Showing 121 - 140 results of 1,299 for search 'face computational algorithms', query time: 0.16s Refine Results
  1. 121
  2. 122

    Structural design of memory system for Ternary Optical Computer. by Honghong Zhang, Yi Jin, Hongjian Wang, Xunlei Chen, Zhehe Wang, Shan Ouyang, Shuang Li

    Published 2025-01-01
    “…Ternary Optical Computer (TOC) is unique in the development of optical computers, in terms of principle, experiment, algorithm and application. …”
    Get full text
    Article
  3. 123

    Privacy cloud storage scheme based on fog computing by Jiyuan ZHOU, Hao LUO, Lei QIU, Tian WANG

    Published 2019-03-01
    “…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
    Get full text
    Article
  4. 124
  5. 125

    Pupil Detection Algorithm Based on ViM by Yu Zhang, Changyuan Wang, Pengbo Wang, Pengxiang Xue

    Published 2025-06-01
    “…Existing pupil detection algorithms still face challenges in maintaining robustness under variable lighting conditions and occlusion scenarios. …”
    Get full text
    Article
  6. 126

    Machine Learning Algorithms Performance Evaluation for Intrusion Detection by Shyla ., Kapil Kumar, Vishal Bhatnagar

    Published 2021-01-01
    “…In this paper authors introduces Intrusion detection system (IDS) framework that is deployed over KDD Cup99 dataset by using machine learning algorithms as Support Vector Machine (SVM), Naïve Bayes and Random Forest for the purpose of improving the precision, accuracy and recall value to compute the best suited algorithm.…”
    Get full text
    Article
  7. 127
  8. 128

    An Underwater Localization Algorithm Based on the Internet of Vessels by Ziqi Wang, Ying Guo, Fei Li, Yuhang Chen, Jiyan Wei

    Published 2025-03-01
    “…To overcome these challenges, we propose a crowdsensing-based underwater localization algorithm (CSUL) by leveraging the computational and localization resources of vessels. …”
    Get full text
    Article
  9. 129
  10. 130

    Survey of Distributed Computing Frameworks for Supporting Big Data Analysis by Xudong Sun, Yulin He, Dingming Wu, Joshua Zhexue Huang

    Published 2023-06-01
    “…In performing such tasks, these frameworks face three challenges: computational inefficiency due to high I/O and communication costs, non-scalability to big data due to memory limit, and limited analytical algorithms because many serial algorithms cannot be implemented in the MapReduce programming model. …”
    Get full text
    Article
  11. 131
  12. 132
  13. 133
  14. 134

    Mitigation of Corruption by Implementing e-Government Using Soft Computing by Shareef M. Shareef

    Published 2022-01-01
    “…Electronic government (e-government) allows citizens to contact government authorities directly through computers, smartphones, and the Internet. In the return reducing face-to-face interaction with government employees decreases their permissive role and the potential for corruption, hence enabling the government to be more effective and trustworthy and provide transparency and accountability. …”
    Get full text
    Article
  15. 135
  16. 136
  17. 137
  18. 138

    Comparative analysis of image hashing algorithms for visual object tracking by Vitalii Naumenko, Sergiy Abramov, Vladimir Lukin

    Published 2025-02-01
    “…Subject of the research – visual object tracking using various image hashing algorithms for real-time tracking tasks. The goal of this study is to evaluate the tracking success and processing speed of existing and new hashing algorithms for object tracking and to identify the most suitable algorithms to be used under limited computational resources. …”
    Get full text
    Article
  19. 139

    Advanced driver assistance system (ADAS) and machine learning (ML): The dynamic duo revolutionizing the automotive industry by Harsh SHAH, Karan SHAH, Kushagra DARJI, Adit SHAH, Manan SHAH

    Published 2025-06-01
    “…Subsequently, the critical algorithms used in ADAS technology, which include face detection, head-pose estimation, gaze estimation, and link detection are discussed. …”
    Get full text
    Article
  20. 140

    Memristor-Based Artificial Neural Networks for Hardware Neuromorphic Computing by Boyan Jin, Zhenlong Wang, Tianyu Wang, Jialin Meng

    Published 2025-01-01
    “…Artificial neural networks have long been studied to emulate the cognitive capabilities of the human brain for artificial intelligence (AI) computing. However, as computational demands intensify, conventional hardware based on transistor and complementary metal oxide semiconductor (CMOS) technology faces substantial limitations due to the separation of memory and processing, a challenge commonly known as the von Neumann bottleneck. …”
    Get full text
    Article