-
281
TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security
Published 2025-01-01“…This paper presents TriageHD, a novel framework that integrates graph-based Hyper-Dimensional Computing (HDC) with a learning-to-rank algorithm to strengthen zero-trust network security. …”
Get full text
Article -
282
Scatter Search for Optimal Sizing of a Hybrid Renewable Energy System for Scheduling Green Hydrogen Production
Published 2024-12-01“…In this paper, the problem is faced with a novel implementation of this method. …”
Get full text
Article -
283
Eye Movement Tracking Using Opencv Python
Published 2023-08-01“…Several methods are being used right now. Show parts of the face, like the eyes or the whole face. For this reason, open-source libraries like OpenCV enable high-level programming to implement reliable and accurate detection algorithms like Haar Cascade. …”
Get full text
Article -
284
Advancements in Hyperspectral Imaging and Computer-Aided Diagnostic Methods for the Enhanced Detection and Diagnosis of Head and Neck Cancer
Published 2024-10-01“…Conventional diagnostic approaches often face challenges in terms of achieving early detection and accurate diagnosis. …”
Get full text
Article -
285
Enhancing Multi-Key Fully Homomorphic Encryption with Efficient Key Switching and Batched Multi-Hop Computations
Published 2025-05-01“…Our approach eliminates the need for an auxiliary Gentry-Sahai-Waters (GSW)-type scheme, simplifying the design and significantly reducing the public key size. We propose novel algorithms for evaluation key generation and key switching that simplify the computation while allowing each party to independently precompute and share its evaluation keys, thereby reducing both computational overhead and storage costs. …”
Get full text
Article -
286
Optimization of deep learning architecture based on multi-path convolutional neural network algorithm
Published 2025-06-01Get full text
Article -
287
Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs
Published 2025-06-01“…The rapid devolopment of Internet of Vehicles (IoV) and Autonomous Connected Vehicles (ACVs) has increased the complexity of in-vehicle networks, exposing security vulnerabilities in traditional Controller Area Network (CAN) systems. CAN security faces dual challenges: stringent computational constraints imposed by automotive functional safety requirements and the impracticality of protocol modifications in multi-device networks. …”
Get full text
Article -
288
Reference coordinate based Chan algorithm for UWB personnel localization in underground coal mines
Published 2025-05-01“…To address this, we propose the Chan Based on Reference Coordinate (CBORF) algorithm, which integrates dynamic error compensation and adaptive parameter tuning to achieve centimeter-level accuracy with minimal computational overhead. …”
Get full text
Article -
289
Predicting the Matching Possibility of Online Dating Youths Using Novel Machine Learning Algorithm
Published 2024-06-01Get full text
Article -
290
Ecological modelling: A computational analysis of air pollution discourses in English print media of India and Pakistan.
Published 2025-01-01“…The study applied Latent Dirichlet Allocation (LDA), a robust algorithm for analyzing the large text corpus. The study underpinned Computational Grounded Theory, which relies on the fact that computation is a way to reveal the hidden meanings beyond the text. …”
Get full text
Article -
291
Multi-user joint task offloading and resource allocation based on mobile edge computing in mining scenarios
Published 2025-05-01“…However, due to the surge in network traffic and the limited availability of computational resources, these terminal devices face challenges in meeting high-performance requirements such as low transmission latency and low energy consumption. …”
Get full text
Article -
292
A High-Accuracy Underwater Object Detection Algorithm for Synthetic Aperture Sonar Images
Published 2025-06-01“…Compared with YOLOv8s, the proposed HAUOD algorithm can achieve <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>6.2</mn><mo>%</mo></mrow></semantics></math></inline-formula> higher accuracy with only <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>50.4</mn><mo>%</mo></mrow></semantics></math></inline-formula> model size, and reduce the computational complexity by half. …”
Get full text
Article -
293
Algorithm for Solving Distributed Workshop Scheduling Model Based on Order Constraints and Assembly Constraints
Published 2025-01-01“…For this model, an improved greedy algorithm was combined to solve it, and particle swarm optimization algorithm was introduced to enhance the local and global search capabilities of the distributed scheduling system, effectively addressing the computational complexity in large-scale production environments. …”
Get full text
Article -
294
Research on a New Maximum Power Tracking Algorithm for Photovoltaic Power Generation Systems
Published 2024-11-01“…RESULTS: Compared to existing methods, the proposed AC-BESO algorithm stands out for its simplicity in implementation and reduced computational complexity. …”
Get full text
Article -
295
A Small Object Detection Algorithm Integrated with ReFPN and Compound Attention Mechanism
Published 2022-04-01Get full text
Article -
296
-
297
Enhanced Search Spring Algorithm for Green Agri-Food Supply Chain Network Design
Published 2025-01-01“…In light of these challenges, this study presents a new Enhanced Search Spring Algorithm (ESSA), which optimizes GASCN by minimizing total transportation costs and is characterized by improved solution quality and computational efficiency. …”
Get full text
Article -
298
Genetic Artificial Hummingbird Algorithm-Support Vector Machine for Timely Power Theft Detection
Published 2024-01-01“…Utilities face serious obstacles from power theft, which calls for creative ways to maintain income and improve operational effectiveness. …”
Get full text
Article -
299
Advances in Video Emotion Recognition: Challenges and Trends
Published 2025-06-01“…Video emotion recognition (VER), situated at the convergence of affective computing and computer vision, aims to predict the primary emotion evoked in most viewers through video content, with extensive applications in video recommendation, human–computer interaction, and intelligent education. …”
Get full text
Article -
300
A semi-automated algorithm for designing stellarator divertor and limiter plates and application to HSX
Published 2024-01-01“…Starting from the current machine with an extended vessel wall, we construct plates which are able to effectively catch and spread the heat for three different magnetic configurations. The scheme has a computational cost in the order of tens of CPU-minutes, making it a powerful tool for semi-automated plasma-facing component design in three-dimensional environments.…”
Get full text
Article