim, Baitong Li, Yanping Lu

    Published 2025-07-01
    “…With the advancement of information technology, human activity recognition (HAR) has been widely applied in fields such as intelligent surveillance, health monitoring, and human–computer interaction. …”
    Get full text
    Article
  16. 956

    Distribution Ratio Prediction of Major Components in 30%TBP/kerosene-HNO3 System Based on Machine Learning by YU Ting1, ZHANG Yinyin2, ZHANG Ruizhi3, JIN Wenlei2, LUO Yingting2, ZHU Shengfeng3, HE Hui1, YE Guoan1, GONG Helin4

    Published 2025-06-01
    “…Spent fuel reprocessing is an important nuclear energy process which aimed at recovering resources and managing radioactive materials to control potential hazards. In this field, Purex technology is widely used for its high efficiency, scalability, and wide applicability. …”
    Article
  17. 957

    Economic burden of the novel coronavirus infection: a systematic review by V. M. Timiryanova, I. A. Lakman, N. Sh. Zagidullin, D. F. Gareeva

    Published 2022-10-01
    “…Predominantly, the estimates involve the calculation of quality-adjusted life years lost (QALY) (66.3%), 37.6% of the studies are based on the results of constructing scenario models, 28.8% consume algorithms of epidemiological SIR (susceptible, infected, or recovered) models, and 66.3% provide for cost assessment. …”
    Get full text
    Article
  18. 958

    Interactive map «Patient Enquiry» as a teaching method for medical students by I. A. Koroleva, N. V. Efremova, N. I. Slashcheva, L. A. Fedotova

    Published 2023-09-01
    “…Medical students must structure, present and remember the algorithm for questioning the patient. The creation of such texts provides favorable conditions for the implementation of the principles of visibility and communication. …”
    Get full text
    Article
  19. 959

    Parallelizing Quantum Simulation With Decision Diagrams by Shaowen Li, Yusuke Kimura, Hiroyuki Sato, Masahiro Fujita

    Published 2024-01-01
    “…Qubits are mathematically constructed in the Hilbert space whose size grows exponentially. …”
    Get full text
    Article
  20. 960

    Reversible data hiding scheme based on enhanced image smoothness by Jinghan WANG, Hui ZHU, Helin LI, Hui LI, Xiaopeng YANG

    Published 2022-06-01
    “…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
    Get full text
    Article