Showing 461 - 480 results of 1,299 for search 'face computational algorithms', query time: 0.12s Refine Results
  1. 461
  2. 462
  3. 463

    A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks by T. Saranya, S. Indra Priyadharshini

    Published 2025-01-01
    “…Intrusion Detection Systems (IDS) face significant challenges in detecting cyber threats due to highly imbalanced datasets, high-dimensional feature spaces, and computational inefficiencies. …”
    Get full text
    Article
  4. 464

    An intelligent partial charging navigation strategy for electric vehicles by Jinsheng Xiao, Bang Sun, Xun Gao, Hua Yang, Liyuan Wang

    Published 2025-05-01
    “…Employing an improved genetic algorithm for route planning, our method demonstrates a dual advantage – reducing computational complexity and saving an average of 15% in travel time. …”
    Get full text
    Article
  5. 465

    Blockchain covert communication scheme based on the cover of normal transactions by Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG

    Published 2022-08-01
    “…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
    Get full text
    Article
  6. 466
  7. 467

    Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts by Xin Liu, Huize Gao, Dan Luo, Lanying Liang, Lu Peng, Yuchen Zhang, Shijie Jia, Gang Xu, Xiubo Chen, Baohua Zhang, Yu Gu

    Published 2025-07-01
    “…However, the demand for multi-party data joint analysis within these contracts faces challenges of privacy leakage and malicious deception. …”
    Get full text
    Article
  8. 468
  9. 469
  10. 470
  11. 471
  12. 472

    Les machines y voient-elles quelque chose ? by Denis Bonnay

    Published 2021-12-01
    “…Computer vision is one of AI’s most successful fields. …”
    Get full text
    Article
  13. 473
  14. 474
  15. 475

    Evaluation method of e-government audit information based on big data analysis by Jingui He, Hansi Ya

    Published 2025-12-01
    “…Furthermore, a parallel PSO-RF algorithm combining Particle Swarm Optimization (PSO) and Random Forest (RF) is designed to enhance classification performance and computational efficiency. …”
    Get full text
    Article
  16. 476

    Optimization of Composite Sandwich Structures: A Review by Muhammad Ali Sadiq, György Kovács

    Published 2025-06-01
    “…Various optimization procedures, single- and multi-objective algorithms, Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), and Machine Learning (ML)-based optimization frameworks, as well as Finite Element (FE)-based numerical simulations, are discussed in detail. …”
    Get full text
    Article
  17. 477

    Optimizing Bifacial Solar Modules with Trackers: Advanced Temperature Prediction Through Symbolic Regression by Fabian Alonso Lara-Vargas, Carlos Vargas-Salgado, Jesus Águila-León, Dácil Díaz-Bello

    Published 2025-04-01
    “…Accurate temperature prediction in bifacial photovoltaic (PV) modules is critical for optimizing solar energy systems. Conventional models face challenges to balance accuracy, interpretability, and computational efficiency. …”
    Get full text
    Article
  18. 478

    Survey of federated learning research by Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE

    Published 2021-10-01
    “…Federated learning has rapidly become a research hotspot in the field of security machine learning in recent years because it can train the global optimal model collaboratively without the need for multiple data source aggregation.Firstly, the federated learning framework, algorithm principle and classification were summarized.Then, the main threats and challenges it faced, were analysed indepth the comparative analysis of typical research programs in the three directions of communication efficiency, privacy and security, trust and incentive mechanism was focused on, and their advantages and disadvantages were pointed out.Finally, Combined with application of edge computing, blockchain, 5G and other emerging technologies to federated learning, its future development prospects and research hotspots was prospected.…”
    Get full text
    Article
  19. 479
  20. 480