-
741
Accelerated Adoption of Google Earth Engine for Mangrove Monitoring: A Global Review
Published 2025-07-01“…Traditional remote sensing workflows often struggle with large data volumes, complex preprocessing, and limited computational resources. Google Earth Engine (GEE) addresses these challenges through scalable, cloud-based computation, extensive, preprocessed imagery catalogs, built-in algorithms for rapid feature engineering, and collaborative script sharing that improves reproducibility. …”
Get full text
Article -
742
A human pose estimation network based on YOLOv8 framework with efficient multi-scale receptive field and expanded feature pyramid network
Published 2025-05-01“…Therefore, EE-YOLOv8 achieves the highest accuracy while maintaining the lowest parameter count and computational complexity among all analyzed algorithms. …”
Get full text
Article -
743
A novel approach to pseudorandom number generation using Hamiltonian conservative chaotic systems
Published 2025-03-01“…High-quality random number generators are required for various applications such as cryptography, secure communications, Monte Carlo simulations, and randomized algorithms. Existing pseudorandom number generators (PRNGs) face limitations such as periodic behavior, dependence on high-quality entropy sources, or computational inefficiency. …”
Get full text
Article -
744
Analyzing Decadal Trends of Vegetation Cover in Djibouti Using Landsat and Open Data Cube
Published 2025-01-01“…Studies on change detection have advanced the field through exploring Landsat time series and diverse algorithms, but face limitations in handling data inconsistencies, integrating methods, and addressing practical and socio-environmental challenges. …”
Get full text
Article -
745
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. …”
Get full text
Article -
746
Single Image Super-Resolution Enhancement using Luminance Map and Atmospheric Light Removal
Published 2022-12-01Get full text
Article -
747
Learning-based parallel acceleration for HaplotypeCaller
Published 2025-08-01“…This paper introduces a learning-based framework LPA (learning-based parallel acceleration), leveraging model to accurately predict the computational complexity of data. By employing adaptive data segmentation algorithms and Multi-Knapsack Problem (MKP) based task scheduling, LPA significantly alleviates computational skew. …”
Get full text
Article -
748
THE ACCEPTANCE OF AN EDUCATIONAL INTEGRATED DEVELOPMENT ENVIRONMENT TO LEARN PROGRAMMING FUNDAMENTALS
Published 2023-02-01“…However, previous research shows that students face difficulties in learning programming due to its abstract concepts. …”
Get full text
Article -
749
Optimal Configuration of Distributed Energy Storage in Distribution Networks Based on Moment Difference Analysis
Published 2023-12-01“…An example of IEEE 33 node distribution system shows that compared with traditional intelligent optimization algorithms, the proposed method can directly determine the installation location of energy storage, which has high computational efficiency, accurate calculation results and strong engineering practicability.…”
Get full text
Article -
750
Research on Mine-Personnel Helmet Detection Based on Multi-Strategy-Improved YOLOv11
Published 2024-12-01“…In the complex environment of fully mechanized mining faces, the current object detection algorithms face significant challenges in achieving optimal accuracy and real-time detection of mine personnel and safety helmets. …”
Get full text
Article -
751
A secure medical image encryption technique based on DNA cryptography with elliptic curves
Published 2025-06-01“…Existing encryption techniques often face limitations such as high computational complexity, insufficient security against advanced cryptographic attacks, poor reversal and pixel correlation. …”
Get full text
Article -
752
A hybrid super learner ensemble for phishing detection on mobile devices
Published 2025-05-01“…Furthermore, many of these techniques are unsuitable for mobile devices, which face additional constraints, such as limited RAM, smaller screen sizes, and lower computational power. …”
Get full text
Article -
753
Innovative IoT-enabled mask detection system: A hybrid deep learning approach for public health applications
Published 2025-06-01“…The proposed framework integrates ResNet50 and MobileNetV2 architectures, optimized using the Adaptive Flame-Sailfish Optimization (AFSO) algorithm. This hybrid approach enhances detection accuracy and computational efficiency, making it suitable for real-time deployment. …”
Get full text
Article -
754
Performance Evaluating of Honeyword Generation Methods: Traditional versus AI
Published 2025-03-01“…As the number of people using computers has increased, the risks to digital systems have increased too. …”
Get full text
Article -
755
Research on Lightweighting Methods for 3D Building Models Based on Semantic Constraints
Published 2025-08-01“…In the transition from LOD3 to LOD2, a face merging algorithm is employed to analyze the semantic consistency of adjacent faces, ensuring that only semantically consistent faces are merged, thus generating an LOD2 model with semantic integrity. …”
Get full text
Article -
756
Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Published 2020-01-01“…Hence, network security represents one of the biggest serious challenges that can be faced by network security communities. Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. …”
Get full text
Article -
757
CodonTransformer: a multispecies codon optimizer using context-aware neural networks
Published 2025-04-01Get full text
Article -
758
MRD: A Linear-Complexity Encoder for Real-Time Vehicle Detection
Published 2025-05-01“…While visual transformer-based detection architectures have demonstrated performance breakthroughs through enhanced perceptual capabilities, establishing themselves as the dominant paradigm in this domain, their practical implementation faces critical challenges due to the quadratic computational complexity inherent in the self-attention mechanism, which imposes prohibitive computational overhead. …”
Get full text
Article -
759
Multistage Threshold Segmentation Method Based on Improved Electric Eel Foraging Optimization
Published 2025-04-01Get full text
Article -
760