Showing 1,201 - 1,220 results of 1,299 for search 'face computational algorithms', query time: 0.11s Refine Results
  1. 1201
  2. 1202
  3. 1203

    Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2017-01-01
    “…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
    Get full text
    Article
  4. 1204

    Sonar-Based Simultaneous Localization and Mapping Using the Semi-Direct Method by Xu Han, Jinghao Sun, Shu Zhang, Junyu Dong, Hui Yu

    Published 2024-12-01
    “…To obtain better feature extraction results in specific directions, we propose a method that accelerates the computation of the two-dimensional SO-CFAR algorithm, with the time cost being only a very slight increase compared to the one-dimensional SO-CFAR. …”
    Get full text
    Article
  5. 1205
  6. 1206
  7. 1207

    Combined encryption method for CAN bus data based on periodic coupled processing by Wutao QIN, Peng WANG, Yufeng LI

    Published 2023-01-01
    “…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
    Get full text
    Article
  8. 1208
  9. 1209

    Improved Private Data Protection Scheme for Blockchain Smart Contracts by Sheng Hu

    Published 2023-01-01
    “…Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. …”
    Get full text
    Article
  10. 1210
  11. 1211
  12. 1212
  13. 1213
  14. 1214

    A 3-D Parallel Method of PSTD-Based Reverse Time Migration of GPR Data by Lingjia Huang, Bowen Ma, Qinghua Huang

    Published 2025-01-01
    “…However, the three-dimensional (3-D) RTM of GPR data still faces big challenge due to its expensive computation cost. …”
    Get full text
    Article
  15. 1215

    Study on the Strategy of Playing Doudizhu Game Based on Multirole Modeling by Shuqin Li, Saisai Li, Hengyang Cao, Kun Meng, Meng Ding

    Published 2020-01-01
    “…Experimental results showed that this card-playing framework makes playing decisions like human beings, and it can to some extent learn, collaborate, and reason when facing an incomplete information game problem. This framework won the runner-up in the 2018 China Computer Game Competition.…”
    Get full text
    Article
  16. 1216
  17. 1217

    DEALER: Distributed Clustering with Local Direction Centrality and Density Measure by Xuze Liu, Ziqi Zhao, Yuhai Zhao

    Published 2025-04-01
    “…Although CDC has shown promising results, it still faces challenges in terms of both effectiveness and efficiency. …”
    Get full text
    Article
  18. 1218
  19. 1219
  20. 1220

    A Registration Method for Historical Maps Based on Self-Supervised Feature Matching by Zikang Qin, Yumin Feng, Gang Wu, Qing Dong, Tianxin Han

    Published 2025-01-01
    “…Image registration techniques in the field of computer vision can be applied to this task. However, historical map registration faces unique challenges, including insufficient training data, variations in image sizes, and unavailable texture features. …”
    Get full text
    Article