-
241
GenSDF: An MPI-Fortran based signed-distance-field generator for computational fluid dynamics applications
Published 2025-05-01“…Performance benchmarks demonstrate the tool’s ability to handle large-scale 3D models (∼O(107) triangulation faces) and computational grid points ∼O(109) with high fidelity and reduced computational demands. …”
Get full text
Article -
242
MODERN APPROACH TO THE CHOICE OF ANESTHETIC MANAGEMENT DURING COMPUTED TOMOGRAPHY IN CHILDREN WITH CENTRAL NERVOUS PATOLOGY
Published 2017-06-01“…Thus, the analysis of domestic and foreign literature suggests that to date there is no clear choice of anesthetic technique algorithms during computed tomography in children. Although it is possible to use both intravenous anesthetic and inhalation applying last longer limited induction necessity presence anesthetist close to the patient and applying the mask on the face, which may put the computer head during imaging. …”
Get full text
Article -
243
Point'n Move: Interactive scene object manipulation on Gaussian splatting radiance fields
Published 2024-10-01Get full text
Article -
244
PyNoetic: A modular python framework for no-code development of EEG brain-computer interfaces.
Published 2025-01-01“…Electroencephalography (EEG)-based Brain-Computer Interfaces (BCIs) have emerged as a transformative technology with applications spanning robotics, virtual reality, medicine, and rehabilitation. …”
Get full text
Article -
245
Physical property-aware multi-UAV spatial coordination for energy-efficient mobile edge computing
Published 2025-08-01“…In light of the problem’s inherent nonconvex structure and computational intractability, we introduce a collaborative multi-operator Differential Evolution (DE) variant algorithm with a semi-adaptive strategy, termed CSADE. …”
Get full text
Article -
246
Structural Parameter Identification Using Multi-Objective Modified Directional Bat Algorithm
Published 2025-01-01“…This approach improved the accuracy and robustness of structural parameter identification while maintaining computational efficiency.MethodsMOMDBA is an enhanced version of the Directional Bat Algorithm (DBA), a swarm intelligence optimization technique inspired by the echolocation behavior of bats. …”
Get full text
Article -
247
Training of the feed-forward artificial neural networks using butterfly optimization algorithm
Published 2021-12-01“…Researchers have proposed algorithms to train Multi-Layer Perceptron (MLP). However, classical techniques often face problems in solving this optimization problem. …”
Get full text
Article -
248
Redundant Node Scheduling Algorithm for Wireless Sensor Networks Based on Topology Structure
Published 2025-01-01“…In order to effectively regulate redundant nodes to balance node coverage and energy consumption in the network, the Ditian algorithm is introduced and initialized. The computation structure is reconstructed through adaptive adjustment, and the discrimination of redundant nodes is optimized. …”
Get full text
Article -
249
UAV object tracking algorithm based on spatial saliency-aware correlation filter
Published 2025-03-01Get full text
Article -
250
Small target detection in UAV view based on improved YOLOv8 algorithm
Published 2025-01-01“…Abstract The main challenges faced when detecting targets captured by UAVs include small target image size, dense target distribution, and uneven category distribution.In addition, the hardware limitations of UAVs impose constraints on the size and complexity of the model, which may lead to poor detection accuracy of the model. …”
Get full text
Article -
251
Infrared spectrum target recognition and positioning technology based on image segmentation algorithm
Published 2025-07-01“…Abstract In the era of rapid development of digitalization and science and technology, infrared images are widely used in security, industry and other fields, but their target recognition and positioning face many difficulties. The existing image segmentation and recognition algorithms have low accuracy and large positioning errors when processing infrared images. …”
Get full text
Article -
252
Situation Awareness and Tracking Algorithm for Countering Low-Altitude Swarm Target Threats
Published 2025-03-01Get full text
Article -
253
Differentiated Backprojection Reconstruction Method for Square Cross-section Fielid-of-view Rotational Computed Laminography
Published 2025-07-01“…To address the inspection plate-like objects, computed laminography (CL) has been developed by modifying the scanning geometry and reconstruction algorithms. …”
Get full text
Article -
254
Design of an Exam Cheating Detection System Application Based on Machine Learning with the Computer Vision Method
Published 2025-07-01“…The method used involves a Convolutional Neural Network (CNN) algorithm for participant face verification, pose estimation for motion analysis, and You Only Look Once (YOLO) for object detection. …”
Get full text
Article -
255
Federated Learning With Sailfish-Optimized Ensemble Models for Anomaly Detection in IoT Edge Computing Environment
Published 2025-01-01“…The Internet of Things (IoT) has transformed cyber-physical systems by enabling seamless connectivity and automation. However, IoT devices face resource constraints, making anomaly detection challenging. …”
Get full text
Article -
256
Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security
Published 2025-04-01“…Of the schemes available in PQC, the strongest candidates appear to be lattice-based cryptography (LBC), which encompasses an ample security basis and good computation efficiency. However, practically implementing LBC is faced with key-generation and optimization difficulties, mainly because of its enormous key sizes and computational overhead. …”
Get full text
Article -
257
Pothole Detection and Assessment on Highways Using Enhanced YOLO Algorithm With Attention Mechanisms
Published 2025-01-01“…However, road maintenance faces challenges due to limited funding and resources, with potholes posing significant safety risks. …”
Get full text
Article -
258
Efficient hardware error correction with hybrid on-offline configuration algorithm for optical processor
Published 2025-08-01“…These results underscore the viability and efficiency of the HOOC algorithm for scalable and robust PNN implementations, paving the way for scalable optical computing in artificial intelligence applications.…”
Get full text
Article -
259
Enhancing the Harrow-Hassidim-Lloyd (HHL) algorithm in systems with large condition numbers
Published 2025-06-01“…Although the Harrow-Hassidim-Lloyd (HHL) algorithm offers an exponential speedup in system size for treating linear equations of the form Ax[over ⃗]=b[over ⃗] on quantum computers when compared to their traditional counterparts, it faces a challenge related to the condition number (κ) scaling of the A matrix. …”
Get full text
Article -
260
An Infrared Small Target Detection Algorithm Utilizing Joint Local Contrast Measure
Published 2025-01-01“…A new fusion method is introduced to combine the three obtained saliency maps, followed by the separation of the target from the background using an adaptive thresholding algorithm. Experimental results indicate that the proposed algorithm demonstrates superior detection capability and robustness when facing complex conditions and low signal-to-clutter ratios, providing new insights for the development of infrared small target detection technology.…”
Get full text
Article