Showing 241 - 260 results of 1,299 for search 'face computational algorithms', query time: 0.12s Refine Results
  1. 241

    GenSDF: An MPI-Fortran based signed-distance-field generator for computational fluid dynamics applications by Akshay Patil, Udhaya Chandiran Krishnan Paranjothi, Clara García-Sánchez

    Published 2025-05-01
    “…Performance benchmarks demonstrate the tool’s ability to handle large-scale 3D models (∼O(107) triangulation faces) and computational grid points ∼O(109) with high fidelity and reduced computational demands. …”
    Get full text
    Article
  2. 242

    MODERN APPROACH TO THE CHOICE OF ANESTHETIC MANAGEMENT DURING COMPUTED TOMOGRAPHY IN CHILDREN WITH CENTRAL NERVOUS PATOLOGY by Роман Васильевич Жданов, Евгений Валерьевич Григорьев, Василий Васильевич Жданов, Евгений Викторович Ивлев, Александр Владимирович Ушаков, Елена Эдуардовна Рубан

    Published 2017-06-01
    “…Thus, the analysis of domestic and foreign literature suggests that to date there is no clear choice of anesthetic technique algorithms during computed tomography in children. Although it is possible to use both intravenous anesthetic and inhalation applying last longer limited induction necessity presence anesthetist close to the patient and applying the mask on the face, which may put the computer head during imaging. …”
    Get full text
    Article
  3. 243
  4. 244

    PyNoetic: A modular python framework for no-code development of EEG brain-computer interfaces. by Gursimran Singh, Aviral Chharia, Rahul Upadhyay, Vinay Kumar, Luca Longo

    Published 2025-01-01
    “…Electroencephalography (EEG)-based Brain-Computer Interfaces (BCIs) have emerged as a transformative technology with applications spanning robotics, virtual reality, medicine, and rehabilitation. …”
    Get full text
    Article
  5. 245

    Physical property-aware multi-UAV spatial coordination for energy-efficient mobile edge computing by Fengling Huang, Xuqi Su, Quanbao Wang, Fusen Guo

    Published 2025-08-01
    “…In light of the problem’s inherent nonconvex structure and computational intractability, we introduce a collaborative multi-operator Differential Evolution (DE) variant algorithm with a semi-adaptive strategy, termed CSADE. …”
    Get full text
    Article
  6. 246

    Structural Parameter Identification Using Multi-Objective Modified Directional Bat Algorithm by LIU Li-jun, LIN Ying-hai, SU Yong-hui, LEI Ying

    Published 2025-01-01
    “…This approach improved the accuracy and robustness of structural parameter identification while maintaining computational efficiency.MethodsMOMDBA is an enhanced version of the Directional Bat Algorithm (DBA), a swarm intelligence optimization technique inspired by the echolocation behavior of bats. …”
    Get full text
    Article
  7. 247

    Training of the feed-forward artificial neural networks using butterfly optimization algorithm by Şaban Gülcü, Büşra Irmak

    Published 2021-12-01
    “…Researchers have proposed algorithms to train Multi-Layer Perceptron (MLP). However, classical techniques often face problems in solving this optimization problem. …”
    Get full text
    Article
  8. 248

    Redundant Node Scheduling Algorithm for Wireless Sensor Networks Based on Topology Structure by Lijuan Shi, jun zheng

    Published 2025-01-01
    “…In order to effectively regulate redundant nodes to balance node coverage and energy consumption in the network, the Ditian algorithm is introduced and initialized. The computation structure is reconstructed through adaptive adjustment, and the discrimination of redundant nodes is optimized. …”
    Get full text
    Article
  9. 249
  10. 250

    Small target detection in UAV view based on improved YOLOv8 algorithm by Xiaoli Zhang, Guocai Zuo

    Published 2025-01-01
    “…Abstract The main challenges faced when detecting targets captured by UAVs include small target image size, dense target distribution, and uneven category distribution.In addition, the hardware limitations of UAVs impose constraints on the size and complexity of the model, which may lead to poor detection accuracy of the model. …”
    Get full text
    Article
  11. 251

    Infrared spectrum target recognition and positioning technology based on image segmentation algorithm by Runming He, Yu Wang, Zhenzhong Yan, Xiaoli Lu

