期刊文献+
共找到264,690篇文章
< 1 2 250 >
每页显示 20 50 100
Research and Application on Web Information Retrieval Based on Improved FP-Growth Algorithm 被引量:2
1
作者 JIAO Minghai YAN Ping JIANG Huiyan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1065-1068,共4页
A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each n... A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each node are kept. Route information of different nodes in a same item are compressed into aggregative chains so that the frequent patterns will be produced in aggregative chains without generating node links and conditional pattern bases. An example of Web key words retrieval is given to analyze and verify the frequent pattern algorithm in this paper. 展开更多
关键词 data mining CHAINS fp-growth algorithm frequent pattern aggregative information retrieval
下载PDF
Based on FP-Growth Algorithm to Excavate Medication Rule of Chinese Materia Medica for Radiation Esophagitis 被引量:1
2
作者 ZHANG Fu-peng ZHAO Xiao-yan +4 位作者 LI Yi-fang HAO Shu-lan WANG Ai-rong GUO Bai-shi LIU Li-kun 《World Journal of Integrated Traditional and Western Medicine》 2020年第7期31-38,共8页
Objective:To find the medication rule of Chinese materia medica for treating radiation esophagitis through FP-Growth algorithm.Methods:By searching the three major literature databases such as Chinese Journal Full-tex... Objective:To find the medication rule of Chinese materia medica for treating radiation esophagitis through FP-Growth algorithm.Methods:By searching the three major literature databases such as Chinese Journal Full-text Database,VIP Chinese Sci-tech Journals Database,Wanfang Data,etc.from the database establishment to May 10,2020,88 effective documents and 91 prescriptions were screened.The medication frequency of prescription in the paper was extracted and sorted.Results:The frequency of medicinal property from high to low were:slightly cold,cold,balance,warm,cool,slightly warm,and great cold.The frequency of medicinal taste from high to low were:sweet,bitter,pungent,slightly bitter,salty,slightly pungent,sour,light,astringent.The frequency of channel tropism from high to low were:lung,stomach,liver,heart,spleen,etc.,and 10 herbal combinations with clinical significance were obtained.There was one prescription with good correlation strength in the clinical treatment of radiation esophagitis.Conclusion:The medication rule of Chinese materia medica for the treatment of radiation esophagitis is based on the principles of clearing away heat and detoxification,benefiting Qi(气)and nourishing Yin(阴),and stopping bleeding and removing phlegm.Heat-clearing medicine,tonic medicine,phlegmresolving,cough–relieving medicine and asthma-relieving medicine,blood-activating and stasis removing medicine were highly frequent used.The high-frequency association rules are nourishing Yin–clearing heat–generating fluid,removing toxin–cooling blood–benefiting Qi,benefiting Qi–invigorating spleen–stopping bleeding.It is stable and feasible to use FP-Growth algorithm to mine traditional Chinese medicine(TCM)to treat diseases. 展开更多
关键词 fp-growth MINING Ridiation esophagitis Chinese materia medica
下载PDF
An Improved FP-Growth Algorithm Based on SOM Partition
3
作者 Kuikui Jia Haibin Liu 《国际计算机前沿大会会议论文集》 2017年第1期42-44,共3页
