Showing 81 - 100 results of 944 for search 'play information algorithm', query time: 0.13s Refine Results
  1. 81

    Localizing Optic Disc in Retinal Image Automatically with Entropy Based Algorithm by Lamia AbedNoor Muhammed

    Published 2018-01-01
    “…Different optical disc localization algorithms have been suggested, such as an algorithm that would be proposed in this paper. …”
    Get full text
    Article
  2. 82

    Phase diagram construction and prediction method based on machine learning algorithms by Shengkun Xi, Jiahui Li, Longke Bao, Rongpei Shi, Haijun Zhang, Xiaoyu Chong, Zhou Li, Cuiping Wang, Xingjun Liu

    Published 2025-05-01
    “…Phase diagram, which is known as the “compass” and “map” of materials research, plays a guiding role in the material design and development. …”
    Get full text
    Article
  3. 83

    A feature enhancement FCOS algorithm for dynamic traffic object detection by Tuqiang Zhou, Wei Liu, Haoran Li

    Published 2024-12-01
    “…The development of object detection plays an important role in the realisation of fully autonomous driving, and the feature extraction is the key step for object detection. …”
    Get full text
    Article
  4. 84
  5. 85

    Research on Traffic Marking Segmentation Detection Algorithm Based on Feature Fusion by Zhonghe He, Zizheng Gan, Pengfei Gong, Min Li, Kailong Li

    Published 2024-10-01
    “…Identifying road markings is a very important part of the vehicle environment sensing system and plays a crucial role in a vehicle’s correct understanding of a current traffic situation. …”
    Get full text
    Article
  6. 86

    Design of Hierarchical Retrieval Model of Digital English Teaching Information Based on Ontology by Hua Jiang, Li Sun

    Published 2022-01-01
    “…Moreover, this paper proposes a method for judging the similarity of English teaching information structure based on non-negative matrix factorization and develops a hierarchical retrieval model of digital English teaching information based on ontology according to an improved algorithm. …”
    Get full text
    Article
  7. 87

    Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security by Shaomin Zhu, Zhiqiang Zhang

    Published 2013-11-01
    “…According to energy distribution and visual masking in low frequency subband, the singular values of the selected low frequency subband blocks were adaptively applied quantization index modulation for embedding watermark information. Experimental results show that the algorithm has good image vision fidelity. …”
    Get full text
    Article
  8. 88

    Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition by Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN

    Published 2023-06-01
    “…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
    Get full text
    Article
  9. 89

    Local Balance and Information Aggregation: A Method for Identifying Central Influencers in Networks by Lidong Fu, Guoxian Ma, Zengfa Dou, Yun Bai, Xi Zhao

    Published 2025-02-01
    “…In complex networks, identifying critical nodes plays an important role in information dissemination. …”
    Get full text
    Article
  10. 90

    FORECASTING AND OPTIMIZATION OF CATALYTIC CRACKING UNIT OPERATION UNDER CONDITIONS OF FUZZY INFORMATION by Narkez Boranbayeva, Batyr Orazbayev, Leila Rzayeva, Zhalal Karabayev, Murat Alibek, Baktygul Assanova

    Published 2024-09-01
    “…The main reason for conducting this study is the need to improve the control of oil refining processes, particularly catalytic cracking, which plays an important role in producing high-quality gasoline. …”
    Get full text
    Article
  11. 91
  12. 92

    An Investigation of the Effectiveness of Facebook and Twitter Algorithm and Policies on Misinformation and User Decision Making by Jordan Harner, Lydia Ray, Florence Wakoko-Studstill

    Published 2022-10-01
    “…Prominent social media sites such as Facebook and Twitter use content and filter algorithms that play a significant role in creating filter bubbles that may captivate many users. …”
    Get full text
    Article
  13. 93

    A novel Knowledge Graph recommendation algorithm based on Graph Convolutional Network by Hui Guo, Chengyong Yang, Liqing Zhou, Shiwei Wei

    Published 2024-12-01
    “…Knowledge Graphs (KGs) are widely used in many fields of application, and especially play an essential role in recommendation systems. …”
    Get full text
    Article
  14. 94

    Intercluster Ant Colony Optimization Algorithm for Wireless Sensor Network in Dense Environment by Jung-Yoon Kim, Tripti Sharma, Brijesh Kumar, G. S. Tomar, Karan Berry, Won-Hyung Lee

    Published 2014-04-01
    “…Wireless sensor networks have grown rapidly with the innovation in Information Technology. Sensor nodes are distributed and deployed over the area for gathering requisite information. …”
    Get full text
    Article
  15. 95

    Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm by Jaeseung Han, Dong-Guk Han

    Published 2025-07-01
    “…Deterministic random bit generators (DRBG) play a crucial role in device security because they generate secret information cryptographic systems, e.g., secret keys and parameters. …”
    Get full text
    Article
  16. 96

    Network Diffusion Algorithms and Simulators in IoT and Space IoT: A Systematic Review by Charbel Mattar, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul

    Published 2025-03-01
    “…Network diffusion algorithms and simulators play a critical role in understanding how information, data, and malware propagate across various network topologies in Internet of Things and Space IoT configurations. …”
    Get full text
    Article
  17. 97

    Defining Algorithmic Ideology: Using Ideology Critique to Scrutinize Corporate Search Engines by Astrid Mager

    Published 2014-02-01
    “…“Organic intellectuals” (Gramsci) can play a central role in challenging powerful actors like Google and their algorithmic ideology. …”
    Get full text
    Article
  18. 98
  19. 99
  20. 100

    A cyclic redundancy check aided encoding construction method for list sphere polar decoder by Wenbin Hu, Haiqiang Chen, Rui Wang, Qinhua Guo, Shuping Dang, Youming Sun, Xiangcheng Li

    Published 2025-08-01
    “…Abstract Polar codes are the only error-correcting codes that have been mathematically proven to achieve the Shannon limit to date, playing a crucial role in the control channels of 5G mobile communication systems. …”
    Get full text
    Article