Showing 2,921 - 2,940 results of 5,656 for search 'complex (selection OR detection) efficiency', query time: 0.23s Refine Results
  1. 2921
  2. 2922
  3. 2923

    Fast Adaptive Sparse Iterative Reweighted Super-Resolution Method for Forward-Looking Radar Imaging by Jiawei Luo, Yulin Huang, Ruitao Li, Deqing Mao, Yongchao Zhang, Yin Zhang, Jianyu Yang

    Published 2024-01-01
    “…However, this method suffers from poor adaptability and high computational complexity due to its noise-sensitive user-parameter and the necessity for high-dimensional matrix inversion. …”
    Get full text
    Article
  4. 2924
  5. 2925
  6. 2926
  7. 2927
  8. 2928
  9. 2929
  10. 2930

    SSL-MBC: Self-Supervised Learning With Multibranch Consistency for Few-Shot PolSAR Image Classification by Wenmei Li, Hao Xia, Bin Xi, Yu Wang, Jing Lu, Yuhong He

    Published 2025-01-01
    “…Nevertheless, fully utilizing SSL in PolSAR classification tasks is still a great challenge due to the data complexity. Based on the abovementioned issues, we propose an SSL model with multibranch consistency (SSL-MBC) for few-shot PolSAR image classification. …”
    Get full text
    Article
  11. 2931
  12. 2932
  13. 2933

    Rectified Adam Optimizer and LSTM with Attention Mechanism for ECG-Based Multi-class Classification of Cardiac Arrhythmia by T. Sivaranjani, B. Sasikumar, G. Sugitha

    Published 2025-06-01
    “…Cardiac Arrhythmia (CA) is one of the most prevalent cardiac conditions and prime reasons for sudden death. The current CA detection methods face challenges in noise removal, R-peak detection, and low-level feature selection, which can impact diagnostic accuracy and signal stability. …”
    Get full text
    Article
  14. 2934

    Attribute-based lightweight reconfigurable access control policy by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO

    Published 2020-02-01
    “…Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was proposed.Taking the attribute-based access control policy as an example,the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type,subject attribute,object attribute,and environment attribute in the access control policy.Complex access control policies were constructed through atomic access control rules and an algebraic expression formed by AND,OR logical relationships.A method for redundancy and collision detection of atomic access control rules was proposed.A method was proposed for decompose a complex access control policy into equivalent atomic access control rules and an algebraic expression.The method for redundancy and collision detection of complex access control policies were proposed through redundancy and collision detection of equivalent atomic access control rules and algebraic expressions.From time complexity and space complexity,the efficiency of the equivalent transformation access control policy was evaluated.It showes that the reconstruction method for access control policy greatly reduces the number,size and complexity of access control policy,improves the efficiency of access control policy redundancy and collision detection,and the efficiency of access control evaluation.…”
    Get full text
    Article
  15. 2935

    A fast video coding algorithm using data mining for video surveillance by Bingyue Xie

    Published 2025-08-01
    “…Video surveillance is crucial for various applications, including unmanned aerial vehicle operations, flight safety monitoring, social security management, industrial safety, and criminal detection. The large volume of video data generated in these areas requires efficient processing techniques. …”
    Get full text
    Article
  16. 2936

    Leveraging machine learning to proactively identify phishing campaigns before they strike by Kun Zhang, Haifeng Wang, Meiyi Chen, Xianglin Chen, Long Liu, Qiang Geng, Yu Zhou

    Published 2025-05-01
    “…These algorithms were chosen for their strong global search capabilities and adaptability to complex datasets, ensuring optimal parameter selection for improved model performance. …”
    Get full text
    Article
  17. 2937

    Fault analysis of chemical equipment based on an improved hybrid model. by Wu Huiyong, Kuan Jiang, Wang Yanyu

    Published 2025-01-01
    “…However, traditional fault detection techniques often exhibit limitations when applied to the complex operational conditions, varying environmental factors, and multimodal data encountered in chemical equipment. …”
    Get full text
    Article
  18. 2938

    Digital security risk identification and model construction of smart city based on deep learning by Zhilei Zhao

    Published 2025-07-01
    “…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
    Get full text
    Article
  19. 2939

    A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P by Hyunjoo Yang, Sejin Park

    Published 2025-01-01
    “…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
    Get full text
    Article
  20. 2940

    Analysis and Synthesis March Memory Tests by V. N. Yarmolik, V. A. Levantsevich, D. V. Demenkovets

    Published 2021-07-01
    “…Mathematical models of memory device faults and the efficiency of their detection, in particular, complex pattern sensitive faults of the PNPSFk type, based on classical march memory tests are presented. …”
    Get full text
    Article