FP-growth algorithm is an algorithm for mining association rules without generating candidate sets.It has high practical value in many fields.However,it is a memory resident algorithm,and can only handle small data se... FP-growth algorithm is an algorithm for mining association rules without generating candidate sets.It has high practical value in many fields.However,it is a memory resident algorithm,and can only handle small data sets.It seems powerless when dealing with massive data sets.This paper improves the FP-growth algorithm.The core idea of the improved algorithm is to partition massive data set into small data sets,which would be dealt with separately.Firstly,systematic sampling methods are used to extract representative samples from large data sets,and these samples are used to make SOM(Self-organizing Map)cluster analysis.Then,the large data set is partitioned into several subsets according to the cluster results.Lastly,FP-growth algorithm is executed in each subset,and association rules are mined.The experimental result shows that the improved algorithm reduces the memory consumption,and shortens the time of data mining.The processing capacity and efficiency of massive data is enhanced by the improved algorithm. 展开更多
关键词 fp-growth SOM Data MINING CLUSTER PARTITION
下载PDF
基于FP-growth的老年行人交通事故损伤致因研究
4
作者 刘永涛 张慧臣 +3 位作者 袁诗泉 高隆鑫 王鹏 赵晨 《中国安全生产科学技术》 CAS CSCD 北大核心 2024年第6期176-182,共7页
为研究老年行人交通事故相关因素及其对损伤程度的影响,以中国交通事故深度调查数据库中2013—2023年710起机动车-老年行人事故为分析对象,利用FP-growth算法挖掘出4类影响因素28个类型变量共5594项关联规则。研究结果表明:行人年龄、... 为研究老年行人交通事故相关因素及其对损伤程度的影响,以中国交通事故深度调查数据库中2013—2023年710起机动车-老年行人事故为分析对象,利用FP-growth算法挖掘出4类影响因素28个类型变量共5594项关联规则。研究结果表明:行人年龄、碰撞速度、事故时间段及事故地点是影响老年行人事故死亡率的显著因素。特别是,行人年龄和碰撞速度对死亡率有显著影响,随着碰撞速度的增加,死亡率显著上升;60岁及以上老年行人年龄每增加1岁,其死亡率提升0.037倍。此外,事故发生在夜间、郊区或村庄的死亡率更高。研究结果可为提高老年行人交通安全,制定相关安全措施提供一定参考。 展开更多
关键词 fp-growth算法 逻辑回归模型 老年行人安全 交通事故数据分析
下载PDF
基于FP-growth算法的交通事故数据关联规则挖掘研究
5
作者 马健 谢雨晴 +2 位作者 张丽岩 王燕 周欢生 《科技创新与生产力》 2024年第9期95-97,共3页
为了探寻多种事故影响因素共同作用下诱发交通事故的某种规律以及各因素间的关系,本文采用FP-growth算法对收集到的交通事故数据进行分析研究,挖掘其中的潜在价值信息,找出事故发生的原因,根据分析结果给相关部门提出建议,帮助城市交通... 为了探寻多种事故影响因素共同作用下诱发交通事故的某种规律以及各因素间的关系,本文采用FP-growth算法对收集到的交通事故数据进行分析研究,挖掘其中的潜在价值信息,找出事故发生的原因,根据分析结果给相关部门提出建议,帮助城市交通管理者制定更有效的管理措施,以达到降低交通事故发生频率的目的。 展开更多
关键词 交通事故 关联规则 fp-growth
下载PDF
基于改进FP-Growth算法和贝叶斯的营业线施工安全风险分析
6
作者 蔡近近 宋瑞 +2 位作者 何世伟 赵日鑫 姜俊平 《铁道科学与工程学报》 EI CAS CSCD 北大核心 2024年第8期3370-3381,共12页
铁路营业线施工事故致因因素众多且存在关联关系,挖掘事故致因之间的关联关系和因果关系对事故的预防管控具有重要意义。通过文本挖掘对2010—2022年某路局营业线事故调查报告进行处理,提取出51个事故致因因素。基于事故因果连锁理论将... 铁路营业线施工事故致因因素众多且存在关联关系,挖掘事故致因之间的关联关系和因果关系对事故的预防管控具有重要意义。通过文本挖掘对2010—2022年某路局营业线事故调查报告进行处理,提取出51个事故致因因素。基于事故因果连锁理论将致因因素分为人因层、设备层、环境层、管理层4个层级进行分层分析,构建铁路营业线施工事故致因体系。基于压缩算法和差分编码对传统FP-Growth算法进行改进,以此对铁路营业线施工事故致因进行挖掘,找到满足提升度要求的高支持度关联规则和高置信度关联规则,发现关键致因关联和事故致因规律。基于贝叶斯网络理论、致因关联关系和专家经验建立营业线施工安全风险贝叶斯网络,结合复杂网络理论分析网络节点度、聚类系数与节点介数等特征,找到关键致因因素。在此基础上,运用因果推理和故障诊断推理进一步剖析营业线施工过程中的高风险致因,并从“人防、物防、技防”3方面提出预防管控措施。案例结果表明:施工人员操作不当、施工造成接触网故障、施工导致设施设备侵限、施工作业损害电缆设备、施工造成轨道电路故障和施工、检修、清扫设备耽误列车类事故之间的关联关系较为频繁,且为红光带事故的高概率致因,在施工作业过程中应多层次重点预防管控。研究成果为铁路营业线施工安全管理提供一种新的风险分析方法。 展开更多
关键词 铁路营业线施工事故 改进fp-growth算法 关联规则挖掘 贝叶斯网络推理 致因体系
下载PDF
基于FP-Growth算法的直流输电系统阀基电子设备缺陷关联性分析
7
作者 肖耀辉 余俊松 +3 位作者 李为明 薛海平 王永平 戴剑丰 《电子器件》 CAS 2024年第4期1053-1059,共7页
