Showing 541 - 560 results of 1,299 for search 'face computational algorithms', query time: 0.13s Refine Results
  1. 541

    An Improved YOLOv8-XGBoost load rapid identification method based on multi-feature fusion by JianYuan Wang, Long Cheng

    Published 2025-05-01
    “…Existing non-intrusive load monitoring (NILM) approaches face challenges including limited identification accuracy, computationally intensive architectures, and constrained generalization performance. …”
    Get full text
    Article
  2. 542
  3. 543

    A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture by Rui Lu, Lei Shi, Yinlong Liu, Zhongkai Dang

    Published 2025-05-01
    “…This study designs a progressive solution by (1) building a crowdsourced data collection network, using mobile terminals equipped with GPS technology to automatically collect device signal features, replacing inefficient manual drive tests; (2) developing a progressive signal update algorithm that integrates real-time crowdsourced data and historical signals to optimize the signal fingerprint database in dynamic environments; (3) establishing an edge service architecture to offload signal matching and trajectory estimation tasks to MEC nodes, using lightweight computing engines to reduce the load on the core network. …”
    Get full text
    Article
  4. 544
  5. 545
  6. 546

    High-resolution image inpainting using a probabilistic framework for diverse images with large arbitrary masks by G. Sumathi, M. Uma Devi

    Published 2025-07-01
    “…The priors are constructed using cosine similarity, mean, and intensity, where intensity is computed using the improved Papoulis–Gerchberg algorithm. …”
    Get full text
    Article
  7. 547

    Two-layer optimization model of distribution network line loss considering the uncertainty of new energy access by Xiping Ma, Xiping Ma, Xiaoyang Dong, Haitao Xiao, Yaxin Li, Rui Xu, Kai Wei, Juanjuan Cai, Juan Wei

    Published 2025-01-01
    “…Moreover, existing distribution network optimization methods face high computational complexity, low efficiency, and susceptibility to local optima. …”
    Get full text
    Article
  8. 548

    Improved mapping of highland bamboo forests using Sentinel-2 time series and machine learning in Google Earth Engine by Dagnew Yebeyen, Binyam Tesfaw Hailu, Worku Zewdie, Temesgen Abera, Gudeta W. Sileshi, Melaku Getachew, Sileshi Nemomissa

    Published 2024-01-01
    “…Recent advances in the application of spectral bands from satellite observations and machine learning algorithms (MLA) in the Google Earth Engine (GEE) cloud-computing platform have been demonstrated to enhance the accuracy of mapping forest resources. …”
    Get full text
    Article
  9. 549
  10. 550
  11. 551

    Enhancing the e-commerce shopping experience with IoT-enabled smart carts in smart stores by Jian Wang

    Published 2025-04-01
    “…The findings demonstrate that the proposed IoT-enabled model efficiently balances classification tasks, reduces congestion during algorithm execution, and minimizes energy waste. This research highlights the significance of integrating IoT with cloud and fog computing frameworks to enhance the efficiency and customer experience in retail environments.…”
    Get full text
    Article
  12. 552
  13. 553
  14. 554

    Advanced tooth profile roughing system (Innovating gear skiving with diamond-shaped edge tools) by Hiroki YONEZAWA, Jun’ichi KANEKO, Takeyuki ABE, Akihiro NAKAZATO

    Published 2024-11-01
    “…In response, this study endeavors to develop Computer-Aided Manufacturing (CAM) algorithms capable of facilitating the rough machining of various tooth profiles with a single skiving tool in gear skiving process. …”
    Get full text
    Article
  15. 555
  16. 556

    High-performance reconfigurable encryption scheme for distributed storage by Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG

    Published 2023-10-01
    “…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
    Get full text
    Article
  17. 557

    A Novel Method for Inverting Deep-Sea Sound-Speed Profiles Based on Hybrid Data Fusion Combined with Surface Sound Speed by Qiang Yuan, Weiming Xu, Shaohua Jin, Xiaohan Yu, Xiaodong Ma, Tong Sun

    Published 2025-04-01
    “…The dynamic selection of the first six EOF modes balances computational efficiency and reconstruction fidelity. …”
    Get full text
    Article
  18. 558

    Research on dynamic prediction and optimization of high altitude photovoltaic power generation efficiency using GVSAO-CNN Model under 8-climate modes by Xiaoming Xiong, Heng Hu, Qiangfu Jia, Rongjian Zhang, Chongan Huang, Qingyuan Lu

    Published 2025-06-01
    “…Abstract In the face of mounting global energy demands and increasing environmental pressures, the transition to clean energy sources, such as photovoltaic (PV) power generation, is imperative. …”
    Get full text
    Article
  19. 559

    Sustainable phytoprotection: a smart monitoring and recommendation framework using Puma Optimization for potato pathogen detection by Amal H. Alharbi, Faris H. Rizk, Khaled Sh. Gaber, Marwa M. Eid, Marwa M. Eid, El-Sayed M. El-kenawy, El-Sayed M. El-kenawy, Pushan Kumar Dutta, Doaa Sami Khafaga

    Published 2025-08-01
    “…Ensuring sustainable and resilient agricultural systems in the face of intensifying crop disease threats requires intelligent, data-driven tools for early detection and intervention. …”
    Get full text
    Article
  20. 560