Showing 321 - 340 results of 1,299 for search 'face computational algorithms', query time: 0.12s Refine Results
  1. 321

    Advanced predictive disease modeling in biomedical IoT using the temporal adaptive neural evolutionary algorithm by Chandragandhi S, Arvind C, Srihari K

    Published 2025-07-01
    “…Accurate and efficient predictive disease modeling is crucial in biomedical IoT for early detection and intervention, yet existing models like LSTM and XGBoost face limitations in handling the complexity and temporal nature of health data streams. …”
    Get full text
    Article
  2. 322

    Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method by Behnam Seyedi, Octavian Postolache

    Published 2025-06-01
    “…The rapid growth of the Internet of Things (IoT) has revolutionized various industries by enabling interconnected devices to exchange data seamlessly. However, IoT systems face significant security challenges due to decentralized architectures, resource-constrained devices, and dynamic network environments. …”
    Get full text
    Article
  3. 323

    Distributed Photovoltaic Power Energy Generation Prediction Based on Improved Multi-objective Particle Algorithm by Yuanzheng Xiao, Huawei Hong, Feifei Chen, Xiaorui Qian, Ming Xu, Hanbin Ma

    Published 2025-03-01
    “…However, limitations include prediction accuracy under extreme weather and computational efficiency for large datasets. Future work will focus on broader applicability and more efficient algorithm variants. …”
    Get full text
    Article
  4. 324

    A Lightweight Algorithm for Detection and Grading of Olive Ripeness Based on Improved YOLOv11n by Fengwu Zhu, Suyu Wang, Min Liu, Weijie Wang, Weizhi Feng

    Published 2025-04-01
    “…Concurrently, existing deep learning-based detection models face issues such as insufficient feature extraction for small targets and difficulties in deployment due to their need for large numbers of parameters. …”
    Get full text
    Article
  5. 325

    Preoxygenation in difficult airway management: high-flow oxygenation by nasal cannula versus face mask (the PREOPTIDAM study). Protocol for a single-centre randomised study by Samir Jaber, Karim Asehnoune, Fanny Feuillet, Mickael Vourc’h, Donatien Huard, Gabrielle Baud, Arthur Guichoux, Marielle Surbled, Melanie Tissot, Anne Chiffoleau, Christophe Guitton

    Published 2019-04-01
    “…Using a two-sided t-test with a first species risk of 5% and 80% power, a total of 186 patients will be included. Using a computer-generated randomisation, with a 1:1 allocation ratio, patients will be randomised to HFNC or face mask preoxygenation. …”
    Get full text
    Article
  6. 326

    Optimizing Traffic Speed Prediction Using a Multi-Objective Genetic Algorithm-Enhanced RNN for Intelligent Transportation Systems by C. Swetha Priya, F. Sagayaraj Francis

    Published 2025-01-01
    “…Over the past decade, major cities have faced significant traffic congestion, accidents, and pollution due to increased vehicle usage, urbanization, and migration. …”
    Get full text
    Article
  7. 327
  8. 328
  9. 329
  10. 330

    Research on Reservoir History Matching Method Based on Real⁃Coded Genetic Algorithm and Connectivity Model by Ainiwaer AILIYAER, Chunli ZHAO, Feng LIU

    Published 2025-06-01
    “…As gradient⁃based methods face challenges in computing the gradient of the objective function, intelligent optimization algorithms with stochastic properties are widely applied in reservoir optimization processes. …”
    Get full text
    Article
  11. 331

    Numerical Recognition Algorithm for Power Equipment Monitoring Based on Light-Resnet Convolutional Neural Network by Zhiheng KONG, Chong TAN, Peiyao TANG, Chengbo HU, Min ZHENG

    Published 2024-08-01
    “…This approach, leveraging the allocation of computational resources for task distribution, introduces a Light-Resnet-based numerical recognition algorithm, which enhances network training through the optimization of the D-Add loss function, enabling remote reading of electrical equipment monitoring data. …”
    Get full text
    Article
  12. 332

    Research on APF-Dijkstra Path Planning Fusion Algorithm Based on Steering Model and Volume Constraints by Xizheng Wang, Gang Li, Zijian Bian

    Published 2025-07-01
    “…For the local oscillation phenomenon of the APF algorithm in the face of static U-shaped obstacles, the path cusp phenomenon caused by the vehicle corner and path curvature constraints is not taken into account, as well as the low path safety caused by ignoring the vehicle volume constraints. …”
    Get full text
    Article
  13. 333

    LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment by ZHANG Denghui, SHEN Shengshang, YAO Jiefeng, LI Mohan, LI Aiping

    Published 2025-04-01
    “…In recent years, face recognition and other biometric recognition technologies have been increasingly appearing in social life. …”
    Get full text
    Article
  14. 334

    Identification of Low‐Value Defects in Infrared Images of Porcelain Insulators Based on STCE‐YOLO Algorithm by Shaotong Pei, Weiqi Wang, Chenlong Hu, Keyu Li, Haichao Sun, Mianxiao Wu, Bo Lan

    Published 2025-07-01
    “…To solve the above problems, this paper optimizes the small target and complex environment problems in the low‐value defect recognition of insulator infrared images, and proposes the STCE‐YOLO algorithm: based on YOLOv8, the deformable large kernel attention is used to improve the detection ability of small targets; then the cross‐modal contextual feature module is applied to Integrate the features of different scales to reduce the computation of the model. …”
    Get full text
    Article
  15. 335
  16. 336

    Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li, Zheng Ju

    Published 2025-08-01
    “…However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. …”
    Get full text
    Article
  17. 337

    A multi-user multi-operator computing pricing method for Internet of things based on bi-level optimization by Wei Jiang, Huiqiang Wang, Bingyang Li, Haibin Lv, Qingchuan Meng

    Published 2020-01-01
    “…Therefore, the concept of edge cloud computing has been proposed, which enhances the computing capacity of Internet of things terminals by offloading user tasks to edge servers for computation. …”
    Get full text
    Article
  18. 338

    Fog Computing and Industry 4.0 for Newsvendor Inventory Model Using Attention Mechanism and Gated Recurrent Unit by Joaquin Gonzalez, Liliana Avelar Sosa, Gabriel Bravo, Oliverio Cruz-Mejia, Jose-Manuel Mejia-Muñoz

    Published 2024-06-01
    “…However, maintaining adequate inventory levels becomes challenging in the face of unpredictable demand patterns. Furthermore, the need to disseminate demand-related information throughout a company often relies on cloud services. …”
    Get full text
    Article
  19. 339

    Enhanced Robust Control of Induction Motor Using Combined Optimal Model Predictive Control With Super-Twisting Algorithm by REZGUI, S.-E., NEMOUCHI, B.

    Published 2025-06-01
    “…This synergetic approach ensures stable and efficient performance in the face of internal variations (like parameters variation) and external perturbations (variable references and load torque). …”
    Get full text
    Article
  20. 340

    Adaptive Policy-Oriented Cybersecurity: A Decentralized Framework Using Message Passing Algorithms for Dynamic Threat Mitigation by Spyridon Evangelatos, Eleni Veroni, Mariza Konidi, Sophia Karagiorgou, Georgia Dede, Anargyros Baklezos, Christos Nikolopoulos, Panagiotis Sarigiannidis, Sotirios K. Goudos

    Published 2025-01-01
    “…In the face of increasingly sophisticated and dynamic cyber threats, policy-based cybersecurity deployment has emerged as a critical strategy for securing modern, complex network infrastructures. …”
    Get full text
    Article