Showing 1,021 - 1,040 results of 1,299 for search 'face computational algorithms', query time: 0.14s Refine Results
  1. 1021
  2. 1022

    Automated process for analyzing 2D CAD floor plan drawings and generating FloorspaceJS-compatible space objects for building energy simulations by Wei-Jen Chen, Min-Cheng Tu

    Published 2025-06-01
    “…This paper attempts to extract geometric data from existing 2D floor plan drawings and then proposes an algorithm to identify all faces enclosed by simple closed curves on the drawings. …”
    Get full text
    Article
  3. 1023
  4. 1024
  5. 1025
  6. 1026

    Model-Based Adaptive Iterative Hard Thresholding Compressive Sensing in Sensor Network for Volcanic Earthquake Detection by Guojin Liu, Qian Zhang, Yuyuan Yang, Zhenzhi Yin, Bin Zhu

    Published 2015-07-01
    “…Firstly, a sparse measurement matrix with theoretical analysis of its restricted isometry property (RIP) is designed to simplify the acquisition process, thereby reducing required storage space and computational demands in sensors. Secondly, a compressive sensing reconstruction algorithm with theoretical analysis of its error bound is presented. …”
    Get full text
    Article
  7. 1027

    Transformers—Messages in disguise by Joshua H. Tyler, Donald R. Reising, Mohamed M.K. Fadul

    Published 2025-06-01
    “…Compared to human-designed algorithms, Neural Network (NN)-based cryptography can create a new NN-specific cryptographic scheme that changes every time the NN is (re)trained. …”
    Get full text
    Article
  8. 1028

    Reliability Assessment via Combining Data from Similar Systems by Jianping Hao, Mochao Pei

    Published 2025-05-01
    “…In operational testing contexts, testers face dual challenges of constrained timeframes and limited resources, both of which impede the generation of reliability test data. …”
    Get full text
    Article
  9. 1029

    Quadrature based innovative techniques concerning nonlinear equations having unknown multiplicity by Farooq Ahmed Shah, Muhammad Waseem

    Published 2024-12-01
    “…The significance of iterative algorithms executed by computers in resolving such functions is of paramount importance and undeniable in contemporary times. …”
    Get full text
    Article
  10. 1030

    Implementation of Associated Hermite FDTD Method in Handling INBCs for Shielding Analysis by Lihua Shi, Zhengyu Huang, Qing Si, Yinghui Zhou

    Published 2016-01-01
    “…The two-port network equations of INBCs in frequency domain are transformed into AH domain to represent the relationship of tangential components of the electric and magnetic fields at faces of the shield. The established AH-INBCs shielding boundaries are incorporated into a set of implicit equations to calculate the expansion coefficients vectors of electromagnetic fields in the computational domain. …”
    Get full text
    Article
  11. 1031

    Review: the application of deep reinforcement learning to quantitative trading in financial market by XU Bo, HE Yijun, WEN Jiancheng, LI Xiangxia

    Published 2024-12-01
    “…It is believed that with the continuous optimization of algorithms and the improvement of computing power, DRL will play a more important role in the field of quantitative trading in financial market, providing more accurate and reliable support for investment decisions.…”
    Get full text
    Article
  12. 1032

    Research on Resource Reservation Strategy for Edge Federation by Hengzhou Ye, Huangran Li, Jiaming Li, Qiu Lu, Gong Chen

    Published 2025-01-01
    “…With the increasing number of users and the continuous expansion of task scales, the resource constraints faced by edge computing are becoming increasingly pronounced. …”
    Get full text
    Article
  13. 1033
  14. 1034

    AIME-solve: Accessible interactive mathematical expressions solver for optimized learning and visual empowerment by Amjad Ali, Shah Khusro, Fakhre Alam, Inayat Khan, Shabbab Ali Algamdi

    Published 2025-05-01
    “…However, students with visual disabilities still face significant challenges in mathematics learning, such as real-time feedback, error correction, step-by-step guidance, and interactive learning using digital devices such as smartphones and computers. …”
    Get full text
    Article
  15. 1035
  16. 1036

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…However, with the advent of large-scale quantum computing, traditional cryptographic mechanisms used in blockchain systems face potential vulnerabilities due to Shor’s algorithm, which threatens widely adopted public key cryptographic schemes. …”
    Get full text
    Article
  17. 1037

    The System Research and Implementation for Autorecognition of the Ship Draft via the UAV by Wei Zhan, Shengbing Hong, Yong Sun, Chenguang Zhu

    Published 2021-01-01
    “…In order to solve the above problems, this paper introduces the computer image processing technology based on deep learning, and the specific process is divided into three steps: first, the video sampling is carried out by the UAV to obtain a large number of pictures of the ship draft reading face, and the images are preprocessed; then, the deep learning target detection algorithm of improved YOLOv3 is used to process the images to predict the position of the waterline and identify the draft characters; finally, the prediction results are analyzed and processed to obtain the final reading results. …”
    Get full text
    Article
  18. 1038

    A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication by Yunlong Wang, Jie Zhang, Guangjie Han, Dugui Chen

    Published 2025-05-01
    “…However, due to the open nature of wireless communications, such applications face security threats posed by UAV authentication, especially in scalable IoT environments. …”
    Get full text
    Article
  19. 1039

    Resource Allocation and Interference Coordination Strategies in Heterogeneous Dual-Layer Satellite Networks by Jinhong Li, Rong Chai, Tianyi Zhou, Chengchao Liang

    Published 2025-02-01
    “…In the face of rapidly evolving communication technologies and increasing user demands, traditional terrestrial networks are challenged by the need for high-quality, high-speed, and reliable communication. …”
    Get full text
    Article
  20. 1040

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…Identity authentication is the basis for ensuring the security of the Internet of things. However, in the face of quantum attacks due to the large number of nodes in the Internet of things, the signcrypt-based identity authentication scheme will consume a lot of resources to generate node keys, which is difficult to meet the low cost requirements of the Internet of things. …”
    Get full text
    Article