换流阀控制设备作为直流输电系统的核心设备,对其阀基电子设备进行缺陷异常分析是保证直流输电系统稳定可靠运行的基础。提出一种基于FP-Growth算法的直流输电阀基电子设备缺陷关联性分析方法。首先基于阀基电子设备的基本结构与原理,... 换流阀控制设备作为直流输电系统的核心设备,对其阀基电子设备进行缺陷异常分析是保证直流输电系统稳定可靠运行的基础。提出一种基于FP-Growth算法的直流输电阀基电子设备缺陷关联性分析方法。首先基于阀基电子设备的基本结构与原理,采集阀基电子设备缺陷数据;接着对原始数据进行预处理,量化编码后导入FP-Growth算法,通过构建FP-Tree,计算其支持度和置信度,分析阀基电子设备的缺陷特征和影响因素以及各元件之间的关联关系。该方法能高效智能实现对直流输电系统核心设备缺陷的关联分析及故障溯源,为运维人员检修策略的制定提供了理论依据。最后以实际直流输电系统换流阀阀基电子设备缺陷数据仿真算例对所提方法的有效性进行了验证。 展开更多
关键词 直流输电系统 阀基电子设备 fp-growth算法 缺陷关联性分析
下载PDF
Underwater four-quadrant dual-beam circumferential scanning laser fuze using nonlinear adaptive backscatter filter based on pauseable SAF-LMS algorithm 被引量:1
8
作者 Guangbo Xu Bingting Zha +2 位作者 Hailu Yuan Zhen Zheng He Zhang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第7期1-13,共13页
The phenomenon of a target echo peak overlapping with the backscattered echo peak significantly undermines the detection range and precision of underwater laser fuzes.To overcome this issue,we propose a four-quadrant ... The phenomenon of a target echo peak overlapping with the backscattered echo peak significantly undermines the detection range and precision of underwater laser fuzes.To overcome this issue,we propose a four-quadrant dual-beam circumferential scanning laser fuze to distinguish various interference signals and provide more real-time data for the backscatter filtering algorithm.This enhances the algorithm loading capability of the fuze.In order to address the problem of insufficient filtering capacity in existing linear backscatter filtering algorithms,we develop a nonlinear backscattering adaptive filter based on the spline adaptive filter least mean square(SAF-LMS)algorithm.We also designed an algorithm pause module to retain the original trend of the target echo peak,improving the time discrimination accuracy and anti-interference capability of the fuze.Finally,experiments are conducted with varying signal-to-noise ratios of the original underwater target echo signals.The experimental results show that the average signal-to-noise ratio before and after filtering can be improved by more than31 d B,with an increase of up to 76%in extreme detection distance. 展开更多
关键词 Laser fuze Underwater laser detection Backscatter adaptive filter Spline least mean square algorithm Nonlinear filtering algorithm
下载PDF
Rao Algorithms-Based Structure Optimization for Heterogeneous Wireless Sensor Networks 被引量:1
9
作者 Shereen K.Refaay Samia A.Ali +2 位作者 Moumen T.El-Melegy Louai A.Maghrabi Hamdy H.El-Sayed 《Computers, Materials & Continua》 SCIE EI 2024年第1期873-897,共25页
The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few hav... The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few have been performed for heterogeneouswireless sensor networks.This paper utilizes Rao algorithms to optimize the structure of heterogeneous wireless sensor networks according to node locations and their initial energies.The proposed algorithms lack algorithm-specific parameters and metaphorical connotations.The proposed algorithms examine the search space based on the relations of the population with the best,worst,and randomly assigned solutions.The proposed algorithms can be evaluated using any routing protocol,however,we have chosen the well-known routing protocols in the literature:Low Energy Adaptive Clustering Hierarchy(LEACH),Power-Efficient Gathering in Sensor Information Systems(PEAGSIS),Partitioned-based Energy-efficient LEACH(PE-LEACH),and the Power-Efficient Gathering in Sensor