-
121
User preference information recommendation based on DCGNN and GNNPK algorithms
Published 2025-12-01Get full text
Article -
122
Structural design of memory system for Ternary Optical Computer.
Published 2025-01-01“…Ternary Optical Computer (TOC) is unique in the development of optical computers, in terms of principle, experiment, algorithm and application. …”
Get full text
Article -
123
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article -
124
Reliability evaluation of dynamic face recognition systems based on improved Fuzzy Dynamic Bayesian Network
Published 2020-03-01Get full text
Article -
125
Pupil Detection Algorithm Based on ViM
Published 2025-06-01“…Existing pupil detection algorithms still face challenges in maintaining robustness under variable lighting conditions and occlusion scenarios. …”
Get full text
Article -
126
Machine Learning Algorithms Performance Evaluation for Intrusion Detection
Published 2021-01-01“…In this paper authors introduces Intrusion detection system (IDS) framework that is deployed over KDD Cup99 dataset by using machine learning algorithms as Support Vector Machine (SVM), Naïve Bayes and Random Forest for the purpose of improving the precision, accuracy and recall value to compute the best suited algorithm.…”
Get full text
Article -
127
-
128
An Underwater Localization Algorithm Based on the Internet of Vessels
Published 2025-03-01“…To overcome these challenges, we propose a crowdsensing-based underwater localization algorithm (CSUL) by leveraging the computational and localization resources of vessels. …”
Get full text
Article -
129
-
130
Survey of Distributed Computing Frameworks for Supporting Big Data Analysis
Published 2023-06-01“…In performing such tasks, these frameworks face three challenges: computational inefficiency due to high I/O and communication costs, non-scalability to big data due to memory limit, and limited analytical algorithms because many serial algorithms cannot be implemented in the MapReduce programming model. …”
Get full text
Article -
131
Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing
Published 2024-11-01Get full text
Article -
132
Accuracy and robustness evaluation of deep learning algorithms in facial recognition systems
Published 2025-12-01Get full text
Article -
133
-
134
Mitigation of Corruption by Implementing e-Government Using Soft Computing
Published 2022-01-01“…Electronic government (e-government) allows citizens to contact government authorities directly through computers, smartphones, and the Internet. In the return reducing face-to-face interaction with government employees decreases their permissive role and the potential for corruption, hence enabling the government to be more effective and trustworthy and provide transparency and accountability. …”
Get full text
Article -
135
Overlapping Box Suppression and Merging Algorithms for Window-Based Object Detection
Published 2025-09-01Get full text
Article -
136
-
137
-
138
Comparative analysis of image hashing algorithms for visual object tracking
Published 2025-02-01“…Subject of the research – visual object tracking using various image hashing algorithms for real-time tracking tasks. The goal of this study is to evaluate the tracking success and processing speed of existing and new hashing algorithms for object tracking and to identify the most suitable algorithms to be used under limited computational resources. …”
Get full text
Article -
139
Advanced driver assistance system (ADAS) and machine learning (ML): The dynamic duo revolutionizing the automotive industry
Published 2025-06-01“…Subsequently, the critical algorithms used in ADAS technology, which include face detection, head-pose estimation, gaze estimation, and link detection are discussed. …”
Get full text
Article -
140
Memristor-Based Artificial Neural Networks for Hardware Neuromorphic Computing
Published 2025-01-01“…Artificial neural networks have long been studied to emulate the cognitive capabilities of the human brain for artificial intelligence (AI) computing. However, as computational demands intensify, conventional hardware based on transistor and complementary metal oxide semiconductor (CMOS) technology faces substantial limitations due to the separation of memory and processing, a challenge commonly known as the von Neumann bottleneck. …”
Get full text
Article