    Published 2025-07-01
    “…Abstract In the era of rapid development of digitalization and science and technology, infrared images are widely used in security, industry and other fields, but their target recognition and positioning face many difficulties. The existing image segmentation and recognition algorithms have low accuracy and large positioning errors when processing infrared images. …”
    Get full text
    Article
  12. 252
  13. 253

    Differentiated Backprojection Reconstruction Method for Square Cross-section Fielid-of-view Rotational Computed Laminography by Wuliang SHI, Xiang ZOU, Changyu CHEN, Yuxiang XING

    Published 2025-07-01
    “…To address the inspection plate-like objects, computed laminography (CL) has been developed by modifying the scanning geometry and reconstruction algorithms. …”
    Get full text
    Article
  14. 254

    Design of an Exam Cheating Detection System Application Based on Machine Learning with the Computer Vision Method by Andra Putra Hendrawan, Esti Wijayanti, Ahmad Abdul Chamid

    Published 2025-07-01
    “…The method used involves a Convolutional Neural Network (CNN) algorithm for participant face verification, pose estimation for motion analysis, and You Only Look Once (YOLO) for object detection. …”
    Get full text
    Article
  15. 255

    Federated Learning With Sailfish-Optimized Ensemble Models for Anomaly Detection in IoT Edge Computing Environment by Aravam Babu, A. Bagubali

    Published 2025-01-01
    “…The Internet of Things (IoT) has transformed cyber-physical systems by enabling seamless connectivity and automation. However, IoT devices face resource constraints, making anomaly detection challenging. …”
    Get full text
    Article
  16. 256

    Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security by Tara Nawzad Ahmad Al Attar, Rebaz Nawzad Mohammed

    Published 2025-04-01
    “…Of the schemes available in PQC, the strongest candidates appear to be lattice-based cryptography (LBC), which encompasses an ample security basis and good computation efficiency. However, practically implementing LBC is faced with key-generation and optimization difficulties, mainly because of its enormous key sizes and computational overhead. …”
    Get full text
    Article
  17. 257

    Pothole Detection and Assessment on Highways Using Enhanced YOLO Algorithm With Attention Mechanisms by Rufus Rubin, Chinnu Jacob, Sumod Sundar, Gabriel Stoian, Daniela Danciulescu, Jude Hemanth

    Published 2025-01-01
    “…However, road maintenance faces challenges due to limited funding and resources, with potholes posing significant safety risks. …”
    Get full text
    Article
  18. 258

    Efficient hardware error correction with hybrid on-offline configuration algorithm for optical processor by Zichao Zhao, Huihui Zhu, Qishen Liang, Haoran Ma, Ziyi Fu, Xingyi Jiang, Bei Chen, Yuehai Wang, Tian Chen, Yuzhi Shi, Jianyi Yang

    Published 2025-08-01
    “…These results underscore the viability and efficiency of the HOOC algorithm for scalable and robust PNN implementations, paving the way for scalable optical computing in artificial intelligence applications.…”
    Get full text
    Article
  19. 259

    Enhancing the Harrow-Hassidim-Lloyd (HHL) algorithm in systems with large condition numbers by Peniel Bertrand Tsemo, Akshaya Jayashankar, K. Sugisaki, Nishanth Baskaran, Sayan Chakraborty, V. S. Prasannaa

    Published 2025-06-01
    “…Although the Harrow-Hassidim-Lloyd (HHL) algorithm offers an exponential speedup in system size for treating linear equations of the form Ax[over ⃗]=b[over ⃗] on quantum computers when compared to their traditional counterparts, it faces a challenge related to the condition number (κ) scaling of the A matrix. …”
    Get full text
    Article
  20. 260

    An Infrared Small Target Detection Algorithm Utilizing Joint Local Contrast Measure by Qing Zhao, Jiawen Liao, Derui Zhang

    Published 2025-01-01
    “…A new fusion method is introduced to combine the three obtained saliency maps, followed by the separation of the target from the background using an adaptive thresholding algorithm. Experimental results indicate that the proposed algorithm demonstrates superior detection capability and robustness when facing complex conditions and low signal-to-clutter ratios, providing new insights for the development of infrared small target detection technology.…”
    Get full text
    Article