Showing 821 - 840 results of 1,299 for search 'face computational algorithms', query time: 0.34s Refine Results
  1. 821
  2. 822

    A survey on deep learning in UAV imagery for precision agriculture and wild flora monitoring: Datasets, models and challenges by Lorenzo Epifani, Antonio Caruso

    Published 2024-12-01
    “…For these reasons, research literature is rich of works that face problems in Precision Agriculture and Wild Flora Monitoring domains with machine learning/computer vision methods applied to UAV imagery. …”
    Get full text
    Article
  3. 823

    Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks by Hongtao Song, Shanshan Sui, Qilong Han, Hui Zhang, Zaiqiang Yang

    Published 2020-03-01
    “…Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. …”
    Get full text
    Article
  4. 824
  5. 825

    Integrating Advanced Techniques: RFE-SVM Feature Engineering and Nelder-Mead Optimized XGBoost for Accurate Lung Cancer Prediction by Sarah Ayad, Hamdi A. Al-Jamimi, Ammar El Kheir

    Published 2025-01-01
    “…However, medical datasets often face challenges like irrelevant features and class imbalance, complicating accurate predictions. …”
    Get full text
    Article
  6. 826

    Review of the Research on Underwater Explosion Ice-Breaking Technology by Xiao Huang, Zi-Xian Zhong, Xiao Luo, Yuan-Dong Wang

    Published 2025-07-01
    “…However, significant limitations persist in modeling sea ice heterogeneity, experimental replication of polar conditions, and computational efficiency. Future advancements require multiscale fluid–structure interaction models integrating brine migration effects, enhanced experimental diagnostics for transient processes, and optimized numerical algorithms to enable reliable predictions for engineering applications.…”
    Get full text
    Article
  7. 827
  8. 828
  9. 829

    Inverse-design topology optimization of magnonic devices using level-set method by Andrey A. Voronov, Marcos Cuervo Santos, Florian Bruckner, Dieter Suess, Andrii V. Chumak, Claas Abert

    Published 2025-05-01
    “…While promising for analog, Boolean, and neuromorphic computing, current implementations face memory limitations that hinder the design of complex systems. …”
    Get full text
    Article
  10. 830

    Reliability-Based Topology Optimization Considering Overhang Constraints for Additive Manufacturing Design by Fahri Murat, Irfan Kaymaz, Abdullah Tahir Şensoy

    Published 2025-06-01
    “…AM offers intricate component production but faces challenges due to support structures. Incorporating overhang constraints in topology optimization enables self-supporting structures. …”
    Get full text
    Article
  11. 831

    Machine Learning‐Enhanced Optimization for High‐Throughput Precision in Cellular Droplet Bioprinting by Jaemyung Shin, Ryan Kang, Kinam Hyun, Zhangkang Li, Hitendra Kumar, Kangsoo Kim, Simon S. Park, Keekyoung Kim

    Published 2025-05-01
    “…In this study, a high‐throughput cellular droplet bioprinter is designed, capable of printing over 50 cellular droplets simultaneously, producing the large dataset required for effective machine learning training. Among the five algorithms evaluated, the multilayer perceptron model demonstrates the highest prediction accuracy, while the decision tree model offers the fastest computation time. …”
    Get full text
    Article
  12. 832

    A novel hybrid fuzzy logic and federated learning framework for enhancing cybersecurity and fraud detection in IoT-enabled metaverse transactions by Amjad Rehman, Kamran Ahmad Awan, Amal Al-Rasheed, Anees Ara, Fahad F. Alruwaili, Shaha Al-Otaibi, Tanzila Saba

    Published 2025-06-01
    “…The optimized federated learning model for IoT devices implements lightweight algorithms with hierarchical aggregation that reduce computational and communication overhead to enhance fraud detection capabilities. …”
    Get full text
    Article
  13. 833

    Optimizing frequency stability with adaptive fast frequency reserves and Wide-Area Monitoring Systems by Bwandakassy Elenga Baningobera, Irina Oleinikova, Kjetil Uhlen

    Published 2025-10-01
    “…The Nordic 44 power system model is used with OPAL-RT for real-time simulation, Real-Time Automation Controller (RTAC), and protective relays to monitor, automate, protect, and control the system. The adaptive algorithm computes the frequency deviation, adjusts the control gain in real time, and recalculates the FFR activation thresholds and volumes accordingly. …”
    Get full text
    Article
  14. 834
  15. 835
  16. 836

    Blockchain Technology in Supply Chain Management Prospects and Challenges for Implementation by Peshattiwar Atish, P Mohanraj, A Anand Gerald, S Dharmalingam, Tiwari Mohit, G Swarnalakshmi

    Published 2025-01-01
    “…Existing implementations are facing significant challenges, such as considerable computational expense, scalability constraints, issues with interoperability, energy waste, and regulatory compliance. …”
    Get full text
    Article
  17. 837

    A Design of Irregular Grid Map for Large-Scale Wi-Fi LAN Fingerprint Positioning Systems by Jae-Hoon Kim, Kyoung Sik Min, Woon-Young Yeo

    Published 2014-01-01
    “…Because of the millions of APs in urban areas, radio fingerprints are seriously contaminated and confused. Moreover, the algorithmic advances for positioning face computational limitation. …”
    Get full text
    Article
  18. 838

    GAT-APG: Graph Attention Network-Based Attack Path Generation for Security Simulation by Min Geun Song, Jaewoong Choi, Huy Kang Kim

    Published 2025-01-01
    “…Existing attack path generation methods face limitations in dynamic simulation environments due to their reliance on static network models and computational inefficiencies when network configurations change frequently. …”
    Get full text
    Article
  19. 839
  20. 840

    Blockchain based solution for secure information sharing in pharma supply chain management by Adla Padma, Mangayarkarasi Ramaiah

    Published 2024-11-01
    “…The registration phase computes the identification number upon the hashed private key along with the Edwards-curve digital signature algorithm (EdDSA) for all the stakeholders. …”
    Get full text
    Article