Information Systems Neural Network(PEAGSIS-NN)recent routing protocol.We compare our optimized method with the Jaya,the Particle Swarm Optimization-based Energy Efficient Clustering(PSO-EEC)protocol,and the hybrid Harmony Search Algorithm and PSO(HSA-PSO)algorithms.The efficiencies of our proposed algorithms are evaluated by conducting experiments in terms of the network lifetime(first dead node,half dead nodes,and last dead node),energy consumption,packets to cluster head,and packets to the base station.The experimental results were compared with those obtained using the Jaya optimization algorithm.The proposed algorithms exhibited the best performance.The proposed approach successfully prolongs the network lifetime by 71% for the PEAGSIS protocol,51% for the LEACH protocol,10% for the PE-LEACH protocol,and 73% for the PEGSIS-NN protocol;Moreover,it enhances other criteria such as energy conservation,fitness convergence,packets to cluster head,and packets to the base station. 展开更多
关键词 Wireless sensor networks Rao algorithms OPTIMIZATION LEACH PEAGSIS
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
10
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
基于FP-Growth算法的运毒嫌疑车辆智能推荐研究
11
作者 陈柏翰 罗安飞 《贵州警察学院学报》 2024年第3期84-91,共8页
毒品运输是毒品犯罪的重要环节,虽然毒品运输的手段越来越多样化,但公路运输仍然是主要的运输方式之一,而运毒人员有着各自经典的运毒模式。文中对运毒模式进行特征挖掘,发现存在前后车伴随的规律,根据实际业务中前后车行为以半小时为... 毒品运输是毒品犯罪的重要环节,虽然毒品运输的手段越来越多样化,但公路运输仍然是主要的运输方式之一,而运毒人员有着各自经典的运毒模式。文中对运毒模式进行特征挖掘,发现存在前后车伴随的规律,根据实际业务中前后车行为以半小时为时间间隔导向,建模时选择PostgreSQL数据库。在数据库中建立过往车辆前半小时中间表、后半小时中间表、中间跨度表,运用人工智能数据挖掘技术实现从大量的通行车辆中抽取车辆伴随信息,采用FP-Growth算法挖掘频繁项集,查找高频出现车牌号,通过设定阈值并找到对应的关联规则,经过缉毒民警提供的黑名单进行过滤并排序,最后进行车辆嫌疑度的推荐,为民警拦截嫌疑车辆提供支持,能够在一定程度上提高对嫌疑车辆排查的针对性、准确性和有效性。 展开更多
关键词 毒品运输 运毒模式 特征挖掘 fp-growth算法 关联规则
下载PDF
Product quality prediction based on RBF optimized by firefly algorithm 被引量:1
12
作者 HAN Huihui WANG Jian +1 位作者 CHEN Sen YAN Manting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期105-117,共13页
With the development of information technology,a large number of product quality data in the entire manufacturing process is accumulated,but it is not explored and used effectively.The traditional product quality pred... With the development of information technology,a large number of product quality data in the entire manufacturing process is accumulated,but it is not explored and used effectively.The traditional product quality prediction models have many disadvantages,such as high complexity and low accuracy.To overcome the above problems,we propose an optimized data equalization method to pre-process dataset and design a simple but effective product quality prediction model:radial basis function model optimized by the firefly algorithm with Levy flight mechanism(RBFFALM).First,the new data equalization method is introduced to pre-process the dataset,which reduces the dimension of the data,removes redundant features,and improves the data distribution.Then the RBFFALFM is used to predict product quality.Comprehensive expe riments conducted on real-world product quality datasets validate that the new model RBFFALFM combining with the new data pre-processing method outperforms other previous me thods on predicting product quality. 展开更多
关键词 product quality prediction data pre-processing radial basis function swarm intelligence optimization algorithm
下载PDF
