Showing 20,701 - 20,720 results of 26,849 for search 'evaluation computing', query time: 0.29s Refine Results
  1. 20701
  2. 20702

    Hybrid CNN-LSTM Model with Custom Activation and Loss Functions for Predicting Fan Actuator States in Smart Greenhouses by Gregorius Airlangga, Julius Bata, Oskar Ika Adi Nugroho, Boby Hartanto Pramudita Lim

    Published 2025-04-01
    “…The model was trained and evaluated on a comprehensive dataset containing 37,923 samples with 13 environmental features, collected from a smart greenhouse. …”
    Get full text
    Article
  3. 20703
  4. 20704
  5. 20705
  6. 20706
  7. 20707
  8. 20708
  9. 20709

    Federated Learning on Heterogeneous Images in Internet of Biomedical Things by Yusen Li, Zaobo He, Peilin He, Yulin Cao

    Published 2024-12-01
    “…Second, we propose a privacy-enhanced approach that delegates part of the gradient computation to devices, thereby protecting data privacy without compromising the efficacy of the gradient-fusion process. …”
    Get full text
    Article
  10. 20710

    Residual capsule network with threshold convolution and attention mechanism for forest fire detection using UAV imagery by Soufiane Ben Othman, Obaid Ali

    Published 2025-07-01
    “…The Attention Mechanism prioritizes critical fire-related regions, ensuring precise detection. Evaluated on a comprehensive UAV-sourced dataset of 14,140 images, ResCaps-TC-Attn-Fire achieves an impressive 99.78% accuracy, 99.7% precision, and 99.8% recall, surpassing existing methods like YOLOv3 (85.2%), ABi-LSTM (96.2%), and Enhanced YOLOv8n (99.0%). …”
    Get full text
    Article
  11. 20711

    Benchmarking 21 Open-Source Large Language Models for Phishing Link Detection with Prompt Engineering by Arbi Haza Nasution, Winda Monika, Aytug Onan, Yohei Murakami

    Published 2025-04-01
    “…Additionally, our analysis highlights smaller models (7B–27B parameters) offering strong performance with substantially reduced computational costs. This study underscores the practical potential of open-source LLMs for phishing detection and provides insights for effective prompt engineering in cybersecurity applications.…”
    Get full text
    Article
  12. 20712
  13. 20713
  14. 20714
  15. 20715
  16. 20716
  17. 20717
  18. 20718
  19. 20719
  20. 20720