-
3841
Feature Selection and Parameter Optimization of Support Vector Machines Based on Modified Cat Swarm Optimization
Published 2015-07-01“…Previous studies have indicated that CSO algorithms outperform other well-known metaheuristics, such as genetic algorithms and particle swarm optimization. …”
Get full text
Article -
3842
A Distribution Agnostic Rank-Based Measure for Proximity Search
Published 2025-01-01“…Extant algorithms depend on distance-based metrics to find the closest data points. …”
Get full text
Article -
3843
DETECTION OF KERATOCONUS DISEASE DEPENDING ON CORNEAL TOPOGRAPHY USING DEEP LEARNING
Published 2025-02-01“…Applying PCA for feature extraction before utilizing tradition ML algorithms and CNN helps in achieving high-accuracy results. …”
Get full text
Article -
3844
An Accelerated Successive Convex Approximation Scheme With Exact Step Sizes for L1-Regression
Published 2025-01-01“…The second performs a simultaneous descent step along both the best response and the past trajectory, thereby finding a two-dimensional step size, also in closed-form. The third algorithm combines the previous two approaches. All algorithms are hyperparameter-free. …”
Get full text
Article -
3845
Study of Keyword Extraction Techniques for Electric Double-Layer Capacitor Domain Using Text Similarity Indexes: An Experimental Analysis
Published 2021-01-01“…From the supervised algorithms, KEA and WINGNUS are employed for keyword extraction. …”
Get full text
Article -
3846
Toward Enhancing the Energy Efficiency and Minimizing the SLA Violations in Cloud Data Centers
Published 2021-01-01“…VMPMOPSO was compared with a simple single-objective algorithm, called First-Fit-Decreasing (FFD), and two multiobjective ant colony and genetic algorithms. …”
Get full text
Article -
3847
Data-Driven Approach for Modeling the Nonlane-Based Mixed Traffic Conditions
Published 2022-01-01“…The data were used to extract the parameters required for modeling the vehicles’ positions using machine learning algorithms. Three established supervised machine learning algorithms (k-NN, random forest, and regression tree) and deep learning are selected to model mixed traffic conditions. …”
Get full text
Article -
3848
Survey of Distributed Computing Frameworks for Supporting Big Data Analysis
Published 2023-06-01“…In performing such tasks, these frameworks face three challenges: computational inefficiency due to high I/O and communication costs, non-scalability to big data due to memory limit, and limited analytical algorithms because many serial algorithms cannot be implemented in the MapReduce programming model. …”
Get full text
Article -
3849
Estimation of Blood Pressure by Image-Free, Wearable Ultrasound
Published 2024-05-01“…We validated these algorithms in silico, in vitro, and ex vivo, where tissue and artery phantoms help emulate human physiology. …”
Get full text
Article -
3850
Opportunities of Artificial Intelligence and Machine Learning in the Food Industry
Published 2021-01-01“…Artificial intelligence with data science can improve the quality of restaurants, cafes, online delivery food chains, hotels, and food outlets by increasing production utilizing different fitting algorithms for sales prediction. AI could significantly improve packaging, increasing shelf life, a combination of the menu by using AI algorithms, and food safety by making a more transparent supply chain management system. …”
Get full text
Article -
3851
On Fast and Stable Implementation of Clenshaw-Curtis and Fejér-Type Quadrature Rules
Published 2014-01-01“…Based upon the fast computation of the coefficients of the interpolation polynomials at Chebyshev-type points by FFT, together with the efficient evaluation of the modified moments by forward recursions or by Oliver’s algorithms, this paper presents fast and stable interpolating integration algorithms, by using the coefficients and modified moments, for Clenshaw-Curtis, Fejér’s first- and second-type rules for Jacobi weights or Jacobi weights multiplied by a logarithmic function. …”
Get full text
Article -
3852
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
Get full text
Article -
3853
PSGpower: A MATLAB toolbox for analyzing sleep EEG data
Published 2025-02-01“…Workflows include existing algorithms from EEGLAB and FieldTrip and custom algorithms. …”
Get full text
Article -
3854
Real Time Estimation of Modal Parameters and Their Quality Assessment
Published 2008-01-01“…In this paper the recursive method for modal parameters estimation is formulated and verified. Formulated algorithms are implemented in the FPGA electronic chip. …”
Get full text
Article -
3855
Approximating Iterations for Nonexpansive and Maximal Monotone Operators
Published 2015-01-01“…We present two algorithms for finding a zero of the sum of two monotone operators and a fixed point of a nonexpansive operator in Hilbert spaces. …”
Get full text
Article -
3856
Komparasi Kinerja Algoritma Blocking Pada Proses Indexing Untuk Deteksi Duplikasi
Published 2024-08-01“…This research aims to compare several blocking algorithms so as to obtain recommendations on which algorithm is most optimally used. …”
Get full text
Article -
3857
Plant Detection in RGB Images from Unmanned Aerial Vehicles Using Segmentation by Deep Learning and an Impact of Model Accuracy on Downstream Analysis
Published 2025-01-01“…In the present work, a method is presented for detecting the plants of five species in images acquired via a UAV on the basis of image segmentation by deep learning algorithms (convolutional neural networks). Twelve orthomosaics were collected and marked at several sites in Russia to train and test the neural network algorithms. …”
Get full text
Article -
3858
LDWLE: self-supervised driven low-light object detection framework
Published 2024-12-01“…Additionally, LDWLE is a versatile training framework that can be implemented on most one-stage object detection algorithms. These algorithms typically consist of three components: the backbone, neck, and head. …”
Get full text
Article -
3859
Effect of EOG Signal Filtering on the Removal of Ocular Artifacts and EEG-Based Brain-Computer Interface: A Comprehensive Study
Published 2018-01-01“…Moreover, the comparison results indicated that the hybrid algorithms outperformed the performance of single algorithms for both simulated and experimental EEG datasets.…”
Get full text
Article -
3860
Application of Big Data Technology in the Impact of Tourism E-Commerce on Tourism Planning
Published 2021-01-01“…This paper proposes a research strategy on the impact of tourism e-commerce on customized tourism in the EBD, including related theoretical research methods, random forest algorithms, support vector machine classification algorithms, and Bayesian estimation algorithms, which are used to customize tourism e-commerce in the EBD, and research experiment on the impact of tourism. …”
Get full text
Article