Search alternatives:
efficient » efficiency (Expand Search)
Showing 2,001 - 2,020 results of 3,275 for search 'complex detection efficient', query time: 0.18s Refine Results
  1. 2001

    Development of Model for Traffic Flows on Urban Street and Road Network by D. V. Kapskiy, D. V. Navoy, P. A. Pegin

    Published 2019-02-01
    “…The algorithm has been already implemented as part of the current automated traffic management system in the city of Minsk and it has shown its efficiency. However this efficiency can be increased if it is used together with an algorithm for searching maximum volume of motion in a cycle with a distributed intensity pulse. …”
    Get full text
    Article
  2. 2002
  3. 2003

    Optimizing of Universal DEA Model with Multi-Level Integration under Neutrosophic Environment by Hamiden Abd El- Wahed Khalifa, Loay Alkhalifa, Sultan S. Alodhaibi, Basma E. El- Demerdash

    Published 2025-06-01
    “…Possible restrictions, however, on applicability in very large data sets and computation time complexities would need further probing. …”
    Get full text
    Article
  4. 2004

    Advanced deep learning architectures for enhanced mammography classification: a comparative study of CNNs and ViT by Shubhi Sharma, Yeshwant Singh, Tanupriya Choudhury

    Published 2025-07-01
    “…Abstract Breast cancer is a leading cause of mortality among women worldwide, and early detection via mammography is critical for improving patient outcomes. …”
    Get full text
    Article
  5. 2005

    Generating Synthetic Datasets with Deep Learning Models for Human Physical Fatigue Analysis by Arsalan Lambay, Ying Liu, Phillip Morgan, Ze Ji

    Published 2025-03-01
    “…This research aims to provide researchers with an innovative method to tackle data-driven ML challenges of data scarcity and further enhance ML technology’s efficiency through training on SD. This study not only provides an approach to create complex realistic datasets but also helps in bridging the gap of Industry 5.0 data challenges for the purpose of innovations and worker well-being by improving detection capabilities.…”
    Get full text
    Article
  6. 2006

    Continual Learning With Neuromorphic Computing: Foundations, Methods, and Emerging Applications by Mishal Fatima Minhas, Rachmad Vidya Wicaksana Putra, Falah Awwad, Osman Hasan, Muhammad Shafique

    Published 2025-01-01
    “…Then, we analyze these methods based on their achieved CL desiderata, computational and memory costs, as well as network complexity, hence emphasizing the need for energy-efficient CL. …”
    Get full text
    Article
  7. 2007

    Improving Chinese Fir Plantations DBH Inversion Accuracy Using Ensemble Learning Models Base on UAV-LiDAR by Jiuen Xu, Yinyin Zhao, Xuejian Li, Lujin Lv, Jiacong Yu, Meixuan Song, Lei Huang, Fangjie Mao, Huaqiang Du

    Published 2025-01-01
    “…This study explores the use of uncrewed aerial vehicle light detection and ranging (UAV-LiDAR) for individual tree DBH inversion in Chinese fir (<italic>Cunninghamia lanceolata</italic>) plantations with complex terrain and rich understory vegetation, and compares the results with those from Backpack-LiDAR. …”
    Get full text
    Article
  8. 2008

    Damage Localization Using Fiber Bragg Grating Sensors in Self-referencing Conguration: A Numerical Study by Abhishek Patange, Farzam Omidi Moaf, Piotr Fiborek, Adityan Arumuganainar, Rohan Nandkishor Soman

    Published 2025-07-01
    “…The proposed methodology reduces sensor requirements, lowers system complexity and cost, and enables efficient SHM solutions in extreme or large-scale environments. …”
    Get full text
    Article
  9. 2009
  10. 2010

    High-Precision Pose Measurement of Containers on the Transfer Platform of the Dual-Trolley Quayside Container Crane Based on Machine Vision by Jiaqi Wang, Mengjie He, Yujie Zhang, Zhiwei Zhang, Octavian Postolache, Chao Mi