Path Planning for AUVs Based on Improved APF-AC Algorithm 被引量:1
13
作者 Guojun Chen Danguo Cheng +2 位作者 Wei Chen Xue Yang Tiezheng Guo 《Computers, Materials & Continua》 SCIE EI 2024年第3期3721-3741,共21页
With the increase in ocean exploration activities and underwater development,the autonomous underwater vehicle(AUV)has been widely used as a type of underwater automation equipment in the detection of underwater envir... With the increase in ocean exploration activities and underwater development,the autonomous underwater vehicle(AUV)has been widely used as a type of underwater automation equipment in the detection of underwater environments.However,nowadays AUVs generally have drawbacks such as weak endurance,low intelligence,and poor detection ability.The research and implementation of path-planning methods are the premise of AUVs to achieve actual tasks.To improve the underwater operation ability of the AUV,this paper studies the typical problems of path-planning for the ant colony algorithm and the artificial potential field algorithm.In response to the limitations of a single algorithm,an optimization scheme is proposed to improve the artificial potential field ant colony(APF-AC)algorithm.Compared with traditional ant colony and comparative algorithms,the APF-AC reduced the path length by 1.57%and 0.63%(in the simple environment),8.92%and 3.46%(in the complex environment).The iteration time has been reduced by approximately 28.48%and 18.05%(in the simple environment),18.53%and 9.24%(in the complex environment).Finally,the improved APF-AC algorithm has been validated on the AUV platform,and the experiment is consistent with the simulation.Improved APF-AC algorithm can effectively reduce the underwater operation time and overall power consumption of the AUV,and shows a higher safety. 展开更多
关键词 PATH-PLANNING autonomous underwater vehicle ant colony algorithm artificial potential field bio-inspired neural network
下载PDF
基于FP-growth算法的高维混合属性数据挖掘方法
14
作者 梁树杰 《计算技术与自动化》 2024年第2期88-92,共5页
常规高维混合属性数据挖掘方法多采用云平台技术,无法完整保留数据的结构相似性,使得数据挖掘效率较低。为此,提出了基于FP-growth算法的高维混合属性数据挖掘方法。为了改善数据质量,根据高维混合属性数据在数据库中的存储结构,采用了... 常规高维混合属性数据挖掘方法多采用云平台技术,无法完整保留数据的结构相似性,使得数据挖掘效率较低。为此,提出了基于FP-growth算法的高维混合属性数据挖掘方法。为了改善数据质量,根据高维混合属性数据在数据库中的存储结构,采用了一种固定算法实现数据去噪,并依据数据类型计算分类型和数值型相似度,结合FP-growth算法对频繁项样本分支进行筛选生成项表头,保证数据结构相似性的完整性,通过搜索项表头输出有效关联规则,实现数据挖掘过程。实验结果表明,所提方法具有较高的挖掘效率。 展开更多
关键词 数据挖掘 fp-growth算法 固定算法 高维混合属性
下载PDF
基于FP-Growth算法的MES系统生产关联规则挖掘技术研究
15
作者 杜世举 郝晓娜 +2 位作者 杜阳 李立 杨文栋 《电脑编程技巧与维护》 2024年第9期30-32,共3页
制造执行系统(MES)产生的海量生产数据蕴含着知识性规律,挖掘这些数据对企业优化生产管理、提升产品质量、降低运营成本具有重要意义。研究分析了MES系统的架构特点和关键功能模块,介绍了FP-Growth算法的基本原理,设计了将算法应用于ME... 制造执行系统(MES)产生的海量生产数据蕴含着知识性规律,挖掘这些数据对企业优化生产管理、提升产品质量、降低运营成本具有重要意义。研究分析了MES系统的架构特点和关键功能模块,介绍了FP-Growth算法的基本原理,设计了将算法应用于MES系统的过程,包括频繁项集生成、关联规则生成等关键步骤,从FP-Tree构建、投影压缩、并行化等方面对FP-Growth算法进行了优化,设计并执行基于生产数据量级的加压测试方案。 展开更多
关键词 MES系统 关联规则挖掘 fp-growth算法 FP-TREE算法
下载PDF
Algorithm Selection Method Based on Coupling Strength for Partitioned Analysis of Structure-Piezoelectric-Circuit Coupling
16
作者 Daisuke Ishihara Naoto Takayama 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1237-1258,共22页
