Showing 161 - 180 results of 1,299 for search 'face computational algorithms', query time: 0.11s Refine Results
  1. 161

    Mammography in 2022, from Computer-Aided Detection to Artificial Intelligence Applications by Filippo Pesapane, Chiara Trentin, Marta Montesano, Federica Ferrari, Luca Nicosia, Anna Rotili, Silvia Penco, Mariagiorgia Farina, Irene Marinucci, Francesca Abbate, Lorenza Meneghetti, Anna Bozzini, Antuono Latronico, Alessandro Liguori, Giuseppe Carrafiello, Enrico Cassano

    Published 2022-10-01
    “…Objective: During the last decades, advances in computing power, structured data, and algorithm development, developed a technology based on Artificial intelligence (AI) which is currently applied in medicine. …”
    Get full text
    Article
  2. 162

    Therapeutic eyelids hygiene in the algorithms of prevention and treatment of ocular surface diseases by V. N. Trubilin, E. G. Poluninа, V. V. Kurenkov, S. G. Kapkova, E. Y. Markova

    Published 2016-07-01
    “…When acute inflammation in anterior eye segment of a forward piece of an eye was stopped, ophthalmologists face a problem of absence of acute inflammation signs and at the same time complaints to the remain discomfort feelings. …”
    Get full text
    Article
  3. 163

    Enhancing feature selection for multi-pose facial expression recognition using a hybrid of quantum inspired firefly algorithm and artificial bee colony algorithm by Mu Panliang, Sanjay Madaan, Siddiq Ahmed Babikir Ali, Gowrishankar J., Ali Khatibi, Anas Ratib Alsoud, Vikas Mittal, Lalit Kumar, A. Johnson Santhosh

    Published 2025-02-01
    “…Abstract Facial expression recognition (FER) has advanced applications in various disciplines, including computer vision, Internet of Things, and artificial intelligence, supporting diverse domains such as medical escort services, learning analysis, fatigue detection, and human-computer interaction. …”
    Get full text
    Article
  4. 164

    Efficient and secure multi-party computation protocol supporting deep learning by Shancheng Zhang, Gang Qu, Zongyang Zhang, Minzhe Huang, Haochun Jin, Liqun Yang

    Published 2025-07-01
    “…However, the adoption of Shamir secret sharing faces two key challenges: limitations of decimal computation and signed number representation. …”
    Get full text
    Article
  5. 165

    Programmable composite pipeline structure supporting scheduling of integrated network and computing by HOU Saifeng, CUI Pengshuai, HU Yuxiang, DONG Yongji, LIU Yi

    Published 2025-07-01
    “…To meet the needs of differentiated QoS assurance and efficient heterogeneous resources scheduling of diversified services in the ICN environment, for the performance bottleneck faced by traditional network architecture, a programmable composite pipeline architecture that supported ICN resource scheduling and QoS guarantee was designed. …”
    Get full text
    Article
  6. 166

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  7. 167

    Livestock Biometrics Identification Using Computer Vision Approaches: A Review by Hua Meng, Lina Zhang, Fan Yang, Lan Hai, Yuxing Wei, Lin Zhu, Jue Zhang

    Published 2025-01-01
    “…We also highlight the challenges faced in this field, such as data quality and algorithmic efficiency, and introduce the baseline models and innovative solutions developed to address these issues. …”
    Get full text
    Article
  8. 168

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…Techniques like support vector machines (SVM) and the hidden Markov model (HMM) struggle with computational overhead and scalability in large datasets, limiting their performance in critical healthcare applications. …”
    Get full text
    Article
  9. 169

    Underwater Object Detection Algorithm Based on an Improved YOLOv8 by Fubin Zhang, Weiye Cao, Jian Gao, Shubing Liu, Chenyang Li, Kun Song, Hongwei Wang

    Published 2024-11-01
    “…Due to the complexity and diversity of underwater environments, traditional object detection algorithms face challenges in maintaining robustness and detection accuracy when applied underwater. …”
    Get full text
    Article
  10. 170

    The Path Planning of Mobile Robots Based on an Improved Genetic Algorithm by Zheng Zhang, Haobo Yang, Xusheng Bai, Shuo Zhang, Chaobin Xu

    Published 2025-03-01
    “…In the field of mobile robot path planning, traditional genetic algorithms face issues such as slow convergence, lack of dynamic adaptability, and uncertain mutation directionality. …”
    Get full text
    Article
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176
  17. 177

    From understanding to justifying: Computational reliabilism for AI-based forensic evidence evaluation by Juan M. Durán, David van der Vloed, Arnout Ruifrok, Rolf J.F. Ypma

    Published 2024-01-01
    “…This framework enables debates on the suitability of AI methods for forensic evidence evaluation that take a wider view than explainability and validation.We argue that we are justified in believing the AI's output for forensic comparison of voices and forensic comparison of faces. Technical indicators include the validation of the AI algorithm in itself, validation of its application in the forensic setting, and case-based validation. …”
    Get full text
    Article
  18. 178

    Facilitate Sustainable Architecture Through Computational Integration: A Three-Phase Framework by Passaint Massoud

    Published 2025-09-01
    “…It addresses the challenges faced by architects in computational integration, from the uncertainty of selecting the proper computational tool to adopting optimization tools for prefabrication and production. …”
    Get full text
    Article
  19. 179
  20. 180

    A Fast Map Merging Algorithm in the Field of Multirobot SLAM by Yanli Liu, Xiaoping Fan, Heng Zhang

    Published 2013-01-01
    “…The simulated data is used as information sources in the other map to do partial map Monte Carlo localization; if localization succeeds, the relative pose hypotheses between the two maps can be computed easily. We verify these hypotheses using the rendezvous technique and use them as initial values to optimize the estimation by a heuristic random search algorithm.…”
    Get full text
    Article