    Published 2025-04-01
    “…To address the high-precision measurement requirements for container pose on dual-trolley quayside crane-transfer platforms, this paper proposes a machine vision-based measurement method that resolves the challenges of multi-scale lockhole detection and precision demands caused by complex illumination and perspective deformation in port operational environments. …”
    Get full text
    Article
  11. 2011

    Emotion recognition with a Randomized CNN-multihead-attention hybrid model optimized by evolutionary intelligence algorithm by Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Syed Kumayl Raza Moosavi, Filippo Sanfilippo

    Published 2025-07-01
    “…Emotion recognition systems are vital for various applications, yet existing models often face limitations in computational efficiency and accuracy, especially when handling complex emotional expressions in sequential data. …”
    Get full text
    Article
  12. 2012

    Development and validation of an analytical procedure for the determination of residual protein A in active substances of therapeutic monoclonal antibodies by E. V. Nozdrina, D. A. Mazalev, D. R. Rogozina, S. P. Zhivoderov, I. V. Lyagoskin, R. R. Shukurov

    Published 2024-03-01
    “…To increase the efficiency of enzyme-linked immunosorbent assay (ELISA), it is necessary to develop a sample preparation step that can irreversibly break the bond in the protein A–mAb complex.AIM. …”
    Get full text
    Article
  13. 2013

    Quantum key distribution through quantum machine learning: a research review by Krupa Purohit, Ajay Kumar Vyas

    Published 2025-05-01
    “…The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures, addressing previously inaccessible threats, and improving cryptographic efficiency. Key research areas in quantum cryptography include Quantum Key Distribution (QKD), eavesdropping detection, QSDC, security analysis of QKD protocols, post-quantum cryptography, Quantum Network Security &amp; Intrusion Detection, Quantum-secure communication beyond QKD, quantum random number generation, Quantum Secure Multi-Party Computation (QSMPC), Quantum Homomorphic Encryption (QHE), and privacy-preserving computation. …”
    Get full text
    Article
  14. 2014
  15. 2015
  16. 2016

    Analysis of GPR Wave Propagation Using CUDA-Implemented Conformal Symplectic Partitioned Runge-Kutta Method by Hongyuan Fang, Jianwei Lei, Man Yang, Ziwei Li

    Published 2019-01-01
    “…This provides a theoretical basis for accurately interpreting GPR detection data and accurate and efficient forward modeling for the next step of inversion imaging.…”
    Get full text
    Article
  17. 2017

    Convolutional Neural Network and Channel Attention Mechanism for Multiclass Brain Tumor Classification by Ali Naderi, Akbar Asgharzadeh-Bonab, Farid Ahmadi, Hashem Kalbkhani

    Published 2025-01-01
    “…The proposed model comprises three key components: (1) a fine-tuned EfficientNetB7 convolutional neural network (CNN), adapted through transfer learning by freezing the initial layers and retraining subsequent layers to optimize feature extraction from MR images; (2) a channel attention module that refines extracted feature maps, emphasizing essential features for accurate tumor detection; and (3) a fully connected classifier, optimized through grid search, to achieve precise multiclass tumor classification. …”
    Get full text
    Article
  18. 2018

    Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios by Yingzi Wang, Ce Yu, Jue Hou, Yongjia Zhang, Xiangyi Fang, Shuyue Wu

    Published 2021-01-01
    “…To improve the operational efficiency of complex data quality management algorithms in large-scale data scenarios, corresponding parallelization algorithms are studied and implemented for detection and repair algorithms with long computation time, including priority-based multiconditional function-dependent detection and repair algorithms, entity detection, and extraction algorithms based on semantic information and chunking techniques, and plain Bayesian-based missing value filling algorithms, and this paper proposes a data validity evaluation algorithm and enhances the validity of the original data in practical applications by adding temporal weights, and finally it passed the experimental validation. …”
    Get full text
    Article
  19. 2019
  20. 2020

    Research on Design of Intelligent Background Differential Model for Training Target Monitoring by Ya Liu, Fusheng Jiang, Yuhui Wang, Lu OuYang, Bo Gao, Jinling Jiang, Bo Zhang

    Published 2021-01-01
    “…At the same time, compared with traditional methods, it also has a higher detection efficiency.…”
    Get full text
    Article