In this study, we propose an algorithm selection method based on coupling strength for the partitioned analysis ofstructure-piezoelectric-circuit coupling, which includes two types of coupling or inverse and direct pi... In this study, we propose an algorithm selection method based on coupling strength for the partitioned analysis ofstructure-piezoelectric-circuit coupling, which includes two types of coupling or inverse and direct piezoelectriccoupling and direct piezoelectric and circuit coupling. In the proposed method, implicit and explicit formulationsare used for strong and weak coupling, respectively. Three feasible partitioned algorithms are generated, namely(1) a strongly coupled algorithm that uses a fully implicit formulation for both types of coupling, (2) a weaklycoupled algorithm that uses a fully explicit formulation for both types of coupling, and (3) a partially stronglycoupled and partially weakly coupled algorithm that uses an implicit formulation and an explicit formulation forthe two types of coupling, respectively.Numerical examples using a piezoelectric energy harvester,which is a typicalstructure-piezoelectric-circuit coupling problem, demonstrate that the proposed method selects the most costeffectivealgorithm. 展开更多
关键词 MULTIPHYSICS coupling strength partitioned algorithm structure-piezoelectric-circuit coupling strongly coupled algorithm weakly coupled algorithm
下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm
17
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
Hybrid Optimization Algorithm for Handwritten Document Enhancement
18
作者 Shu-Chuan Chu Xiaomeng Yang +2 位作者 Li Zhang Václav Snášel Jeng-Shyang Pan 《Computers, Materials & Continua》 SCIE EI 2024年第3期3763-3786,共24页
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study intro... The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study introduces a hybrid optimization algorithm, named the adaptive inertia weight whale optimization algorithm and gannet optimization algorithm (AIWGOA), which addresses challenges in enhancing handwritten documents. The hybrid strategy integrates the strengths of both algorithms, significantly enhancing their capabilities, whereas the adaptive parameter strategy mitigates the need for manual parameter setting. By amalgamating the hybrid strategy and parameter-adaptive approach, the Gannet Optimization Algorithm was refined to yield the AIWGOA. Through a performance analysis of the CEC2013 benchmark, the AIWGOA demonstrates notable advantages across various metrics. Subsequently, an evaluation index was employed to assess the enhanced handwritten documents and images, affirming the superior practical application of the AIWGOA compared with other algorithms. 展开更多
关键词 Metaheuristic algorithm gannet optimization algorithm hybrid algorithm handwritten document enhancement
下载PDF
Representation of an Integer by a Quadratic Form through the Cornacchia Algorithm
19
作者 Moumouni Djassibo Woba 《Applied Mathematics》 2024年第9期614-629,共16页
Cornachia’s algorithm can be adapted to the case of the equation x2+dy2=nand even to the case of ax2+bxy+cy2=n. For the sake of completeness, we have given modalities without proofs (the proof in the case of the equa... Cornachia’s algorithm can be adapted to the case of the equation x2+dy2=nand even to the case of ax2+bxy+cy2=n. For the sake of completeness, we have given modalities without proofs (the proof in the case of the equation x2+y2=n). Starting from a quadratic form with two variables f(x,y)=ax2+bxy+cy2and