-
81
Localizing Optic Disc in Retinal Image Automatically with Entropy Based Algorithm
Published 2018-01-01“…Different optical disc localization algorithms have been suggested, such as an algorithm that would be proposed in this paper. …”
Get full text
Article -
82
Phase diagram construction and prediction method based on machine learning algorithms
Published 2025-05-01“…Phase diagram, which is known as the “compass” and “map” of materials research, plays a guiding role in the material design and development. …”
Get full text
Article -
83
A feature enhancement FCOS algorithm for dynamic traffic object detection
Published 2024-12-01“…The development of object detection plays an important role in the realisation of fully autonomous driving, and the feature extraction is the key step for object detection. …”
Get full text
Article -
84
A Novel Gaussian Ant Colony Algorithm for Clustering Cell Tracking
Published 2021-01-01Get full text
Article -
85
Research on Traffic Marking Segmentation Detection Algorithm Based on Feature Fusion
Published 2024-10-01“…Identifying road markings is a very important part of the vehicle environment sensing system and plays a crucial role in a vehicle’s correct understanding of a current traffic situation. …”
Get full text
Article -
86
Design of Hierarchical Retrieval Model of Digital English Teaching Information Based on Ontology
Published 2022-01-01“…Moreover, this paper proposes a method for judging the similarity of English teaching information structure based on non-negative matrix factorization and develops a hierarchical retrieval model of digital English teaching information based on ontology according to an improved algorithm. …”
Get full text
Article -
87
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01“…According to energy distribution and visual masking in low frequency subband, the singular values of the selected low frequency subband blocks were adaptively applied quantization index modulation for embedding watermark information. Experimental results show that the algorithm has good image vision fidelity. …”
Get full text
Article -
88
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article -
89
Local Balance and Information Aggregation: A Method for Identifying Central Influencers in Networks
Published 2025-02-01“…In complex networks, identifying critical nodes plays an important role in information dissemination. …”
Get full text
Article -
90
FORECASTING AND OPTIMIZATION OF CATALYTIC CRACKING UNIT OPERATION UNDER CONDITIONS OF FUZZY INFORMATION
Published 2024-09-01“…The main reason for conducting this study is the need to improve the control of oil refining processes, particularly catalytic cracking, which plays an important role in producing high-quality gasoline. …”
Get full text
Article -
91
Taming TikTok: how BIPOC individuals perceive and interact with algorithmically generated content
Published 2025-03-01Get full text
Article -
92
An Investigation of the Effectiveness of Facebook and Twitter Algorithm and Policies on Misinformation and User Decision Making
Published 2022-10-01“…Prominent social media sites such as Facebook and Twitter use content and filter algorithms that play a significant role in creating filter bubbles that may captivate many users. …”
Get full text
Article -
93
A novel Knowledge Graph recommendation algorithm based on Graph Convolutional Network
Published 2024-12-01“…Knowledge Graphs (KGs) are widely used in many fields of application, and especially play an essential role in recommendation systems. …”
Get full text
Article -
94
Intercluster Ant Colony Optimization Algorithm for Wireless Sensor Network in Dense Environment
Published 2014-04-01“…Wireless sensor networks have grown rapidly with the innovation in Information Technology. Sensor nodes are distributed and deployed over the area for gathering requisite information. …”
Get full text
Article -
95
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm
Published 2025-07-01“…Deterministic random bit generators (DRBG) play a crucial role in device security because they generate secret information cryptographic systems, e.g., secret keys and parameters. …”
Get full text
Article -
96
Network Diffusion Algorithms and Simulators in IoT and Space IoT: A Systematic Review
Published 2025-03-01“…Network diffusion algorithms and simulators play a critical role in understanding how information, data, and malware propagate across various network topologies in Internet of Things and Space IoT configurations. …”
Get full text
Article -
97
Defining Algorithmic Ideology: Using Ideology Critique to Scrutinize Corporate Search Engines
Published 2014-02-01“…“Organic intellectuals” (Gramsci) can play a central role in challenging powerful actors like Google and their algorithmic ideology. …”
Get full text
Article -
98
C3-VQA: Cryogenic Counter-Based Coprocessor for Variational Quantum Algorithms
Published 2025-01-01Get full text
Article -
99
-
100
A cyclic redundancy check aided encoding construction method for list sphere polar decoder
Published 2025-08-01“…Abstract Polar codes are the only error-correcting codes that have been mathematically proven to achieve the Shannon limit to date, playing a crucial role in the control channels of 5G mobile communication systems. …”
Get full text
Article