Showing 17,381 - 17,400 results of 26,849 for search 'evaluation computing', query time: 0.25s Refine Results
  1. 17381
  2. 17382

    A novel YOLO LSTM approach for enhanced human action recognition in video sequences by Mahmoud Elnady, Hossam E. Abdelmunim

    Published 2025-05-01
    “…Abstract Human Action Recognition (HAR) is a critical task in computer vision with applications in surveillance, healthcare, and human–computer interaction. …”
    Get full text
    Article
  3. 17383
  4. 17384
  5. 17385
  6. 17386
  7. 17387

    TMAS: A transaction misbehavior analysis scheme for blockchain by Shiyong Huang, Xiaohan Hao, Yani Sun, Chenhuang Wu, Huimin Li, Wei Ren, Kim-Kwang Raymond Choo

    Published 2024-09-01
    “…Specifically, the proposed system includes ten features in the transaction graph, two heuristic money laundering models, and an analysis method for account linkage, which identifies accounts that are distinct but controlled by an identical entity. To evaluate the effectiveness of our proposed indicators and models, we analyze 100 million transactions and compute transaction features, and are able to identify a number of suspicious accounts. …”
    Get full text
    Article
  8. 17388
  9. 17389
  10. 17390

    Source Code Error Understanding Using BERT for Multi-Label Classification by Md Faizul Ibne Amin, Yutaka Watanobe, Md Mostafizer Rahman, Atsushi Shirafuji

    Published 2025-01-01
    “…Programming is an essential skill in computer science and across a wide range of engineering disciplines. …”
    Get full text
    Article
  11. 17391
  12. 17392

    GCAFlow: Multi-Scale Flow-Based Model with Global Context-Aware Channel Attention for Industrial Anomaly Detection by Lin Liao, Congde Lu, Yujie Gao, Hao Yu, Biao Cai

    Published 2025-05-01
    “…They allow precise modeling of data distributions and enable direct computation of sample log-likelihoods. Recent work has largely focused on feature fusion strategies. …”
    Get full text
    Article
  13. 17393

    A Contrastive Learning Framework for Vehicle Spatio-Temporal Trajectory Similarity in Intelligent Transportation Systems by Qiang Tong, Zhi-Chao Xie, Wei Ni, Ning Li, Shoulu Hou

    Published 2025-03-01
    “…Trajectory similarity computation has become an essential tool for analyzing and understanding vehicle movements, making it indispensable for these applications. …”
    Get full text
    Article
  14. 17394
  15. 17395
  16. 17396
  17. 17397

    Hadamard defense mechanisms for rice grain image privacy by D. Suma, V. G. Narendra, M. Raviraja Holla, M. Darshan Holla

    Published 2025-07-01
    “…Abstract This paper proposes a novel Hadamard Transformation-based image defense methodology tailored for rice grain images, targeting enhanced security and computational efficiency. The pipeline includes halftoning, share generation, secret sharing via Hadamard transformation, and quality-enhanced reconstruction. …”
    Get full text
    Article
  18. 17398

    Direct integration of non-axisymmetric Gaussian wind-turbine wake including yaw and wind-veer effects by K. Ali, P. Ouro, T. Stallard

    Published 2025-03-01
    “…In terms of computational cost compared to vectorised numerical averaging using 16 averaging points, both analytical solutions are computationally efficient with the circular-disc solution being approximately 15 % slower and the rectangular-disc solution being approximately 10 % faster. …”
    Get full text
    Article
  19. 17399

    3D reconstruction of vocal fold dynamics with laser high‐speed videoendoscopy in children by Rita R. Patel, Michael Döllinger, Marion Semmler

    Published 2024-10-01
    “…Parameters of amplitude (mm), maximum opening/closing velocity (mm/s), and mean opening/closing velocity (mm/s) were computed for the lateral and vertical vibratory motion along the anterior, middle, and posterior sections of the vocal folds were computed. …”
    Get full text
    Article
  20. 17400

    Optimizing ML models for cybercrime detection: balancing performance, energy consumption, and carbon footprint through multi-objective optimization by Romil Rawat

    Published 2025-04-01
    “…The methodology involves using NSGA-II for feature selection and evaluating energy consumption (Econ) and carbon footprint (CFP) with tools like CodeCarbon and EmissionsTracker. …”
    Get full text
    Article