n an integer. We have shown that a primitive positive solution (u,v)of the equation f(x,y)=nis admissible if it is obtained in the following way: we take α modulo n such that f(α,1)≡0modn, u is the first of the remainders of Euclid’s algorithm associated with n and α that is less than 4cn/| D |) (possibly α itself) and the equation f(x,y)=n. has an integer solution u in y. At the end of our work, it also appears that the Cornacchia algorithm is good for the form n=ax2+bxy+cy2if all the primitive positive integer solutions of the equation f(x,y)=nare admissible, i.e. computable by the algorithmic process. 展开更多
关键词 Quadratic Form Cornacchia algorithm Associated Polynomials Euclid’s algorithm Prime Number
下载PDF
A Hybrid Dung Beetle Optimization Algorithm with Simulated Annealing for the Numerical Modeling of Asymmetric Wave Equations
20
作者 Wei Xu-ruo Bai Wen-lei +2 位作者 Liu Lu Li You-ming Wang Zhi-yang 《Applied Geophysics》 SCIE CSCD 2024年第3期513-527,618,共16页
In the generalized continuum mechanics(GCM)theory framework,asymmetric wave equations encompass the characteristic scale parameters of the medium,accounting for microstructure interactions.This study integrates two th... In the generalized continuum mechanics(GCM)theory framework,asymmetric wave equations encompass the characteristic scale parameters of the medium,accounting for microstructure interactions.This study integrates two theoretical branches of the GCM,the modified couple stress theory(M-CST)and the one-parameter second-strain-gradient theory,to form a novel asymmetric wave equation in a unified framework.Numerical modeling of the asymmetric wave equation in a unified framework accurately describes subsurface structures with vital implications for subsequent seismic wave inversion and imaging endeavors.However,employing finite-difference(FD)methods for numerical modeling may introduce numerical dispersion,adversely affecting the accuracy of numerical modeling.The design of an optimal FD operator is crucial for enhancing the accuracy of numerical modeling and emphasizing the scale effects.Therefore,this study devises a hybrid scheme called the dung beetle optimization(DBO)algorithm with a simulated annealing(SA)algorithm,denoted as the SA-based hybrid DBO(SDBO)algorithm.An FD operator optimization method under the SDBO algorithm was developed and applied to the numerical modeling of asymmetric wave equations in a unified framework.Integrating the DBO and SA algorithms mitigates the risk of convergence to a local extreme.The numerical dispersion outcomes underscore that the proposed SDBO algorithm yields FD operators with precision errors constrained to 0.5‱while encompassing a broader spectrum coverage.This result confirms the efficacy of the SDBO algorithm.Ultimately,the numerical modeling results demonstrate that the new FD method based on the SDBO algorithm effectively suppresses numerical dispersion and enhances the accuracy of elastic wave numerical modeling,thereby accentuating scale effects.This result is significant for extracting wavefield perturbations induced by complex microstructures in the medium and the analysis of scale effects. 展开更多
关键词 FINITE-DIFFERENCE Asymmetric wave equation Numerical modeling DBO algorithm SA algorithm
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部