-
181
A tree based keyphrase extraction technique for academic literature
Published 2019“…The proposed technique also introduces a new variant of the binary tree, called KeyPhrase Extraction (KePhEx) tree to extract final keyphrases from candidate keyphrases. …”
Get full text
Thesis -
182
Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map
Published 2022-06-01“…In other words, IHSOM can quickly adapt to the size of a dataset. The heap binary tree structure of the proposed approach offers several advantages over other structures. …”
Get full text
Article -
183
Module Based Floorplanning Methodology to Satisfy Voltage Island and Fixed Outline Constraints
Published 2018-11-01“…To perform voltage island floorplanning, the proposed algorithm uses Skewed binary tree representation scheme to operate the functional blocks in its predefined voltage level. …”
Get full text
Article -
184
Driving Fatigue Detection Based on the Combination of Multi-Branch 3D-CNN and Attention Mechanism
Published 2022-05-01“…EAR and MAR are used as fatigue analysis criteria and, finally, a full binary tree SVM classifier is used to output the four driving states. …”
Get full text
Article -
185
Graph-based optimization of continuous extrusion path in FRP-AM for compliant mechanism fabrication
Published 2023-01-01“…Then, the graph is encoded into a binary tree, and genetic programming is adopted in the optimization process to obtain the structure that achieves the desired deformation. …”
Get full text
Article -
186
Social-aware routing for cognitive radio–based vehicular ad hoc networks
Published 2019-07-01“…In the inter-community communication process, we utilize the optimized-binary-tree replication policy and the bridge coefficient rank. …”
Get full text
Article -
187
Prediction and experimental evidence of different growth phases of the Podospora anserina hyphal network
Published 2023-05-01“…For this purpose, we build on experimental observations of the Podospora anserina mycelium growth, enabling us to feed and constrain a lattice-free modeling of this network based on a binary tree. First, we report the set of statistics related to the branches of P. anserina that we have implemented into the model. …”
Get full text
Article -
188
Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting
Published 2018-04-01“…Our experiment results show that using the proposed algorithm, the efficiency curve remains constant as the number of tags varies from 50 to 450, resulting in an overall theoretical gain in the efficiency of 0.032 compared to system efficiency of 0.441 and thus outperforming both dynamic binary tree slotted ALOHA (DBTSA) and binary splitting protocols.…”
Get full text
Article -
189
Mapping Canopy Cover in African Dry Forests from the Combined Use of Sentinel-1 and Sentinel-2 Data: Application to Tanzania for the Year 2018
Published 2022-03-01“…Two types of maps were derived from these mapping approaches over Tanzania: (i) binary tree cover–no tree cover (TC/NTC) maps, and (ii) maps of the canopy cover classes. …”
Get full text
Article -
190
A Unified Multiple-Phase Fluids Framework Using Asymmetric Surface Extraction and the Modified Density Model
Published 2019-06-01“…We refine the original asymmetric smoothing kernel used in the color field and address a binary tree scheme for surface extraction. Besides, we employ a multiphase fluid framework with modified density to eliminate density deviation between different fluids. …”
Get full text
Article -
191
A Cooperative Hunting Method for Multi-USV Based on the A* Algorithm in an Environment with Obstacles
Published 2023-08-01“…At the same time, the post order traversal recursive algorithm in the binary tree method is used to replace the enumeration algorithm to obtain the optimal path, which improves the efficiency of the A* algorithm. …”
Get full text
Article -
192
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
Published 2023-03-01“…In our scheme, the indirect revocation and binary tree-based data structure are introduced to achieve efficient user revocation and dynamic management of user groups. …”
Get full text
Article -
193
A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs
Published 2022-01-01“…In this paper, we propose a lightweight binary tree-based (BT-based) authentication scheme with a batch verification mechanism, that could efficiently identify a modest amount of illegal signatures in the sum of messages. …”
Get full text
Article -
194
Efficient Method for Continuous IoT Data Stream Indexing in the Fog-Cloud Computing Level
Published 2023-06-01“…Each cluster in the first data stream is stored in the clusters processing fog level and indexed directly in the indexing fog level in a Binary tree with Hyperplane (BH tree). The indexing of clusters in the subsequent data stream is determined by the coefficient of variation (CV) value of the union of the new cluster with the existing clusters in the cluster processing fog layer. …”
Get full text
Article -
195
Controlled transport in chiral quantum walks on graphs
Published 2023-01-01“…Our theory has applications in building quantum versions of binary tree search algorithms.…”
Get full text
Article -
196
CNN-LSTM neural network model for fine-grained negative emotion computing in emergencies
Published 2022-09-01“…Aiming at those drawbacks and inspired by the dependency relationship among Chinese words, an emotion computing algorithm based on a binary tree is designed to assign words with emotional intensity. …”
Get full text
Article -
197
-
198
Learning to compose and reason with language tree structures for visual grounding
Published 2022“…In this paper, we propose a natural language grounding model that can automatically compose a binary tree structure for parsing the language and then perform visual reasoning along the tree in a bottom-up fashion. …”
Get full text
Journal Article -
199
Semi-supervised hierarchical clustering for personalized web image organization
Published 2013“…Different from existing hierarchical clustering algorithms, the proposed merging strategy can provide a multi-branch tree structure which is more systematic and clearer than traditional binary tree structure. Extensive experiments on two real world web image data sets, namely NUS-WIDE and Flickr, demonstrate the effectiveness of our algorithm for large web image data sets.…”
Get full text
Get full text
Conference Paper -
200
Spatial object median rules in bounding-volume hierarchies for complex environments
Published 2010“…The splitting process requires an object with their set of triangles to be splitted into two parts using binary tree. The problem exists where most of objects do not have similar triangle size and thus creating unbalanced tree when reaching the final level of tree construction. …”
Get full text
Thesis