Showing 281 - 300 results of 1,299 for search 'face computational algorithms', query time: 0.11s Refine Results
  1. 281

    TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security by Ryozo Masukawa, Sanggeon Yun, Sungheon Jeong, Nathaniel D. Bastian, Mohsen Imani

    Published 2025-01-01
    “…This paper presents TriageHD, a novel framework that integrates graph-based Hyper-Dimensional Computing (HDC) with a learning-to-rank algorithm to strengthen zero-trust network security. …”
    Get full text
    Article
  2. 282
  3. 283

    Eye Movement Tracking Using Opencv Python by mohammed satar, Basim Alshammari, Hayder Jasim

    Published 2023-08-01
    “…Several methods are being used right now. Show parts of the face, like the eyes or the whole face. For this reason, open-source libraries like OpenCV enable high-level programming to implement reliable and accurate detection algorithms like Haar Cascade. …”
    Get full text
    Article
  4. 284

    Advancements in Hyperspectral Imaging and Computer-Aided Diagnostic Methods for the Enhanced Detection and Diagnosis of Head and Neck Cancer by I-Chen Wu, Yen-Chun Chen, Riya Karmakar, Arvind Mukundan, Gahiga Gabriel, Chih-Chiang Wang, Hsiang-Chen Wang

    Published 2024-10-01
    “…Conventional diagnostic approaches often face challenges in terms of achieving early detection and accurate diagnosis. …”
    Get full text
    Article
  5. 285

    Enhancing Multi-Key Fully Homomorphic Encryption with Efficient Key Switching and Batched Multi-Hop Computations by Liang Zhou, Ruwei Huang, Bingbing Wang

    Published 2025-05-01
    “…Our approach eliminates the need for an auxiliary Gentry-Sahai-Waters (GSW)-type scheme, simplifying the design and significantly reducing the public key size. We propose novel algorithms for evaluation key generation and key switching that simplify the computation while allowing each party to independently precompute and share its evaluation keys, thereby reducing both computational overhead and storage costs. …”
    Get full text
    Article
  6. 286
  7. 287

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…The rapid devolopment of Internet of Vehicles (IoV) and Autonomous Connected Vehicles (ACVs) has increased the complexity of in-vehicle networks, exposing security vulnerabilities in traditional Controller Area Network (CAN) systems. CAN security faces dual challenges: stringent computational constraints imposed by automotive functional safety requirements and the impracticality of protocol modifications in multi-device networks. …”
    Get full text
    Article
  8. 288

    Reference coordinate based Chan algorithm for UWB personnel localization in underground coal mines by Zhipeng Li, Zecheng Li

    Published 2025-05-01
    “…To address this, we propose the Chan Based on Reference Coordinate (CBORF) algorithm, which integrates dynamic error compensation and adaptive parameter tuning to achieve centimeter-level accuracy with minimal computational overhead. …”
    Get full text
    Article
  9. 289
  10. 290

    Ecological modelling: A computational analysis of air pollution discourses in English print media of India and Pakistan. by Sana Rabbani, Fasih Ahmed

    Published 2025-01-01
    “…The study applied Latent Dirichlet Allocation (LDA), a robust algorithm for analyzing the large text corpus. The study underpinned Computational Grounded Theory, which relies on the fact that computation is a way to reveal the hidden meanings beyond the text. …”
    Get full text
    Article
  11. 291

    Multi-user joint task offloading and resource allocation based on mobile edge computing in mining scenarios by Siqi Li, Weidong Li, Wanbo Zheng, Yunni Xia, Kunyin Guo, Qinglan Peng, Xu Li, Jiaxin Ren

    Published 2025-05-01
    “…However, due to the surge in network traffic and the limited availability of computational resources, these terminal devices face challenges in meeting high-performance requirements such as low transmission latency and low energy consumption. …”
    Get full text
    Article
  12. 292

    A High-Accuracy Underwater Object Detection Algorithm for Synthetic Aperture Sonar Images by Jiahui Su, Deyin Xu, Lu Qiu, Zhiping Xu, Lixiong Lin, Jiachun Zheng

    Published 2025-06-01
    “…Compared with YOLOv8s, the proposed HAUOD algorithm can achieve <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>6.2</mn><mo>%</mo></mrow></semantics></math></inline-formula> higher accuracy with only <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>50.4</mn><mo>%</mo></mrow></semantics></math></inline-formula> model size, and reduce the computational complexity by half. …”
    Get full text
    Article
  13. 293

    Algorithm for Solving Distributed Workshop Scheduling Model Based on Order Constraints and Assembly Constraints by Tingting Qu

    Published 2025-01-01
    “…For this model, an improved greedy algorithm was combined to solve it, and particle swarm optimization algorithm was introduced to enhance the local and global search capabilities of the distributed scheduling system, effectively addressing the computational complexity in large-scale production environments. …”
    Get full text
    Article
  14. 294

    Research on a New Maximum Power Tracking Algorithm for Photovoltaic Power Generation Systems by Lei Shi, Zongyu Zhang, Yongrui Yu, Chun Xie, Tongbin Yang

    Published 2024-11-01
    “…RESULTS: Compared to existing methods, the proposed AC-BESO algorithm stands out for its simplicity in implementation and reduced computational complexity. …”
    Get full text
    Article
  15. 295
  16. 296
  17. 297

    Enhanced Search Spring Algorithm for Green Agri-Food Supply Chain Network Design by Xiaoya Hu

    Published 2025-01-01
    “…In light of these challenges, this study presents a new Enhanced Search Spring Algorithm (ESSA), which optimizes GASCN by minimizing total transportation costs and is characterized by improved solution quality and computational efficiency. …”
    Get full text
    Article
  18. 298

    Genetic Artificial Hummingbird Algorithm-Support Vector Machine for Timely Power Theft Detection by Emmanuel Gbafore, Davies Rene Segera, Cosmas Raymond Mutugi Kiruki

    Published 2024-01-01
    “…Utilities face serious obstacles from power theft, which calls for creative ways to maintain income and improve operational effectiveness. …”
    Get full text
    Article
  19. 299

    Advances in Video Emotion Recognition: Challenges and Trends by Yun Yi, Yunkang Zhou, Tinghua Wang, Jin Zhou

    Published 2025-06-01
    “…Video emotion recognition (VER), situated at the convergence of affective computing and computer vision, aims to predict the primary emotion evoked in most viewers through video content, with extensive applications in video recommendation, human–computer interaction, and intelligent education. …”
    Get full text
    Article
  20. 300

    A semi-automated algorithm for designing stellarator divertor and limiter plates and application to HSX by Robert Davies, Yuhe Feng, Dieter Boeyaert, John C. Schmitt, Michael J. Gerard, Kelly A. Garcia, Oliver Schmitz, Benedikt Geiger, Sophia A. Henneberg

    Published 2024-01-01
    “…Starting from the current machine with an extended vessel wall, we construct plates which are able to effectively catch and spread the heat for three different magnetic configurations. The scheme has a computational cost in the order of tens of CPU-minutes, making it a powerful tool for semi-automated plasma-facing component design in three-dimensional environments.…”
    Get full text
    Article