-
301
A Closer Look at Invalid Action Masking in Policy Gradient Algorithms
Published 2022-05-01“…In recent years, Deep Reinforcement Learning (DRL) algorithms have achieved state-of-the-art performance in many challenging strategy games. …”
Get full text
Article -
302
Designing of 2-DOF PID control algorithm for magnetic levitation systems
Published 2018-02-01Get full text
Article -
303
Application of computer vision algorithm in ceramic surface texture analysis and prediction
Published 2025-03-01“…In order to improve the surface quality of ceramic products, this paper proposes a ceramic surface texture recognition analysis and texture generation prediction method based on computer vision algorithm. In this method, laser lines are used to scan along the radial direction of ceramic, and the position of laser stripe is located by straight line detection algorithm. …”
Get full text
Article -
304
A Simple and Efficient Local Search Algorithm for the Machine Reassignment Problem
Published 2025-07-01“…In this work, we propose an efficient collaborative local search algorithm to solve the Machine Reassignment Problem. …”
Get full text
Article -
305
Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks
Published 2014-07-01“…In particular, various algorithms motivated from numerical optimization theory have been applied for accelerating neural network training. …”
Get full text
Article -
306
Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing
Published 2025-08-01Get full text
Article -
307
Identification for Active Vibration Control of Flexible Structure Based on Prony Algorithm
Published 2016-01-01“…Flexible structures have been widely used in many fields due to the advantages of light quality, small damping, and strong flexibility. …”
Get full text
Article -
308
-
309
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
310
Vessel Trajectory Data Compression Algorithm considering Critical Region Identification
Published 2023-01-01“…Additionally, the algorithm utilizes a sliding window approach to process the initial trajectory to improve the quality of the compressed vessel trajectories and retain as many spatiotemporal characteristics of the original trajectories as possible. …”
Get full text
Article -
311
Ship’s Trajectory Planning Based on Improved Multiobjective Algorithm for Collision Avoidance
Published 2019-01-01“…With vigorous development of the maritime trade, many intelligent algorithms have been proposed to avoid collisions due to resulting casualties and increased costs. …”
Get full text
Article -
312
Application of Genetic Algorithms for Finding Edit Distance between Process Models
Published 2018-12-01“…Finding graph-edit distance (graph similarity) is an important task in many computer science areas, such as image analysis, machine learning, chemicalinformatics. …”
Get full text
Article -
313
Engineering and Optimization of Quasi-Nondiffracting Helicon-Like Beams With an Evolutionary Algorithm
Published 2017-01-01“…However, the nonlocalized intensity distribution of nondiffracting beams is restrictive for many practical applications. Thus, strategies to optimize the beam profiles remain much in demand. …”
Get full text
Article -
314
Efficient Machine Learning Algorithms in Hybrid Filtering Based Recommendation System
Published 2023-08-01Get full text
Article -
315
Metaheuristics in Logistics: Increasing the Efficiency of Algorithms by Defining Appropriate Parameter Settings
Published 2024-12-01“…In many cases, when applying a metaheuristic, it works properly with the variables of a given task and there is no specific interval where a given algorithm can still be effective. …”
Get full text
Article -
316
Analysing Threshold Value in Fire Detection Algorithm Using MODIS Data
Published 2012-08-01“…The basic understanding of remote sensing fire detection should be kept in mind to be able to improve the algorithm for regional scale detection purposes. It still gives many chances for more exploration. …”
Get full text
Article -
317
An Efficient Algorithm for Maximizing Range Sum Queries in a Road Network
Published 2014-01-01“…Through simulations, we evaluate the performance of the proposed algorithm.…”
Get full text
Article -
318
A Suggested Point Search Algorithm for Circle Detection in Binary Images
Published 2010-12-01“…The proposed algorithm was compared with Hough Transform (HT) method for circle detection by using many images with different numbers and radius of circles and different image dimensions. …”
Get full text
Article -
319
A High-Quality Underwater Acoustic Dataset for Algorithm Development and Analysis
Published 2025-07-01“…This dataset uses a systematic approach to demonstrate the diversity and accuracy needed for effective algorithm development.…”
Get full text
Article -
320
An Evolutionary Algorithm: An Enhancement of Binary Tournament Selection for Fish Feed Formulation
Published 2022-01-01“…It is because grouper fish are carnivorous and need many trash fish for better growth. The novelty of the proposed SD tournament selection is compared with BT selection in terms of searching for an efficient but not myopic algorithm. …”
Get full text
Article