-
161
Mammography in 2022, from Computer-Aided Detection to Artificial Intelligence Applications
Published 2022-10-01“…Objective: During the last decades, advances in computing power, structured data, and algorithm development, developed a technology based on Artificial intelligence (AI) which is currently applied in medicine. …”
Get full text
Article -
162
Therapeutic eyelids hygiene in the algorithms of prevention and treatment of ocular surface diseases
Published 2016-07-01“…When acute inflammation in anterior eye segment of a forward piece of an eye was stopped, ophthalmologists face a problem of absence of acute inflammation signs and at the same time complaints to the remain discomfort feelings. …”
Get full text
Article -
163
Enhancing feature selection for multi-pose facial expression recognition using a hybrid of quantum inspired firefly algorithm and artificial bee colony algorithm
Published 2025-02-01“…Abstract Facial expression recognition (FER) has advanced applications in various disciplines, including computer vision, Internet of Things, and artificial intelligence, supporting diverse domains such as medical escort services, learning analysis, fatigue detection, and human-computer interaction. …”
Get full text
Article -
164
Efficient and secure multi-party computation protocol supporting deep learning
Published 2025-07-01“…However, the adoption of Shamir secret sharing faces two key challenges: limitations of decimal computation and signed number representation. …”
Get full text
Article -
165
Programmable composite pipeline structure supporting scheduling of integrated network and computing
Published 2025-07-01“…To meet the needs of differentiated QoS assurance and efficient heterogeneous resources scheduling of diversified services in the ICN environment, for the performance bottleneck faced by traditional network architecture, a programmable composite pipeline architecture that supported ICN resource scheduling and QoS guarantee was designed. …”
Get full text
Article -
166
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
167
Livestock Biometrics Identification Using Computer Vision Approaches: A Review
Published 2025-01-01“…We also highlight the challenges faced in this field, such as data quality and algorithmic efficiency, and introduce the baseline models and innovative solutions developed to address these issues. …”
Get full text
Article -
168
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…Techniques like support vector machines (SVM) and the hidden Markov model (HMM) struggle with computational overhead and scalability in large datasets, limiting their performance in critical healthcare applications. …”
Get full text
Article -
169
Underwater Object Detection Algorithm Based on an Improved YOLOv8
Published 2024-11-01“…Due to the complexity and diversity of underwater environments, traditional object detection algorithms face challenges in maintaining robustness and detection accuracy when applied underwater. …”
Get full text
Article -
170
The Path Planning of Mobile Robots Based on an Improved Genetic Algorithm
Published 2025-03-01“…In the field of mobile robot path planning, traditional genetic algorithms face issues such as slow convergence, lack of dynamic adaptability, and uncertain mutation directionality. …”
Get full text
Article -
171
Comparative Analysis of Supervised Machine Learning Algorithms for COVID-19 Prediction
Published 2024-04-01Get full text
Article -
172
Electric Vehicle Routing Problem: A Review of Recent Approaches and Algorithms
Published 2025-03-01Get full text
Article -
173
Comparative Analysis of Supervised Classification Algorithms for Residential Water End Uses
Published 2024-06-01Get full text
Article -
174
A Review of Personalised Cardiac Computational Modelling Using Electroanatomical Mapping Data
Published 2024-05-01Get full text
Article -
175
Improved Hypernymy Detection Algorithm Based on Heterogeneous Graph Neural Network
Published 2025-05-01Get full text
Article -
176
Sequential Memetic Algorithm Optimization for Allocation Planning in Hostelry Establishments
Published 2024-10-01Get full text
Article -
177
From understanding to justifying: Computational reliabilism for AI-based forensic evidence evaluation
Published 2024-01-01“…This framework enables debates on the suitability of AI methods for forensic evidence evaluation that take a wider view than explainability and validation.We argue that we are justified in believing the AI's output for forensic comparison of voices and forensic comparison of faces. Technical indicators include the validation of the AI algorithm in itself, validation of its application in the forensic setting, and case-based validation. …”
Get full text
Article -
178
Facilitate Sustainable Architecture Through Computational Integration: A Three-Phase Framework
Published 2025-09-01“…It addresses the challenges faced by architects in computational integration, from the uncertainty of selecting the proper computational tool to adopting optimization tools for prefabrication and production. …”
Get full text
Article -
179
MTAD: A Multitarget Heuristic Algorithm for Virtual Machine Placement
Published 2015-10-01Get full text
Article -
180
A Fast Map Merging Algorithm in the Field of Multirobot SLAM
Published 2013-01-01“…The simulated data is used as information sources in the other map to do partial map Monte Carlo localization; if localization succeeds, the relative pose hypotheses between the two maps can be computed easily. We verify these hypotheses using the rendezvous technique and use them as initial values to optimize the estimation by a heuristic random search algorithm.…”
Get full text
Article