Showing 741 - 760 results of 1,299 for search 'face computational algorithms', query time: 0.12s Refine Results
  1. 741

    Accelerated Adoption of Google Earth Engine for Mangrove Monitoring: A Global Review by K. M. Ashraful Islam, Paulo Murillo-Sandoval, Eric Bullock, Robert Kennedy

    Published 2025-07-01
    “…Traditional remote sensing workflows often struggle with large data volumes, complex preprocessing, and limited computational resources. Google Earth Engine (GEE) addresses these challenges through scalable, cloud-based computation, extensive, preprocessed imagery catalogs, built-in algorithms for rapid feature engineering, and collaborative script sharing that improves reproducibility. …”
    Get full text
    Article
  2. 742

    A human pose estimation network based on YOLOv8 framework with efficient multi-scale receptive field and expanded feature pyramid network by Shaobin Cai, Han Xu, Wanchen Cai, Yuchang Mo, Liansuo Wei

    Published 2025-05-01
    “…Therefore, EE-YOLOv8 achieves the highest accuracy while maintaining the lowest parameter count and computational complexity among all analyzed algorithms. …”
    Get full text
    Article
  3. 743

    A novel approach to pseudorandom number generation using Hamiltonian conservative chaotic systems by Vinod Patidar, Tanu Singh

    Published 2025-03-01
    “…High-quality random number generators are required for various applications such as cryptography, secure communications, Monte Carlo simulations, and randomized algorithms. Existing pseudorandom number generators (PRNGs) face limitations such as periodic behavior, dependence on high-quality entropy sources, or computational inefficiency. …”
    Get full text
    Article
  4. 744

    Analyzing Decadal Trends of Vegetation Cover in Djibouti Using Landsat and Open Data Cube by Julee Wardle, Zachary Phillips

    Published 2025-01-01
    “…Studies on change detection have advanced the field through exploring Landsat time series and diverse algorithms, but face limitations in handling data inconsistencies, integrating methods, and addressing practical and socio-environmental challenges. …”
    Get full text
    Article
  5. 745

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. …”
    Get full text
    Article
  6. 746
  7. 747

    Learning-based parallel acceleration for HaplotypeCaller by Xiangxing Lai, Minguang Xiao, Lingling Weng, Zhiguang Chen

    Published 2025-08-01
    “…This paper introduces a learning-based framework LPA (learning-based parallel acceleration), leveraging model to accurately predict the computational complexity of data. By employing adaptive data segmentation algorithms and Multi-Knapsack Problem (MKP) based task scheduling, LPA significantly alleviates computational skew. …”
    Get full text
    Article
  8. 748

    THE ACCEPTANCE OF AN EDUCATIONAL INTEGRATED DEVELOPMENT ENVIRONMENT TO LEARN PROGRAMMING FUNDAMENTALS by Nor Farahwahida Mohd Noor, Aslina Saad, Abu Bakar Ibrahim, Norashady Mohd Noor

    Published 2023-02-01
    “…However, previous research shows that students face difficulties in learning programming due to its abstract concepts. …”
    Get full text
    Article
  9. 749

    Optimal Configuration of Distributed Energy Storage in Distribution Networks Based on Moment Difference Analysis by Donglei SUN, Yao WANG, Huiwen ZHANG, Rui LIU, Bingke SHI

    Published 2023-12-01
    “…An example of IEEE 33 node distribution system shows that compared with traditional intelligent optimization algorithms, the proposed method can directly determine the installation location of energy storage, which has high computational efficiency, accurate calculation results and strong engineering practicability.…”
    Get full text
    Article
  10. 750

    Research on Mine-Personnel Helmet Detection Based on Multi-Strategy-Improved YOLOv11 by Lei Zhang, Zhipeng Sun, Hongjing Tao, Meng Wang, Weixun Yi

    Published 2024-12-01
    “…In the complex environment of fully mechanized mining faces, the current object detection algorithms face significant challenges in achieving optimal accuracy and real-time detection of mine personnel and safety helmets. …”
    Get full text
    Article
  11. 751

    A secure medical image encryption technique based on DNA cryptography with elliptic curves by V. N. Senthil Kumaran, T. Manikandan, Rajesh Kumar Dhanaraj, Taher Al-Shehari, Nasser A. Alsadhan, Shitharth Selvarajan

    Published 2025-06-01
    “…Existing encryption techniques often face limitations such as high computational complexity, insufficient security against advanced cryptographic attacks, poor reversal and pixel correlation. …”
    Get full text
    Article
  12. 752

    A hybrid super learner ensemble for phishing detection on mobile devices by Routhu Srinivasa Rao, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Bumshik Lee

    Published 2025-05-01
    “…Furthermore, many of these techniques are unsuitable for mobile devices, which face additional constraints, such as limited RAM, smaller screen sizes, and lower computational power. …”
    Get full text
    Article
  13. 753

    Innovative IoT-enabled mask detection system: A hybrid deep learning approach for public health applications by Parul Dubey, Vinay Keswani, Pushkar Dubey, Gunjan Keswani, Dhananjay Bhagat

    Published 2025-06-01
    “…The proposed framework integrates ResNet50 and MobileNetV2 architectures, optimized using the Adaptive Flame-Sailfish Optimization (AFSO) algorithm. This hybrid approach enhances detection accuracy and computational efficiency, making it suitable for real-time deployment. …”
    Get full text
    Article
  14. 754

    Performance Evaluating of Honeyword Generation Methods: Traditional versus AI by Shahad Abdulkhalik Alkazzaz, Saja Jasim Mohammed

    Published 2025-03-01
    “…As the number of people using computers has increased, the risks to digital systems have increased too. …”
    Get full text
    Article
  15. 755

    Research on Lightweighting Methods for 3D Building Models Based on Semantic Constraints by J. Wu, T. Shen, L. Huo

    Published 2025-08-01
    “…In the transition from LOD3 to LOD2, a face merging algorithm is employed to analyze the semantic consistency of adjacent faces, ensuring that only semantically consistent faces are merged, thus generating an LOD2 model with semantic integrity. …”
    Get full text
    Article
  16. 756

    Adaptive Anomaly Detection Framework Model Objects in Cyberspace by Hasan Alkahtani, Theyazn H. H. Aldhyani, Mohammed Al-Yaari

    Published 2020-01-01
    “…Hence, network security represents one of the biggest serious challenges that can be faced by network security communities. Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. …”
    Get full text
    Article
  17. 757
  18. 758

    MRD: A Linear-Complexity Encoder for Real-Time Vehicle Detection by Kaijie Li, Xiaoci Huang

    Published 2025-05-01
    “…While visual transformer-based detection architectures have demonstrated performance breakthroughs through enhanced perceptual capabilities, establishing themselves as the dominant paradigm in this domain, their practical implementation faces critical challenges due to the quadratic computational complexity inherent in the self-attention mechanism, which imposes prohibitive computational overhead. …”
    Get full text
    Article
  19. 759
  20. 760