Suggested Topics within your search.
Suggested Topics within your search.
-
381
-
382
Research on Universal Time/Length of Day Combination Algorithm Based on Effective Angular Momentum Dataset
Published 2025-03-01Get full text
Article -
383
-
384
Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Published 2022-12-01“…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
Get full text
Article -
385
Research on an inverse synthetic aperture radar imaging algorithm based on non-convex regularization model
Published 2024-10-01“…For this model, we propose a new algorithm which is based on the MM iteration algorithm framework and adopts the idea of support shrinkage technique, called as iteration support shrinkage algorithm. …”
Get full text
Article -
386
-
387
Research on a very energy-efficient and low-delay flooding algorithm for wireless sensor network
Published 2007-01-01Get full text
Article -
388
Optimizing and Visualizing Drone Station Sites for Cultural Heritage Protection and Research Using Genetic Algorithms
Published 2025-06-01Subjects: “…cultural heritage protection and research…”
Get full text
Article -
389
Research on Prediction model of Carotid‐Femoral Pulse Wave Velocity: Based on Machine Learning Algorithm
Published 2025-03-01Get full text
Article -
390
-
391
Research and Implementation of the Text Matching Algorithm in the Field of Housing Law and Policy Based on Deep Learning
Published 2021-01-01“…Compare the improved depth learning algorithm with the general algorithm, so as to clearly understand the advantages and disadvantages of the improved depth learning algorithm and depth learning algorithm. …”
Get full text
Article -
392
Research on 3D stability algorithm of potential sliding body in surface mining in confined space
Published 2025-01-01Get full text
Article -
393
Research Progress on Machine Learning Prediction of Compressive Strength of Nano-Modified Concrete
Published 2025-04-01“…In this article, the development of machine learning research in predicting the strength of concrete enhanced by nanoparticles is reviewed. …”
Get full text
Article -
394
Research of Models of Topological Relations of Spatial Objects
Published 2022-09-01“…The generalization automation still remains an open issue for data producers and users. Many researchers are working to achieve a higher level of automation. …”
Get full text
Article -
395
Research on differential properties of Keccak-like nonlinear transform
Published 2012-09-01Get full text
Article -
396
Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain
Published 2024-11-01“…The optimized SM2 encryption algorithm is introduced, and the execution efficiency of the encryption algorithm is improved by the concurrent processing framework, which guarantees the security and transmission speed of the data. …”
Get full text
Article -
397
Research on the programming language for proxy re-encryption
Published 2018-06-01Get full text
Article -
398
Research on SaaS Support Architecture and Key Technologies
Published 2013-12-01Get full text
Article -
399
-
400